Sei sulla pagina 1di 60

IT NEXT

AUGUST 2010 / RS. 100


VOLUME 01 / ISSUE 08

INSIGHT: Should
you lose sleep over cloud
28 INTERVIEW: Jim 38
Whitehurst on consumers
IT STRAT: Why it’s 45 THE BIG Q
important to take a strategic How to stem social
engulfing internal IT? driving IT agenda approach to social media media leaks? Pg 51
DEMOCRATISATION OF BI

INTELLIGENCE
MULTIPLIED
The spread of BI across
the enterprise is turning
employees into
VOLUME 01 | ISSUE 08

knowledge workers.
Here is an update on
how the revolution
is shaping up
Pg.14

A 9.9 Media Publication


EDITORIAL

More than just


intelligence
In many recent surveys of IT heads,
business intelligence (BI) has often come
close to the top of the list of things to get
done. The reasons for this are not hard to
discern. The rapid fluctuations in the global economy “The real challenge is
have made planning more difficult, and compelled managers
to get information into
in all organizations to focus on optimizing resources, cutting costs
and capturing new revenue opportunities. Many of these activities are the hands of people
possible only if people have access to timely and accurate information—and
presented in a manner that can be easily understood and actioned.
who need it most”
The big challenge for IT managers is to get information into the hands R GIRIDHAR
of the people who need it most, while ensuring data security and accuracy.
But, retrieving, collating and presenting data from a variety of enterprise
systems and making it available across different platforms and networks
is formidable task, especially if the BI system has to be delivered across
divisions and offices to support operational decision-making. Ensuring
the performance and reliability of such distributed BI systems, becomes an
enormous undertaking once usage within the organization grows. It puts a
lot of pressure on the IT department to keep up with burgeoning user needs.
BI is often perceived to be expensive to buy, implement and run. While
this was often true for solutions targeted at big enterprises, BI has become
cheaper and easier in past few years. Continuous technical developments
and refinements in both BI solutions and backend systems (like CRM, ERP,
SCM, data warehouses, etc.) have made it simpler to retrieve, store and
process data from multiple systems.
Hardware performance improvements have also helped—storage is
much cheaper now, and server virtualization helps minimize hardware
costs and reduce the overall BI project cost. In fact, you even have cloud and
SaaS-based BI options. However, the real issues with spreading BI within Sites To Watch!
the organization are that the initiative is often driven by the IT department,
The Datawarehousing Institute:
not business units. The unfortunate outcome of this state of affairs is that BI
http://www.tdwi.org
is not perceived as a system that is critical to run the business—and needs B Eye Network : http://www.b-
continuous justification. To resolve this conundrum, it is necessary for eye-network.com
Your views and opinion matter
IT managers to educate and evangelize the benefits of BI to business unit to us. Send your feedback
heads. They will need to assimilate key business issues and demonstrate to on stories and the magazine at
r.giridhar@9dot9.in or SMS us at
decision makers how BI can help them do their jobs better. Write in and let 567678 (type ITNEXT<space>your
us know how BI is making a difference in your organization. feedback)

A U G U S T 2 0 1 0 | IT NEXT 1
4 Edu Tech December 2009
CONTENT
Facebook:
http://www.facebook.
com/home.php#/group.
php?gid=195675030582

Twitter:
http://t witter.com/itnext

LinkedIn
http://www.linkedin.com/
groups?gid=2261770&trk=myg_
FOR THE L ATEST TECHNOLOGY UPDATES GO TO ITNEXT.IN AUGUST 2010 V O L U M E 0 1 | I S S U E 0 8 ugrp_ovr

Democratisation
of BI
From being a tool for the head honchos, to
providing insight to the line managers,
BI is undergoing a metamorphosis and with
it the way the companies conduct
business is changing as well

Page
14
INSIGHTS BOSS TALK INTERVIEW
24 Is it Rain or a Drizzle?
Will cloud computing decimate internal IT?
Is it worth losing your sleep over its rise?

32 Do More with less


Data de-duplication is not just about saving
capacity; it’s also about improving the perfor-
mance of storage systems
C OV ER DES IGN AN D ILLUSTRATIO N : ANIL T

28 Cloud? Yes with riders


involved
There are clear benefits to using the
cloud model to facilitate the rapid avail-
ability of IT resources, but it’s not for
every enterprise 05 Craft a multi-faceted 38 Consumers will drive the
persona| Arun Gupta , Group Tech Agenda| Jim Whitehu-
CTO, K.Raheja Corp rst, President and CEO, Red Hat

2 IT NEXT | A U G U S T 2 0 1 0

Content Page-01.indd 2 8/5/2010 10:19:53 AM


ITNEXT.IN

MANAGEMENT
Managing Director: Dr Pramath Raj Sinha
Printer & Publisher: Vikas Gupta

EDITORIAL
Group Editor: R Giridhar
Page Associate Editor: Shashwat DC
SECURING THE AIRWAVES | A Wi-Fi plan Sr Correspondent: Jatinder Singh

42 should be robust enough to address security con-


cerns and clean enough to keep legal risks at bay DESIGN
Sr Creative Director: Jayan K Narayanan
OPINION 49 Training Calendar | A list Art Director: Binesh Sreedharan
11 Money Wise: Journey to of career booster courses Associate Art Director: Anil VK
the Top ! |By Chinar Deshpande, Manager Design: Chander Shekhar
CEO, Creative IT India THE BIG Q Sr Visualisers: Anoop PC, Santosh Kushwaha
51 How to stem social media Sr Graphic Designer: Suresh Kumar
12 Tech Talk: IT’s better leaks? | Engage ur employees Sr Designers: Prasanth TR & Anil T
with governance | by Srinivas and enforce an IS policy Designer: Sristi Maurya
Chief Photographer: Subhojit Paul
Anapu,VP (Enterprise Informa-
tion Systems) Mahindra Satyam CUBE CHAT
SALES & MARKETING
56 Taking up Challenges | “I
VP Sales & Marketing: Naveen Chand Singh
15-MINUTE aspire to raise the standard of my
(09971794688)
MANAGER work,” says Bhoodev Tyagi, Lead-
Brand Manager: Siddhant Raizada (09990388390)
45 IT Strat Social only? | er–IT, Dun & Bradstreet, India National Manager-Events & Special Projects:
Taking a strategic approach to Mahantesh Godi (09880436623)
social media is essential to reap- OFF THE SHELF GM South: Vinodh Kaliappan(09740714817)
ing real benefits 60 Ericsson intros LTE based GM North: Pranav Saran(09312685289)
solution | Faster mobile GM West: Sachin N Mhashilkar(09920348755)
46 Healthy Living | Coping broadband apps on demand Assistant Brand Manager: Arpita Ganguli
with Carpal Tunnel Syndrome LED-based digital light source Ad co-ordination/Scheduling: Kishan Singh

47 Golf Basics | Dummies PRODUCTION & LOGISTICS


guide to golfing Sr. GM Operations: Shivshankar M Hiremath
Production Executive: Vilas Mhatre
48 Manage IT| Sweat your IT Logistics: MP Singh, Mohamed Ansari,
assets page Shashi Shekhar Singh

OFFICE ADDRESS
REGULARS
Nine Dot Nine Mediaworx Pvt Ltd
Editorial _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 01 A-262 Defence Colony,
Industry Update _ _ _ _ _ _ _ _ _ _ 06 New Delhi-110024, India

Tech Indulge _ _ _ _ _ _ _ _ _ _ _ _ _ 60
Certain content in this publication is copyright Ziff Davis
Open Debate_ _ _ _ _ _ _ _ _ _ _ _ _ _ 61 Enterprise Inc, and has been reprinted under license. eWEEK,
My Log_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 62 Baseline and CIO Insight are registered trademarks of Ziff
Davis Enterprise Holdings, Inc.

ADVERTISER INDEX Published, Printed and Owned by Nine Dot Nine Mediaworx
Private Ltd. Published and printed on their behalf by Vikas
LG IFC
Gupta. Published at A-262 Defence Colony, New Delhi-110024,
IBM 09 India. Printed at Silver Point Press Pvt Ltd, D-107, TTC
Supply Chain 27 PLEASE Industrial Area, Shirvane, Nerul, Navi Mumbai 400706.
Page
RECYCLE
AISEC 55 THIS Editor: Vikas Gupta
MAGAZINE
AND

24
Vizeum IBC REMOVE
INSERTS
© ALL RIGHTS RESERVED: REPRODUCTION IN WHOLE OR IN
Canon BC BEFORE
PART WITHOUT WRITTEN PERMISSION FROM NINE DOT NINE
RECYCLING
MEDIAWORX PV T LTD IS PROHIBITED.

A U G U S T 2 0 1 0 | IT NEXT 3

Content Page-01.indd 3 8/5/2010 10:20:03 AM


INBOX

is much lesser than a typical PC.


Thin clients used in conjunc-
tion with desktop virtualisation
are a big hit these days, as they
allow simpler provisioning of
new desktops, reduced down-
JULY 2010 time and lower cost of deploying
new applications.
SAURYA BHAUMIK
Independent Consultant
IT NEXT THANKS
ITS READERS
FOR THE WARM Multimodal Qualdplay story
RESPONSE
published in March issue of
IT Next is a good read. I want to
www.linkedin.com/
groups?gid= congratulate you and your entire
2261770&trk=
IT NEXT VALUES YOUR FEEDBACK
myg_ugrp_ovr
team for simplifying technol-
We want to know what you think about the magazine, and how we can make it ogy at such a great extent. While
396 members
a better read. Your comments will go a long way in making IT NEXT the pre- many organisations have already
ferred publication for the community. Send your comments, compliments, embarked on this journey, and are
complaints or questions about the magazine to editor@itnext.in. at various stages of UC matyurity
curve, several others are actively
considering its deployment.
the real challenge, for me, in
I liked the story “De-lighting with a difference” published READ THIS the BIO space comes in conso0li-
ISSUE ONLINE
in the July issue of IT NEXT. In today’s scenario everyone is dating voice voice, video and data
becoming very conscious about rising energy costs and the onto single network. In this con-
http://www.itnext.
text, it’s important to first analyse
effects of greenhouse gas emissions on the environment. in/resources/
magazine if the existing corporate network
Building automation is very effective in reducing both the is ready to deal with the proposed
energy costs and environmental costs of a building. Because deployment
of this, most systems start by automating the heating, cooling, RANJAN JUNEJA,
Technical Manager, Persistent
ventilation and air conditioning (HVAC) systems’ operations.
GAURAV KOHLI The Bluffer’s guide to world cup
IT Consultant, Xebia soccer was a good read. This is the
only IT magazine , I’ve seen in recent
I am really impressed with the way, IT Next is going. The July issue times which is an exciting blend of
was really rich in both content and design. I really liked the cover story IT and IT related non IT stories. I am
on best practices. With every passing day, the intimacy between tech- a big fn of your training calender as
nology and business is evolving. And businesses therefore are look- well. I usually tear it from the maga-
ing at various options which could aid them the best possible results. zine and put on my notice board for
Thanks for the broader picture. I am eagerly waiting for the next issue. my IT managers and other adminis-
SUKHVINDER SINGH trators for a ready information.
MD, Makkar Travels

TANU KAUR,
The magazine is impressive, however I think it is too loud in its HR Associate, Gear
overall appeal. Perhaps that is why it has named IT NEXT.
SHWETA SHAW Thanks for throwing light on the
Assistant Manager, TCS SOA in the July issue of IT NEXT.
I am completely agreed with the
I found the green issue of IT NEXT is noteworthy. The information author that the adoption of SOA
ITNEXT<space>
related to desktop virtualisation is appreciable. In today’s scenerio, <your feedback> is going to be really huge amongst
thin clients are also a great solution to the power issue, as they con- and send it to enterprises, in coming years.
sume much lesser power than conventional PCs and are much easier 567678 ANSHU MUNJAL,
to manage as well. Thin clients consume around 15W of power, which *Special rates apply
System Admin, Clarity India

4 IT NEXT | A U G U S T 2 0 1 0
BOSS TALK | ARUN GUPTA

PEOPLE MANAGEMENT

Craft a
multi-faceted
persona

E
ver so often, a debate starts on what
it takes to become a CIO—techni-
cal or business skill, or something
else? The answer is not clear—look
around and you will find CIOs from
different backgrounds who have tasted success.
Let’s first assess what is the role of a CIO. Some
70% of the IT budget comprises sustenance of
technology that runs a business—referred to
as “business as usual (BAU)”, or keeping the
lights on (KTLO). Then, there is the incremental “Tech skills are needed but not to the level
improvement of systems and processes
driven by technology, (customisations, new
of how to configure a router or write a
development, changes to existing packages and code—that’s for the next layer”
reports that keep developers both internal or
outsourced busy. New projects form a critical of services or products, and generate periodic
part of a portfolio, each requiring a business reports for management reviews. He is also
case, budgetary support, change management, expected to be on the top of a situation, in case of
and sustenance upon institutionalisation. exigencies created by the failure of a server, the
Lastly, it’s about thought leadership, alignment network, or even the PC—at a critical moment.
SUGGESTION BOX
and contribution. Think now, what kind of qualifications would
A CIO oversees all of the above—impacting be required to be a successful CIO. Do you need
the front office, sales, marketing and customers, to be a major in technology, or business? Will
while ensuring support for functions such cross-functional experience offer value? What
as finance, accounting, human resources, about soft skills. A dash of people management?
legal and administration. Depending upon Look around you—and you will find successful
an organisation’s business, a process-related IT leaders from all walks of life juggling all of
understanding of manufacturing, distribution the se tasks. Technology skills are essential.
and logistics, supply chain, or loyalty is They are needed, but not to the level of how to
required, too. configure a router or write a code—that’s for the
A jack-of-all-trade’s-CIO is expected to have The book talks next layer, even for vendors to address.
a meaningful discussion with business heads about why On the other hand, business and soft
and CXOs on their functions and understand Mastering the Art skills cannot be substituted. Those need to be
how technology enables those. This helps a and Practice of developed to a level where communication with
CIO identify new capabilities that IT can create Online Learning any CXO is meaningful. If you are challenged in
with the new innovations, that keep pouring and Corporate this faculty, then business IT alignment will be
into the marketplace. Operationally, the CIO is Collaboration is a debated subject. And you may find yourself at
expected to manage the IT team, mentor them, important the receiving end.
keep attrition low, manage operational and WRITER: ROBERT UBELL
PUBLISHER: JOHN WILLY &
capital budgets, review outsourced vendor SONS
The author is Group CTO for K.Rahega Corp
PRICE: INR 1800
performance, negotiate deals for the lowest cost

A U G U S T 2 0 1 0 | IT NEXT 5
UPDATE
I N D U S T R Y
TRENDS
DEALS
PRODUCTS
SERVICES
PEOPLE

MAIN FEATURES
n 1500+ user-installable ap-
plications
n Allows users to access In-
dian content in just one click
n Indic language translitera-
tion to help users write in
mother tongue

The browser boasts of


over 1500 Indian themes and
wallpapers, and supports over
twelve Indian languages on any
webpage, or in write ,by using
Epic’s free built-in word processor. 
The company claims that
this is the only browser in the
world which offers anti-virus
protection. Free antivirus

Hidden unveils Epic has been


created by a
scanning and healing is built
into Epic and enables users

browser for India team of Indian


engineers
and is based
to save money by performing
regular virus scans on
Epic for free, and every file
EXCLUSIVE | Hidden Reflex, a Bangalore–based software start-up has on the they download in Epic is
launched the first browser targeted at Indian audiences. The browser open–source automatically scanned. 
called Epic has been created by a team of Indian engineers on the Mozilla Another unique security
open–source Mozilla platform.  platform measure warns users when
The browser sidebar supports Indian content by providing they’re about to visit potentially
users access to the latest national and regional news from popular dangerous websites.  
publications, live television channels, videos, stock quotes, live cricket It also have feature like Indic
scores, top music albums, and information about local events. language transliteration that
enables users to write emails
and documents in their mother
tongue simply and instantly
M Teledensity in India The number of telephone subscribers in using a regular English keyboard. 
TELECO
India has reached 621.28 mn at the end of Mar 2010 This allows users to access
(NUMBERS IN PERCENTAGE) India content by just one click in
Mobile 60 various languages.
subscribers in
50 Epic claims that it has over
India reached
58.43 crore as 40 8.2 1500 apps that include a word
on March 31, .5
% 43.5 %
8% processor, file backup, my
30 17 11. 52.7
2010 computer, video picture-in-
MAR 2009

MAR 2010
DEC 2009
SEP 2009

20
47.1 picture, e-mail, chat, games and
10
37.0 more. A user can store all these
0 applications which are free and
install in seconds.
SOURCE: TRAI

6 IT NEXT | A U G U S T 2 0 1 0
STORE IN AN ARTISTIC WAY FOR A SLEEK VIEW COOL YOUR SERVERS
Transcend has launched the 16 GB JetFlash Inspan has launched Mercury GlacialTech launches new series of server
V90C keychain 1660TWG LED Moni- cooler under the Pola-
USB flash tor – the monitor that ris range. The products
drive. This comes with inbuilt are environment
artistic device speakers. It is priced friendly and specifi-
carries lifetime at Rs. 7,499 and car- cally designed for Intel
warranty ries a 3 year warranty LGA771 server CPUs

SAP sharpens its The company is working with


stakeholders and partners to
understand the sustianibility

sustainability focus needs, and making efforts to


build software programmes and
reports to meet the same.
TECH TRENDS | Sustainability, “SAP’s Sustainability
in the past couple of years, has Report is an important step
attracted increasing interest towards the company’s ongoing
among businesses across ver- dialogue with stakeholders
ticles. In principle, the basic idea regarding how SAP can best
is as simple as it is compelling: perform as a company, build
resources may only be used at a software solutions that promote
rate at which they can be replen- sustainable operations for
ished naturally. customers, and play a leading
Realising the need, SAP role in the public policy debate,”
has sharpened its focus on says Rajamani Srinivasan,
proving sustainable solutions to Vice President, Solutions
customers which can help them Engineering, SAP India.
gain long term profitability. The company sustainable performance It claims that its Web-
The company is driving is working to through compliance, resource based report has achieved
its sustainability initiatives provide new productivity, competitive an A+ rating from the Global
by managing its internal sustainability differentiation, and business Reporting Initiative (GRI),
operations and enabling its solutions longevity needs, with a constant and allows readers to drill into
customers to increase their monitoring in place. sustainability performance.

AROUND THE WORLD QUICK BYTE

Facebook reaches 500 mn


users. Mobile phones aid
the spread
Facebook has crossed 500 mn users around the
world, informs the company. “This is an important
AMAZON.COM CEO JEFF BEZOS ON KINDLE
milestone for all of you who have helped E-BOOKS OUTSELLING HARDCOVERS
“THE KINDLE HAS NOW
spread Facebook around the world,” says Mark OVERTAKEN THE HARD-
Zuckerberg, founder and CEO, Facebook. COVER, EVEN THOUGH
The company has also announced that it has WE’VE BEEN SELLING
HARDCOVER BOOKS FOR
surpassed 12 million users in India as people 15 YEARS AND KINDLE
continue to share their lives on Facebook.  BOOKS FOR 33 MONTHS”

A U G U S T 2 0 1 0 | IT NEXT 7
UPDATE

Sify, VMware partner


to offer cloud solutions
TECH TIDINGS | Sify Technolo-
gies and VMware have entered
into a partnership to expand the
VMware Service Provider Pro-
gram (VSPP) in India to offer On-
demand hosting (Cloud) services
Sify has joined the global INTERVIEW
VMware service provider MANISH MEHTA
program (VSPP), designed for Vice President, Global Online, Dell
Online
service-providers who offer
On-demand cloud services
IT NEXT: How is Dell utilising the ben-
giving them the option to “rent” Security chiefs ensure quality of service
efits of collaboration tools to increase
VMware software licenses on a need to lay out for any application they
business efficiencies?
monthly “pay as you go” basis. a roadmap for want to run, internally or
According to the official enabling the new as a service. Dell was an early adopter of crowd-
statement, this model will era of choice This partnership sourced innovation with the launch of
help Indian companies, both computing helps Sify address the ideastorm; we use a similar tool internally,
large and small, to safely tap demand for on-demand called “employeestorm.” We see social
computing capacity inside and computing in India, one media tools as an element of our overall
outside their firewalls – how of the fastest growing internal communications and collaboration.
they want, when they want, and cloud computing markets
Which are the key business priorities
to the extent they want – to help in the Asia Pacific region.
that should not be compromised when
deploying these tools?

Employees should agree to protect

User driven IT taking hold


confidential information. The organisation
should provide adequate training and an-
nual compliance and ethics training around

amongst enterprises protecting private customer information.


Collaborative environments can be fostered
without compromising on security and
TECH TRENDS | The rapid use and IT, this dynamic shifts when it comes confidentiality by incorporating adequate
adoption of consumer technologies to newer consumer technologies checks and balances at the design stage.
like the iPhone and iPad within the More than 60% of respondents
Could you highlight the key precau-
enterprise is compelling organisation report that users have some input
tions that an IT administrator must
to lay out a security roadmap in this regarding the types of smartphones
take while deploying any collabora-
era of fast changing security environ- purchased, with 20 percent reporting
tion tool?
ment, suggests a latest research report that they let users decide
from EMC. 52 % of organisations allow some I suppose it depends on the service you are
This report offers concrete users to provide input on considering internally. For us, several of the

52
recommendations for how or make decisions about platforms are different. However, employ-
PHOTO GRAPHY: JAYAN K NARAYANAN

security leaders can get out netbooks while 50% ees share links across the platforms and
in front of user-driven IT and involve users in some tablet inside the firewall, so while tighter integra-
manage risks to create new % decisions. And 23% of tion might be ideal, I am not sure there
business value.   ORGANISATIONS the largest organisations is any such single vendor, or service, that
While the majority ALLOW USERS TO surveyed have experienced
PROVIDE INPUT
would necessarily address all the specific
of decisions about older DECISIONS a serious breach or incident needs for any single organisation.
technologies such as desktops ABOUT because of a personal device
NETBOOKS
and laptops are still made by on the corporate network.   By Jatinder Singh

8 IT NEXT | A U G U S T 2 0 1 0
UPDATE

NSN to acquire part of


TECH TRENDS

US extends
Motorola’s wireless biz its lead as a
top spammer
THE
COMPANIES IT security and control firm
EXPECT TO Sophos has published its latest re-
COMPLETE THE port that identifies the top 12 spam
ACQUISITION relaying countries, covering the
BY THE END OF second quarter of 2010. According
2010. to the report, the USA continues to
be the number one spam polluter,
piping out 15.2% of all global spam
messages, an increase from 13.1%
in the first quarter of 2010.
The UK, a nation that last year
fell out of the spam hall of shame,
- also saw a significant rise in the
proportion of spam it relayed.
M&A | Nokia Siemens Network (NSN) area,” explained Julien Grivolas, The top spam relaying countries
has announced plans to acquire Principal analyst, Ovum. for April to June, 2010, are as
Motorola’s GSM, CDMA, WCDMA, “After its failed attempt to acquire follows—
LTE, and WiMAX wireless assets for Nortel’s CDMA/LTE assets, Motorola

India 7.7%
$1.2 billion. NSN will acquire several was NSN’s last potential target to

S Korea 4.2%
Brazil 5.5%
R&D centres as a part of the deal. achieve this goal. Huawei and ZTE

UK 4.6%
Also, approximately 7,500 Motorola were also in the mix, but would have
employees are expected to be trans- struggled to close such an acquisition USA (15.2%)

ferred to NSN. The companies expect for political reasons,” Grivolas adds.
to complete the acquisition by the Globally, this deal is mostly about
end of 2010, subject to customary scale and reach. The deal also marks
closing conditions including regula- NSN’s entry into the CDMA business, According to the findings, the
tory approval. as well as its comeback in the WiMAX best way for users and administra-
“Having historically been out of infrastructure market. Adding tors to reduce the risk of being
the CDMA business, NSN had a weak Motorola’s wireless RAN assets – compromised is to run anti-spam
position in the US market despite some which represented a turnover of $3.7 and anti-malware protections,
deals in the mobile core segment (such billion in 2009 – will make NSN behave sensibly while online, and
as an IMS deal with Verizon Wireless better positioned to compete against ensure that their systems are up-
for its LTE project) and in the optical Ericsson, Huawei, and Alcatel-Lucent. to-date with security patches.

NEWS @
BLOG
ENTERPRISE SOFTWARE IS SEXY AGAIN 
WITH PROHIBITIVE PRICING, long product cycles and user interfaces only a mother could love, the enter-
prise offerings of Microsoft, SAP, Oracle, and other big vendors, are about as appealing as Steve Ballmer in a
bikini | Aaron Levie, CEO and co-founder of Box.net in his blog post at <http://www.TechCrunch.com>

The guest post further quotes him as saying that the latest crop of enterprise
ILLUSTRATI ON: ANOOP PC

software companies are approaching business problems with the agility,


speed and mindset of consumer start-ups, bringing explosive innovation to
a traditionally stagnant, slow-moving market. To retain customers in this
incredibly competitive landscape, you’re forced to build better technology.

10 IT NEXT | A U G U S T 2 0 1 0
MONEY WISE
OPINION CHINAR DESHPANDE
CEO, Creative IT India

n Capturing the business scenario


in quantifiable parameters before
starting an IT project. Ensuring that
the outcome of a project is measured in

Journey to the top! n


terms of improvement in these numbers
Associate each IT project to goals
of key business leaders, which may

The new IT Leader n


have to clear financial measures. This
allows one to assess the true return
Establish a balanced scorecard for

B
IT function in order to judge the
usiness environment is impact of IT on all four dimensions of
becoming so competitive, organisational improvement—viz.
and market dynamics are a. Financial growth
changing so fast, that it has b. Customer satisfaction
become imperative for an c. Internal process improvements
organisation to be flexible and incor- d. Learning of the organisation
porate easy-to-change process architec- Aspiring to be a game changer for
ture. It’s possible to adopt fluidity, only the business: IT function is no longer
if organisations have strong technology a support function, but a business
backbones supporting business opera- enabler. But, one cannot stop at this.
tions. As technology becomes the core To be a successful IT leader, it’s
business driver, IT leadership has to important to identify opportunities
evolve to suit demands of the business where technology can introduce a new
and stakeholders’ expectations. business model and offer a competitive
Traditionally, IT functions of an end- edge to the firm.
user organisation are divided into two Any technology initiative that
pillars of IT delivery; infrastructure and
business applications. This leads to a
“It is critical for an IT empowers your organisation to create
markets, addresses customers differently,
situation wherein a IT personnel with leader to become part or opens up new avenues of revenues and/
high-growth potential ends up focusing
on either infrastructure, or business. By
of the mainstream or profit-making, would automatically
put you in the leadership role.
the time, he/she reaches the number two business to be Developing a friendly ecosystem:
spot in the IT function, all versatility is
lost. And an individual settles into a role
recognized as the Leadership in any field needs support of
friends, followers and alliances. Hence,
of a senior-most subject matter expert. key influencer in the it is critical to establish a professional (or
It is therefore imperative for senior IT
managers, aspiring to be the next CIOs,
business” personal) relationship with IT vendors,
implementation partners, consulting
to stop being specialists, and be sensitive companies and technology companies.
to the business. The journey to the top business performance, challenges in day- A senior IT professional has to get
can start by taking a few measures: to-day operations, and external factors as close to the business as possible and
Becoming one with business: It is influencing the company’s progress establish a connect between technology
critical for an IT leader to become a nBecome aware of business targets set and business. One has to show
part of the mainstream business, to be for key people in departments sensitivity towards the fact that money
recognised as a key influence. When nIn short, speak the same language as is spent on each IT project. Hence, treat
you understand challenges of business your internal customer it as an investment and show tangible
teams, you are able to relate to their true Measuring business benefits of IT: returns that catch the fancy of business
PHOTO GRAPHY: MEXY ZAVIE R

needs for solutions. Any technology initiative has to have leaders. Ensure that you build a support
In order to achieve this one has to: business needs. Its implementation system that facilitates your career, both
n Establish a rapport with key business success has to be measurable in the internally as well as externally. Finally,
users across departments form of tangible business benefits. make a business impact through
nUnderstand business processes In order to adopt this practice one can technology-driven innovation—and the
n Participate in informal chats on follow a few steps such as: crown is yours.

A U G U S T 2 0 1 0 | IT NEXT 11
TECH TALK
SRINIVAS ANAPU,
OPINION VP (Enterprise Information Systems)
Mahindra Satyam

requires a complete traceability of each


of the finance-related transactions.
The IT compliance activity is really

IT’s better with complex, especially for large compa-


nies that have subsidiaries in different

governance
countries and are listed on different
stock exchanges. To support IT compli-
ance, standards like COSO and COBIT
are available to drive companies in the

R
right direction.
esearch conducted by MIT While it may sound expensive, you
has found that companies can reduce the IT compliance cost by
with better than average encapsulating the compliance processes
IT governance earn at into an automated system.
least 20% higher return Besides, create a structured,
on assets than organisations with controlled software development
weaker governance. processes and apply best-practice
Government regulations require methodologies. Finally, ensure that you
companies to assess IT risks impacting develop specific compliance reports
financial disclosure at stages of a and templates.  
company’s lifespan, and to maintain the While the IT compliance framework
effectiveness of the control environment is complex in nature, there are
when information systems are changed, fundamentally two types of controls
updated, or expanded. that this framework encapsulates. They
In other words, IT compliance is a are the IT general controls and the IT
continuous process—compliance cost application controls.
cannot be looked at as a onetime cost. The IT general controls should
IT governance is a framework which reduce the risk of systems failure and
ensures that technology decisions are “When aligned with unauthorised access to programs and data,
made in support of business goals
and objectives. strategic IT goals thereby assuring the system’s integrity
after operations such as acquisition,
It provides the critical checks and and investments, implementation, configuration and
balances to better manage and mitigate
risk, standardise practices, streamline IT compliance maintenance of operating systems,
database management systems,
procedures, and strengthen returns transforms from a middleware, communication software
on assets.
Companies should look at IT cost driver to a value and utilities that run the system and allow
financial applications to function.
compliance initiatives not like a duty driver” The IT applications controls aim to
to accomplish, but like an opportunity verify the correct functioning of the
to exploit—to improve awareness of financial applications and of each of
accounting information systems, to mapping all operations comprising the the other process software producing
reduce IT risks, to enhance value of processes related to financial data. This accounting entries. These controls
financial information, and to gain the should be documented too. assure completeness, accuracy,
trust of investors and financial markets. Design a control against each of authorisation and affordable disclosure
Companies should transform IT the existing risks and threats for for each financial transaction.
compliance from a cost driver to a data integrity. Evaluate each of these Finally we all have to understand
value driver—aligning IT compliance controls and verify if they are able that while the CIO is the sponsor and
initiatives with their strategic IT goals to remediate the systems failure, completely accountable for the data
and investments. unauthorised accesses or human governance in an organisation, the
The roadmap for a well-conceived mistakes in accounting. responsibility lies with the respective
IT compliance framework starts with Finally document and report all the process owners and everyone directly
defining the scope of IT compliance and IT compliance activities so that this related to data governance.

12 IT NEXT | A U G U S T 2 0 1 0
DEMOCRA T

14 IT NEXT | A U G U S T 2 0 1 0
BUSINESS INTELLIGENCE | COVER STORY

A TISATION

From being a tool for


the head honchos, to
providing insight to
BI
BY S H AS H WAT D C

“Have I bitten more than I could possibly chew?”was a


the line managers, thought that flashed across Suresh Shanmugham’s head as
he got down to the deliverables that he had committed upon.

BI is undergoing a As head of IT at Mahindra & Mahindra Financial Services


Ltd (MMFSL), Suresh had in the operations committee meet-
ing promised to deliver growth in figures that were pointing
metamorphosis and with northwards in comparison to current numbers. The specific
product sales were not looking too optimistic either, but
it the way the companies Shanmugham had confidence in his team and on technology
and was confident on delivering the stiff targets.

conduct business is Among the many technologies in his armoury, Shanmugham


was banking heavily on Business Intelligence or BI to deliver
ILLUSTRATIO N: ANI L T

the goods. He knew that if MMFSL had to make headway


changing as well as a rural NBFC, the only way he could do the same was by

A U G U S T 2 0 1 0 | IT NEXT 15
COVER STORY | BUSINESS INTELLIGENCE

empowering his workforce and making market trends. With the MF Connect 450 branches across the length and
strategic information readily available. (the handheld device) in their hands, breadth of India. The credit for success
Over the next few years, MMFSL each agent was a decision maker. And according to Shanmugham lies as much
agents in far-flung areas across the nation with this decentralisation of information, with technology as it does for people.
were empowered with a hand-held intelligence was effectively multiplied. “One of the distinguishing factors,
device that not only helped them record The result: In a decade, MMFSL was that we were able to empower
financial transaction, but also gave them has grown to be one of the largest our agents through the right tools and
insights on customer behaviour and rural NBFC in India, having over technology. This helped us to be agile
and realign ourselves to the shifting
market dynamics,” he states confidently.
The reason behind MMFSL’s
TOP 5 METHODS OF MONITORING PERFORMANCE success is not all that hard to guess. In
BI is still fairly in the infancy as far as performace monitoring is concerned today’s dynamic environment, the only
as only 10% of respondents were using it companies that will succed is the ones
that will be most agile and responsive to
Spreadsheets
ERP Reports/

MS Excel and
Dashboards

the changing scenario. BI,. as a tool, aids


Reports from Financial

(Base 207 and abets this agility.


Database Reports

30
respondents) Like it is often said that the proof of
the pudding is eating it, the success of
Applications

25
BI can too be measured in two simple
ways, how much revenue was added or
20
how much revenue was saved.
BI is particularly effective in these
15
times, where the problem is not the
BI

lack of information but information


10
overload. With data flowing in from
Other

different points within the organisation,


5 it becomes particularly cumbersome
26% 26% 19.1% 16.9% 10.4% 1.1% and almost impossible for someone to
0 collate all the data and then make much
sense from it. BI in conjunction with
business analytics (BA) helps do this
data crunching, to find trends, to bring
TOP 5 CHALLENGES IN BUSINESS insight from the information and open
PERFORMANCE MONITORING new vistas. While, more often the terms
The biggest concern with performance monitoring is still around BI and BA are used inter-changeably,
the issue of data integrity and security the essential difference is that while
BI tools are typically more focused on
measuring business performance using
from multiple applications

assigned metrics, BA takes a predictive


Lack of integrated data
Time taken to obtain

(Base 207
approach to business performance,
respondents)
People who need information do

using insights gained from a relatively


relevant data

vast set of data. Both, of course, serve as


Difficult to control control

decision making tools.


access to sensitive data

Reports too complex and

25
difficult to understand
not have access

Other

20 Traditional BI
Previously, BI was touted as a magic
15 wand–it could change business for-
tunes. Coming at a premium, these
10 standalone solutions–namely Cognos,
Hyperion, etc.–promised the moon;
5 agility, productivity and profitability.
Though, many did deliver, the crux lay
23.4% 21.1% 13.2% 11.6% 11.2% 19.2%
0 in how the application was integrated

16 IT NEXT | A U G U S T 2 0 1 0
BUSINESS INTELLIGENCE | COVER STORY

with the existing infrastructure. was as important, (or probably more


The system was dependent on the important), than earning the buck–
information being supplied by other scope and focus of BI was turned
enterprise applications. The focus inward. So, while BI was a telescope that
was on reporting, especially for the could look at new horizons outside, it
honcho, on assessing the success (or could also play a diagnostic role within
failure) of the business processes the enterprise.
and marketing initiatives. It was also around this time that
BI was considered an additional another important change took place.
functionality, something that came Companies realised that limiting the
on top of other business applications, access to BI reports to only the top
like the cherry on top. Considering managers was not the best way to
the costs and issues with integration, function. Instead, if the whole platform
only big or aggressive players went was more democratised, and reports
in for BI–after all it the magic wand (specific to job profiles) were made
for revenue growth. Little wonder “A business available to even line managers, the
then that the verticals that were the intelligence enterprise’s agility would increased
biggest users of BI were also the ones by leaps and bounds. So, if market
that were gunning for maximum solution focused intelligence, or customer insight, was
on vertical provided to even sales manager trying
to sell a product or service, it greatly
needs shortens helped in closing a deal.
the execution Again, banks and telecoms were
at the forefront of this change–
cycle and adds providing customer details to even
business value the customer-relationship officers
and sales representatives to help
for the customer” them make an informed decision.
Suddenly, from being an ancillary tool,
—MANEESH SHARMA, BI became pervasive. It was no longer
HEAD-BUSINESS USER & an additional factor, but a must-have
PLATFORM, SAP INDIA for firms that wished to cut their loses
and grow. There was a shift– BI was
no longer focusing on data generation,
but on enabling efficient and smart
growth. Speaking from the Indian resource utilisation.
context, BFSI and telecom were at
“The secret to BI’s the forefront of economic growth. Verticalised Solution
success is team Democratisation of BI
One factors that enabled this shift
was the emergence of “verticalised BI
work. Participation All that changed in the past decade. solutions”. Larger enterprises such

from all side of The growth bubble burst and reces-


sion clouds appeared. Organisations
as software companies acquired BI
vendors–IBM acquired Cognos, SAP
business is not that were gunning for growth sud- acquired Business Objects, and Oracle

only crucial but denly were grappling with suste-


nance. In that competitive landscape,
acquired Hyperion–looked at ways to
integrate features into their existing
critical” which had evolved over the years, offerings such as ERP and CRM. The
caught several enterprises unawares. result was appreciated by all.
—KRISHNAKUMAR The result was mayhem– as compa- A reason why IT managers were
AVANOOR, CUSTOMER nies were unprepared for both. Big skeptical about BI was because of the
CARE ASSOCIATE & ticket companies, also using high- implementation issues. Integrating
DGM, SOLUTIONS AND end analytics software, were not able BI suite with other existing enterprise
TECHNOLOGY TEAM, to duck the trend, either. applications was a tough call– it
SHOPPER’S STOP With the realisation hitting the involved a lot of customised coding work
management that saving the buck at the clients’ end. This customisation

A U G U S T 2 0 1 0 | IT NEXT 17
COVER STORY | BUSINESS INTELLIGENCE

not only took a lot of time, but also too complex and inadequate to meet for faster implementation of key
money. Result; people were never their needs effectively. initiatives and are leaning towards
satisfied with the output, as it was not Maneesh Sharma, Head-Business preconfigure vertical solutions. Apart
commensurate to efforts. User & Platform, SAP India, reaffirms from this, lack of standard business
But, with enterprise vendors his faith in verticalised solution. definitions is continuing to inhibit
offering an integrated suite with BI “The reason behind the evolution business transformation. Customers
capabilities that was specifically of verticalised BI solutions is the want to spend time in bringing out
aligned on a vertical basis, companies specific requirement in any industry. the potential from the information
were able to adopt BI into their Each industry vertical has an unique available within the transactional and
operations without quickly and speciality segment, with specific BI non-transactional systems; rather
without hassle. Also the fact that needs and pain points–unique data than spend time defining the basic
now BI had specific features based on structures, process patterns and framework for the applicable BI”
a space that a company operated in standards, job roles with industry-
greatly aided the adoption. specific responsibilities and KPI’s. Challenges remain
Companies are moving beyond the A business intelligence solution Even as BI adoption continues to grow, there
traditional reporting and analysis focused on vertical needs shorten the are two challenges that continue to haunt
tools. They are increasingly banking execution cycle and adds business decision revolving BI–data quality and cost
on capabilities that could assist them value for the customer.” of solution. Take for instance the example
with targeted data mining, dash- Concurs Nitin Singhal, Country of Bank of India, one of the premier banks
boarding, collaboration, statistical Manager, Information Management- in India. It has completed its first phase of
analysis and dimensional analysis. Software Group, IBM India (South modernisation. Now, its looking at imple-
Moreover, there has been a growing Asia). “As industry adoption of IT menting BI within enterprise. But, because
uptake of customised analytical and matures and competitive differentiation of its past legacy, it has huge amount of
intelligence tools. Some enterprises of IT reduces between similar records that are stored in silos and in an
have felt that standardised models are organisations, companies are looking unstructured manner, getting them in a

TOP REASONS TOP REASONS


FOR CHOOSING BI FOR NOT USING BI
BI is now considered to be more pervasive Over 25% of respondents still mentioned
and inward looking, as it is being used to costs as the main reason for not opting for
increase operational efficiencies BI solution

Improve business planning Cost & budget


Control Costs Satisfied with current system
Improve operational efficiencies Unclear about business
& cut waste benefits
Manage vendors and suppliers Unaware of solutions available
Manage inventories Haven’t thought about it in
detail
Explore new business
opportunities Lack of IT resources
Cut revenue leaks and
prevent fraud
Comply with regulations

18 IT NEXT | A U G U S T 2 0 1 0
BUSINESS INTELLIGENCE | COVER STORY

central repository is a challenge. “We are Going forward


currently working on ways to collate all The next big leap for BI would be a
data and records into a central location. To movement towards hand-held devices.
ensure that it is clean and error free. Once In days to come BI systems will not only
we have laid the foundation, we can move reside on a server, but will also port on
to the next level, using business analytics to mobile devices. They will have access
for growth and productivity,” explains to data and capability to perform ana-
P.A. Kalyanasundar, GM-IT, Bank lytics themselves, potentially enabling
of India. use of optimisation and simulation
Problems faced by BoI is a common everywhere.
one. It is said that a BI, or BA, solution Bhavish Sood, Principal Analyst–BI,
can be only as good as the quality of Gartner (Asia Pacific), captures the shift
data. If the data is a suspect, it can lead when he says, “Another way to view
to an implementation failure, which this is as a ‘shift in timing’. Business
can prove to be catastrophic for any intelligence has provided us historical
organisation. Ensuring data integrity When IT analysis; powerful ways of analysing
across systems can be a nightmare what has already happened. We can
sometimes. This is ab area that can
managers increase the scope of the information
be challenging for an IT manager approach BI with that is analysed. We can reduce delays
entrusted with the task. between data creation and analysis. In
business buy-in, the future the step would be predicting
there are benefits what can, or will, happen.”
Another development is BI on a
that can be seen SaaS model, delivered over the cloud
immediately” seamlessly. As the cloud computing
market expands, the on-demand
—NITIN SINGHAL, business analytics model has been
COUNTRY MANAGER, getting much attention by the IT
INFORMATION managers. In fact, according to IDC,
MANAGEMENT-SOFTWARE the BI SaaS market is set to grow three
GROUP, IBM INDIA (SOUTH times faster than the overall business
ASIA) analytics market with a CAGR of 22.4%
through 2013, though the base is indeed
much smaller now.
In the days to come, as the market
dynamics become more complex and
The other tangle is to justify the enterprises drown under TBs and
“Heterogeneous cost of implementation. Most of IT PBs of data, making sense of it all will
managers often debate if it is really become extremely critical. And BI will
systems pose worth the effort–considering the costs become more pervasive. And credible
a challenge, as and results. Singhal attempts to answer information will be readily available
the dilemma. “Previously the issue was to the man of the ground. This will
the application that an IT manager looked at the BI only help even the smaller companies to
aims to integrate from a pure play-reporting perspective. compete with the behemoths. Or even
The first leg of implementation on open up new markets or business
and analyse reporting business now demands opportunities, like Shanmugham was
information from more capabilities from a platform. And able to do for MMFSL.
When IT managers approach BI with Through the spread of relevant
all areas of business buy-in, there are benefits that information across the organisation,
business.” can be seen immediately.” not only are people empowered but
In fact, he goes on talk about how companies become profitable. And
—BINU LAKSHMAN, a customer using IBM solution was whats good for the balance sheet,
MANAGER - IT, HONDA SIEL able to show a whopping 403% ROI needs to be good for all. So, let’s hail
CARS INDIA and a payback period of 3 month for a the new avatar of BI, a refurbished
predictive analytics implementation. democratic one.

A U G U S T 2 0 1 0 | IT NEXT 19
COVER STORY | BUSINESS INTELLIGENCE

INTERVIEW

MAIA Intelligence is a provider of BI and BA solutions that


are customised to the needs of users. In a conversation with
Shashwat DC, Sanjay Mehta, CEO, MAIA Intelligence, charts
out the evolution of BI and maps how the change is affecting
all the employees in an organisation.
BY S H AS H WAT D C

How has the shift in BI been from a tool of to heavy M&A activity and a stricter regulatory
revenue growth to that of productivity gain? environment, all branches, subsidiaries and
We have saved average daily time for our cus- sister concerns of these organisations have to
tomers by over 20 minutes in productivity on have some common financial binding. And that
reports for a normal user and over 90 minutes is where BI is capturing the screen space.
for a power user. Besides productivity gains, The big question is which industry can
they got excellent insight on their own data and be verticalised. Those industries that are
different perspectives to analyse the same with regulated and follow some standard procedures
actionable information. are easier to verticalise. Going by that, BFSI,
pharmaceuticals and telcos obviously look
like hot segments. However, others like retail,
How do you view the evolution and manufacturing, broking are not being left out.
efficacy of verticalised BI solutions? Economics is another key factor. Not
There are two types of verticalizations that are all solutions can be viable from a cost
happening in the BI space. One is in terms of perspective. There is a cost challenge attached
function, like balance sheet consolidation, and to verticalisation. New fields, new reports, new
the other by industry segments like healthcare laws, all need constant up-gradation and we have
and logistics. to understand how it can be technically deployed.
We could sense the requirements for balance
sheet consolidation from our customers for
quick closure of books through an error-free What are the steps that an IT manager
analytics. So, financial consolidation is an area needs to undertake before selecting a
that is seeing a lot of knitted BI solutions. Due BI solution?

20 IT NEXT | A U G U S T 2 0 1 0
COVER STORY

Are the gains that accrue from BI


match up to the costs and pain of
implementation?
Budget cuts have been limiting long-
range thinking, requiring that new
projects provide extremely short-
term value. Yet, organisations can’t
lose sight of driving value over time.
Customers are opting for lightweight
BI solutions that are easy to install,
easy to use and which leverage existing
IT investments and data sources. Also,
they do not want to leave anybody out
– ensuring everyone has the metrics
they need to make competent, fact-
based decisions.

What are the top three challenges


in BI implementation and how they
can be addressed?
Cross organizational collaboration:
Data integration with multiple source
systems is still one of the biggest chal-
lenges. BI is has the potential to deliver
enormous payback, but demands
unprecedented collaboration. Where BI
is concerned, collaboration is not limited
to departments within the organisation;
it requires integration of knowledge
about customers, competition, market
conditions, vendors, partners, products
Keep in mind: the goal is not to find overall BI applications roadmap that and employees at all levels.
the “best tool” but to find the “best fit.” specifies the type of BI applications to Implementation time-lines:
Every BI tool has its sweet spot. If you be built and when. The architecture Customers no longer like to wait for
deploy the tool outside its sweet spot, (both infrastructure and information) a complete BI implementation to be
you will see its weaknesses. A BI solu- needs to be able to evolve over time rolled out and see its benefits after a
tion must integrate and align to deliver to meet the new applications and year or so. They want instant access to
maximum business value. changing business requirements. The the reporting analysis from their data
Most BI projects and applications tools need to be able to support and within few days of the signup.
are motivated by a desire to derive adapt to that evolution. Foreseeing the real RoI: BI
more value from existing IT implementations fail because they are
infrastructure and applications. The sold to IT departments and not to the
selection of data integration and BI How big is the issue of integrating business users.
tools should complement and leverage the BI solution with other apps?
these investments as much as possible. We have seen customers asking for
It is therefore necessary to define a BI real-time reporting rather than waiting What are biggest trends that you
architecture and vision to complement for big bang data warehouse modelling see in BI at the moment?
the existing IT infrastructure. This where this issue of data integration was We see embedding of BI within appli-
means considering the issues of a concern. As the business is chang- cation as one of the biggest growth
scalability, usability, security and ing very quickly, near-enough is good areas. We are also looking forward to
metadata from an overall system enough for business users. They expect new technology wave of Rich Internet
perspective and not just from a stand- quick reporting and analytics rather Applications (RIA) based BI. This kind
alone tool perspective. than wait for large data warehouse to of intuitive GUI was never experienced
Likewise, it’s important to have an get ready and then use the same. before by business users.

A U G U S T 2 0 1 0 | IT NEXT 21
INSIGHT | CLOUD COMPUTING

CLO U
As cloud computing continues to
roll over the landscape, many enter-
prise IT organisations still struggle
to resolve questions about its secu-
rity, reliability and resiliency. These
questions come up regardless of
whether companies are considering
a public or private cloud. Enterprise
IT leaders are examining the risks,
benefits and issues of this approach,
but many feel their judgment is still
too cloudy to make the leap. Discus-
sions at the industry group SHARE,
IT professionals voice concerns about
performance, availability, security,
resiliency and usage accounting.
  Cloud computing is a way of
delivering IT services and resources
PHOTO GRAPHY: JAYAN K NARAYANAN

over the web, using rapid, self-service


I MAGING : SANTOS H KUSHWAHA

provisioning, while insulating the


user of the services or resources from
the management of the underlying IT
infrastructure. In other words, as a
consumer of IT resources, you can focus
on using the resources, rather than
managing them. So, you don’t have to

24 IT NEXT | A U G U S T 2 0 1 0
CLOUD COMPUTING | INSIGHT

O UD? YES
WITH RIDERS
INVOLVED There are clear benefits to using the cloud
model to facilitate the rapid availability of IT
resources, but it’s not for every enterprise
BY R AY M O N D J. SUN

go through the hassles of procuring and Underlying the cloud computing vides a private cloud specifically for one
implementing hardware and software model is the notion of automation, which company. Examples of a public cloud
to use IT resources. enables self-service provisioning, high include Amazon EC2 (Elastic Compute
  The benefits of cloud computing scalability, elasticity and ease of “return” Cloud), Google AppEngine, IBM’s Blue
for enterprise IT are pretty when no longer needed. This model has Cloud and Microsoft Azure. A public
straightforward and well-documented. been associated with virtualisation, cloud allows customers to create their
One of many benefits is that the cloud since virtualisation is typically required own images, and they pay only for their
greatly reduces the time to market for to dynamically provision IT services or hourly use, including data storage and
developing new software applications. resources. However, cloud computing transfers. While a public cloud offers
That results from the significant adds the capabilities of user self-service the ultimate in convenience, a private
reduction in IT resource acquisition request of services and automatic cloud seems to provide better control
time—in many cases, from weeks to fulfillment based on those requests. and assurance of security and privacy.
minutes. In addition, if enterprise IT Potential uses range from short-term  Regardless of which approach an
organisations are using a public cloud development, or test projects, to dynamic IT organisation takes, enterprises
approach, they have to pay only for incremental capacity for mission-critical, t h at de p l oy m i s s i o n- c r i t i c a l
what they use, without committing customer-facing web sites.  applications want assurances of
to a long-term relationship. When a reasonable system responsiveness
project is completed, the IT resources Public or Private? through service-level agreements.
PHOTO GRAPHY: JAYAN K NARAYANAN

are returned to the pool for reuse or The two primary types of cloud deploy- They also want protection through
reallocation. That means companies ment have been called “public” and “pri- data isolation in a multi-tenant
don’t have to make capital expenditures vate.” A public cloud refers to shared environment, fail over protection
to purchase their own IT resources, IT services or resources (a multi-tenant to minimise service outages and
which would have to be repurposed environment) obtained from a third- predictable recharge rates. Portability is
once the initial project was completed party service provider, while a private also an issue. For example, public cloud
in order to continue justifying that cloud is usually owned and managed in- users want to know if they can easily
capital expenditure. house. In some cases, a third party pro- change providers.

A U G U S T 2 0 1 0 | IT NEXT 25
INSIGHT | CLOUD COMPUTING

What about software licences? Can The public cloud offers pay per use, the private cloud is to provide test
they be moved from one cloud provider which can provide low-cost options and development environments for
to another? for short-term projects. Still, for long- enterprise applications.
  Another area of concern: When term use, enterprise IT organisations Developers are able to request resources
an enterprise IT organisation is done may be better off making a capital and almost immediately get access to an
with its public cloud environment, investment to purchase additional environment on which to build and test
what assurance does it have that all hardware and software. their applications. When the development
the private data that was used has Enterprises need to conduct a break- is complete, the resources can be returned
been removed? even analysis to determine whether a for use by others.
Data privacy is a critical concern public or private cloud would be more While cloud computing insulates
that requires tight standards. since IT cost-effective for them. The public cloud the IT user from the management of
organisations pay only for what they use. offers benefits for application development the infrastructure, someone still has
There aren’t any facility or energy costs. resulting from rapid acquisition time and to manage the IT resources. Private
But that still leaves concerns about reduced capital expenditures. clouds clearly have a major impact on IT
public cloud security, resilience and But for high-availability, data security departments, since these organisations
service. The public cloud does offer and privacy reasons, enterprise IT will need to provide clouds with
security, but it’s still not clear to many organisations remain skeptical about additional capabilities to handle
enterprise IT organisations whether turning to the public cloud for mission- dynamic provisioning and automated
the level of security offered will meet critical applications, and for sensitive or request processes.
the needs of corporations that are confidential data.  Those requests for service will be
handled automatically without the
IT organisation’s intervention. Thus,

ENTERPRISES NEED TO CONDUCT A


monitoring and balancing workloads
will need to be an ongoing focus.

BREAK-EVEN ANALYSIS TO Head in the cloud


DETERMINE WHETHER A CLOUD Cloud computing is still an emerg-

WOULD BE MORE COST-EFFECTIVE


ing capability, and many enterprise IT
organisations are just starting to poke
their heads in the cloud. For many, there
are more questions than answers. That’s
notoriously protective of their data, Going Private why we continue to examine some of the
including credit card numbers and Many corporations are looking to ben- early cloud implementations and look
medical records. efit from cloud computing. However, to develop much-needed requirements
Convincing corporate security since a number of them are concerned for IT providers, as well as best prac-
management that data stored with about availability and security issues, tices for managing cloud environments.
a third party is safe remains a they are looking to private clouds, which The enterprise IT community is evalu-
significant challenge, and there is also provide an ideal situation for enter- ating emerging cloud computing con-
the question of liability if any data is prise servers and mainframes. These cerns regarding service levels, the best
compromised. environments are known for flexibility, workloads, disaster recovery, help
 Reliability is another major issue. scalability, security and high utilisation, desks, change-control issues, approval
Public cloud providers offer reliable as well as for optimising delivery of IT and audit issues, and the management
environments in which replacement resources to mixed workloads. of rapidly changing environments.
instances can be created, but is that  These companies have enterprise IT There are some very down-to-earth
good enough? expertise and experience that can create benefits to using the cloud model
What about data and transactions dynamic virtualised environments that to facilitate rapid availability of IT
in flight? Do partially completed are ideally situated for success in the resources, whether public or private.
transactions get backed out? private cloud model. What is necessary now is a way to
Enterprise IT typically has disaster- The combination of skilled staff and document the needs of enterprise IT
recovery sites to take over operations if attractive software pricing models for managers to make both public and
there is an event at their primary site, virtual systems on enterprise servers private cloud computing more secure,
and significant effort is expended to provides an appealing setting that reliable, resilient and suitable for
ensure the integrity of transactions. serves as an inexpensive, value-added mission-critical uses.
And, of course, the price of cloud host for private cloud offerings. Create that, and they will be nothing
computing is a key issue. The most common initial use for but blue skies ahead.

26 IT NEXT | A U G U S T 2 0 1 0
4 Edu Tech December 2009
INSIGHT | CLOUD COMPUTING

IS IT
RAIN OR A
DRIZZLE?
Will cloud computing decimate internal IT?
Is it worth losing your sleep over its rise?
BY P R AT I M A H A R I G U N A N I

 The thing about underdogs is, well, they seemingly petite things. Anyone who does
are still dogs, and everyone likes them to win. so has yet not been bitten by a mosquito.
From the pages of The Godfather to the There’s more than just a mosquito
blind alleys of politics; from the vuvuzela- somewhere disturbing the sleep
I LLUSTRATIO N: SANTO SH KUSHWAHA

drowned battles to a corporate tug-of-war; of some men nowadays. And this


you will find them everywhere. is a breed of men who won’t let an
Crawling upwards silently, tip-toeing underdog shadow their power, or
in the stranglehold of their prey, and shall we say, ‘cloud’ their power?
shadowing its might while it snoozes Ever since, the ‘IT Doesn’t Matter’
unaware; the underdog usurps it all. author Nicholas Carr, made another
May be that’s why the wise men know new, big stir that needs absolutely no
that one should never underestimate small, introduction in CIO bastions today;

28 IT NEXT | A U G U S T 2 0 1 0
CLOUD COMPUTING | INSIGHT

insomnia has become more than Now on that, Carr’s theories have the industry is driven by supply and
Enrique’s copyright. some intellectual company. Another demand as it should be in a free market.
And why not? maverick thinker, who has been vocal But, as Massa would underline here,
Hardly a few budgets old, the ‘cloud’ against the likes of Google, takes the while it is true the cost of bandwidth and
phenomenon has made more noise and same drift when it comes to cloud storage is dropping, the resources required
more impact than any other new kid computing power as a nemesis, albeit to handle the amount of data we’re talking
who ever arrived. What is more, this in his own ways and arguments. about is still a huge barrier to entry of all but
kid has all the power and prognosis to “Of course, to a guy like me, that just those with the deepest of pockets.
elbow out the boys who have always run means an opportunity to start another “There is no question that in the
the show, so far. niche service.” He quips first. coming months there are going to be
So far! Now that’s the operative word. But ask Bob Massa, and there is more mergers, acquisitions, takeovers and
The argument that cloud’s advent can
hurt or challenge the very existence of
internal IT departments has naturally
started ‘hurting some brains.’ HARDLY A FEW BUDGETS OLD,
It’s not just applications any more.
The wave is touching networks, server
‘CLOUD’ HAS MADE MORE NOISE AND
provisioning, infrastructure monitoring IMPACT THAN ANY OTHER NEW KID
and management, and what not. The
interesting part is that there is no sign THAT EVER ARRIVED
of it sucking back.
The way it has arrived and
announced itself – cloud computing, to the argument, as you discover. buyouts.” In his incisive glance into the
certainly signifies a fundamental shift Massa is a mind and a voice that will future, Bob Massa, opens another volley
in the role of IT in the way it removes go into the annals of history for more of questions.
from IT much of its mundane chores. than his coup d’etat of suing Google “What effect is cloud computing
Ok! But why the heck were we talking some years back. His polemic, bold and going to have on privacy, intellectual
about insomnia? candid wisdom continues to challenge property rights, open source
Here’s why. perceptions again, when the word agreements, software licensing, and
The worry mercury was initiated ‘cloud’ pops up. so on?”
dramatically by Nicholas Carr, who “As for Mr. Carr, as much as I like to There could be more to be alarmed
augured the rise of utility computing in think of myself as an optimist, I’m afraid about if what he prognosticates
his second book, ‘The Big Switch.’ I tend to agree with his rather dark comes true.
His argument that stirred many a vision of IT and how it is going to affect With everything on the cloud, there
media pages, is, “IT would abandon business,” he opines. is no guarantee that your competitor
running their own IT infrastructures.” “Once computing becomes a utility won’t have your source code in his
What does that mean? and the collective sum of ‘data’ is stored back pocket tomorrow. There may be
Simple—one may no longer need the within the cloud and becomes available many a cost associated with all that
IT firemen or plumbers to keep things to all but controlled by a few, then I can cheap bandwidth, storage and access
up and running because someone certainly see where Carr may have a very to everything.
‘on-call’ is going to do to it much easily, valid point. I know from experience that “Where’s your competitive advantage
much cheaper and much faster. IT aka technological advances run far ahead of when ‘everyone’ has access to the same
your pizza delivery boy, could capsize the ability of any country’s legal system everything too?” He serves you a ‘too big
the traditional hulks, if the hypothesis to keep up,” explains Massa. to chew’ question here.
is interpreted right. Now that raises the quintessential
question again. Scared yet?
Teddy bear or bug bear? Can cloud computing have enough As is clear by now, cloud computing is
So, while almost every vendor and potential (or promise) to sideline influencing a lot of intelligent debate.
lighthouse customer is giving it the erstwhile IT functions handled At the same time, it has also started
bear hug, is cloud computing strong internally? When and where will impacting IT budgets and decisions in
enough to arrogate the power and internal IT be indispensable, cloud or a significant way. Yet, is there a negative
functions of traditional IT? Does it no cloud? fine-print in this ballyhoo? How should
not raise worries on new redundancy At the moment, there are several internal IT engines of an enterprise
spots, and thus a threat to internal  companies jumping into the cloud game interpret it? Cause for worry for IT
IT teams? and there is choice and competition as managers already?

A U G U S T 2 0 1 0 | IT NEXT 29
INSIGHT | CLOUD COMPUTING

80
Bhavin Patel, Head IT, Fortis organisations that are actively engaging
Emergency Services feels that cloud will external cloud services are using them
certainly have a big edge for smaller firms. for non-business critical applications,
“You have to understand that they particularly as a means to better
clearly lack the basic expertise of
handling all the processes related to IT,
for instance, administrative services.
accommodate workloads that are highly
variable in nature.
For instance, a suitable area is R&D
%
Even today, over 80% of Indian SME testing, where needs are periodic and
firms do not have any IT department dedicated infrastructure often sits idle
and that’s a large number.” a significant majority of the time, while of Indian SME
What, however, does matter for continuing to require the same level of
any organisation is to plan things in upkeep and administration as more fully firms do not
advance and have a clear roadmap of utilised infrastructure. Smaller companies have any IT
the core requirement and scalability, are looking to external cloud providers for
he advises. “Since it’s just the starting such services, while many larger companies
department
phase of commercial deployment of are using R&D as a pilot for testing internal in India
cloud computing, we need to explore private cloud approaches.
many options to get the picture right.”
Before you pack up towards service-oriented practices,
Over-stated threat If data and trends from the likes of plus much greater leverage for
It could yet be too insignificant or too Gartner show it right, cloud comput- smaller organisations seeking access
early a threat to worry about. ing is slated to grab more adoption to the same enabling technologies
The advent of cloud computing horsepower ahead. Amongst the latest that could otherwise only be reached
represents neither threat nor boon reports, worldwide software as a service by larger organisations.”
to IT as a whole – it is merely a (SaaS) revenue within the enterprise Agreed. Writing an obit could
natural evolutionary step in application software market is fore- be blowing the argument out of
the IT industry, argues a cast to surpass $8.5 billion in 2010, up proportions, especially when IT men
research eye. 14.1% from 2009 revenue of $7.5 billion, have a logical defence.
As with any according to Gartner. “In my opinion what is critical
change, there will be Enterprises are loving the is security—prevention of data and
information leakage. Everything what
your company is doing, all that data
ACCORDING TO EXPERTS resides with the other party. IT team
is more relevant if one is relying on an
THE ADVENT OF CLOUD COMPUTING internal cloud,” Patel points out.

REPRESENTS NEITHER THREAT NOR It is tempting to ask if cloud will be


big enough in the near future to make
BOON TO IT AS A WHOLE – IT IS in-house IT management a history, but
there may not be much of an actual
MERELY A NATURAL EVOLUTIONARY apprehension. Cloud will not find it

STEP IN THE IT INDUSTRY easy to sideline and muscle in, when it


comes to ‘roots’ of IT—the core.
What the cloud blitzkrieg will likely
do is to raise the bar a little up. For those
some ‘losers’–either a reclassification transition to the utility-model, at least who don’t re-orient and re-align their
of personnel and internal IT assets some of them, strongly enough. And ‘indispensability,’ a dark horse is not
or administrative staff reduction as maybe there’s some silver lining we always a pleasant surprise.
cloud services replace traditional are missing yet. Forget horses, underdogs and
infrastructure, as Jim Frey, Research So, will cloud computing just disrupt mosquitoes, it’s always handy to
Director, Enterprise Management IT or decimate it? Could it be a blessing remember that…no one suspects 
Associates. (EMA) sees it. in disguise in any way, say a strategic a butterfly.
“In my view, this will be much less reorientation?
disruptive to personnel than the large-scale There is indeed a plus side, as EMA’s
Find similar stories online
outsourcing wave of the past,” he says. Frey illustrates. on the website
EMA’s research indicates that “It represents positive movement www.itnext.in/Insight

30 IT NEXT | A U G U S T 2 0 1 0
4 Edu Tech December 2009
INSIGHT | DATA DEDUPLICATION

doing
more
with less

Data de-duplication is not just about


saving capacity; it’s also about improving
the performance of storage systems
BY JAT I N D E R S I N G H
PHOTO GRAPHY: JAYAN K NARAYANAN

In the age of shrinking IT budgets, and rising data volumes, finding an ideal
way to manage data in an organisation is seen as a challenging task for many IT
managers. Data redundancy makes it worse. While the issues related to storage
efficiencies are continuously discussed and debated, not much attention is paid
to address the issues surrounding to data redundancy.

32 IT NEXT | A U G U S T 2 0 1 0
DATA DEDUPLICATION | INSIGHT

Driven by the rising use of rich enterprise storage and backup systems,
media and e-mail applications and the same file may get copied in 10
given that policies favour storage at locations, occupying a 10MB space, a
more than one place, unstructured redundancy that is of no use.
data in organisations is witnessing an Now by allowing the run of
astounding growth today. According deduplication process, the duplicate
to a recent report released by IDC, data is deleted, leaving only one copy
unstructured data in traditional data of the data to be stored, leaving more
centres will eclipse the growth of storage space more for you. It essentially
transaction-based data that has so far does three things-redundancy
accounted for the bulk of enterprise identification, fingerprinting and
storage needs. The report further redundancy elimination.
projects that the transactional data will “Data de-duplication helps IT
see a compound annual growth rate
(CAGR) of 21.8%, while unstructured
“YOUR DATA IS OF NO managers to utilise disk archiving
platforms, which means increased
data will grow at 61.7% at data centres. USE, IF ITS QUALITY storage capacity at any given time,”
Moreover, the critical data is estimated IS HAMPERED. says Gaurav Kohli, Consultant, Xebia
to see 52% growth annually.
This situation has eventually
DATA QUALITY IS A IT Services.
For optimum usage, De-duplication
asked for an increased effort from IT PROCESS RATHER hash calculations are created on the
departments of the organisation to THAN AN EVENT” target device as the data enters the
minimise the total amount of storage —Ashit Panjwani, Executive device, in real time. If the device spots
and network bandwidth required, Director- Sales, Marketing and a block that it already stored on the
and to improve availability and lower Alliances, SAS India system it does not store the new block
the total cost of ownership (TCO) in and instead just references to the
terms of hardware, administration, and existing block.
environmental costs. "Regardless of the operating system,
And that’s where tools like data applications, or the file system, all
de-duplication comes to the rescue. data is written to storage by using

61.7%
Often referred to as a cost-effective data reference pointers. After that,
information management tool, the the catalogue and indices of all data
technology helps enterprises to address objects are maintained using hash
the pressing IT challenges related to and a comparison between the two
effective usage of storage. data objects is made.” explains Suresh
Kakkar, Practice Manager, Wipro.
Smart storage CAGR is the growth
“Moreover, if you are still using
In simple terms, data de-dupli- tape as an alternate backup medium,
cation, also called intelligent com- of unstructured data in the technology will help you to make
pression, refers to the elimination of data centres smaller backup windows, which
redundant data. It plays a role of a cat- Source: IDC means relatively lesser tapes. This
alyst in controlling storage costs and not only saves costs, but also eases
helping enterprises to simplify opera- manageability,” Kohli notes.
tions and better manage workloads at
Quality of data

80%
remote offices, virtual machines, and
Up to
data centres. By elminating the need Apart from storage costs, duplication of
for additional hardware, it brings with data also causes issues such as higher
it economic benefits as well. bandwidth requirement for data recov-
Let's understand how de-dup can solve ery (DR) implementation and delayed
the puzzle of umpteen amount of growing backups. It also impacts manageability
data that gets stored in an organisation. of data.
Consider this: a marketing manager of the data within “Management of data is perhaps
sends out a 1MB presentation to each an organisation is the most intimidating challenge that
member of his sales team, thereby unstructured IT organisations face. They must
making the same presentation available keep important information available
Source: Global Data Deduplication
to 5-10 different mailboxes. Now, on the Market 2009-2013 and protected, even as the amount of

A U G U S T 2 0 1 0 | IT NEXT 33
INSIGHT | DATA DEDUPLICATION

data grows at rapid pace,” says Vijay


Mhaskar, Vice President, Information
Management Group, Symantec India.
According to Shailesh Joshi, Head
IT, Godrej Properties, “With increasing
importance of compliance, digitisation
NEED
of corporate assets has gained
n Relentless data growth
tremendous importance. Moreover,
given the kind of market dynamics n High management cost
involved in storage
we have, high availability of data is of
prime importance.” n Huge backup and missed
More importantly, while most of us backups
will agree that the benefits of information n Growing virtualisation
as an asset are huge, one should not demands
forget that, if misrepresented, the same n Statuary requirements
information could easily transform into like high data retention
a serious liability for an organisation. period
To understand this, let’s consider
a situation where a telecom operator
sends promos pertaining to the new
value added services (VAS) services it
has launched, via text messages or e-mail
to its premium customers. However,
due to some transmission errors it ends
up sending out the same information
twice to some of its consumers. Worse,
some of those consumers had opted
for a do-not-disturb (DND) service a
few months ago. Expectedly, a series of
consumer complaints follow, and some
subscribers even threaten to switch to
another operator.
The key reason which resulted in
the given problem was the duplication
of data, which prompted the automatic
systems to send the mailers twice, or
thrice, to the same address.
Similarly, let’s take another example
of a household where every member of
the family takes the banking services
from a single bank. In this case, where
the bank has a household account, “WITH INCREASING “BY LOOKING AT THE
sending the same marketing mailer or
a call to each family member separately
IMPORTANCE OF AREAS WHERE ONE
does not entail a good logic. Therefore COMPLIANCE, CAN BENEFIT FROM
it is extremely important to put filters DIGITISATION DE-DUPLICATION,
which should resist marketers to send
repetitive messages, thereby wasting of
OF CORPORATE IT MANAGERS CAN
time of consumer. ASSETS HAS GAINED TAKE THE RIGHT
Says Ashit Panjwani, Executive TREMENDOUS DECISION”
Director-Sales, Marketing and
Alliances, SAS India, “Your data is
IMPORTANCE” —Vijay Mhaskar, Vice President,
—Shailesh Joshi, Head IT, Godrej Information Management Group,
absolutely of no use, if its quality is Symantec India
Properties
hampered. Data quality is a process
rather than an event. Both organisations

34 IT NEXT | A U G U S T 2 0 1 0
DATA DEDUPLICATION | INSIGHT

BENEFITS
n  educes administrative costs and
R
lower disk costs
n Provides backup optimisation
n
OUTCOME
Improves the percentage of
n  elps to achieve green efficiencies
H
by reducing power, space and cooling data being backed up
needs n Storage that could be
n I mproves RTO and reliability, hence redeployed for backup de-
optimise for recovery duplication

n  nables and expands remote


E n Savings that would be
replication option realised if, say 50%, of
tapes were eliminated
n  liminates 80% of tape costs and
E
fends off the need to invest in n Removes any major
virtual tape libraries discrepancy in the quality
of data

and the IT managers need to generate Before implementing, however, should watch out for.
intelligent strategies for maintaining one should try to measure the overall It is important to note that de-dupli-
its productivity in a consistent manner. requirement. For example, one could cation, as it changes the data layout on
Over 70% of data is still unstructured estimate the percentage of data being the disk, can affect the performance of
and data duplication is a major concern backed up currently and the savings sequential read applications.
area for organisations.” that would be achieved if 50% of tapes Another critical factor is to identify
were eliminated. the location where the software
Strategy De-duplication Today, there are solutions offering a agent need to put the controls which
For any IT manager who want to carry combination of both source and target deduplicate the process? While in few
out data de-duplication, the first step de-duplication to achieve even greater cases, it is advisable to put the agents
is to be aware of what exactly can a de- storage savings and ROI. at the source, thereby allowing each
duplication solution do for the organi- For instance, a scalable data reduction and every server to take the backup,
sation? The next step is to identify what (SDR) based de-duplication solution many other instances demand real
the solution can do beyond just elimi- would offer fast and efficient data backup appliance.
nating the redundant data? And finally, snapshot capabilities.   The snapshots The methods can be workout depending
what can be the additional benefits can later be used to access information upon the IT policies and server inside the
that might bring the strategic value for that may have been inadvertently business entity. While many vendors like
the organisation? deleted from an active volume. These CA offer backup solution that work in both
So the strategic value lies in snapshots can be used for versioning, the locations, many others are incapable to
understanding the other benefits being for compliance purposes (to prove provide such solutions.Also, selecting the
accrued. This includes benefits such the state of data at a specific point in way that a deduplication apliance appear
as bandwidth savings, faster backups, time), and as a fast and efficient data to the backup software application is
backup consolidation, and easier restoration mechanism for recovering very critical.
disaster recovery, depending on where any inadvertently deleted information. The selection should be hence
and how it is used. The heavier-duty solutions can based on the backup software which
“By looking at all the ways and de-duplicate data globally and at the an organisation is already having.
areas where one can benefit from source for fast, secure backup and Nevertheless, make sure to look for
de-duplication, IT managers can take recovery across the enterprise including vendors who have specialised skills
the right decision on where to begin remote environments. to understand your business and its
using this powerful technology,” says Having said that, there are also a few specialised storage requirements in the
Mhaskar of Symantec India. downsides to de-duplication that one long run.

A U G U S T 2 0 1 0 | IT NEXT 35
INSIGHT | VIRTUALISATION

VMware vSphere 4.1


LEADS
THE PACK
IT managers should ensure that the
new memory management, storage and
network control features of vSphere
4.1 lead to improved host utilisation and
REVIE
W automated scale from the VM systems.
BY C A M E R O N ST U R D E VA N T

VMware vSphere 4.1 continues to lead the


enterprise virtual machine platform pack. New
memory management, storage and network con-
trol features enable resource pool creation that
improves scale while reducing performance
drags. Virtual machine management gains
increased importance in the vSphere 4.1 plat-
form, and IT managers should plan to have their
virtualisation experts devote themselves full
time to studying these new features to ensure
that they lead to improved host utilisation and
automated scale from the VM systems.
  During tests at eWEEK Labs, I learned that
vCenter 4.1—the command and control module of the
VMware virtual infrastructure world—is now 64-bit
only. As part of the move to vSphere 4.1, IT managers
should build in extra planning and migration time to
A vNetwork Distributed Switch can now assign priority to a variety of move any vCenter 4.0 or older servers to systems that
traffic types. are running a 64-bit operating system.

36 IT NEXT | A U G U S T 2 0 1 0
VIRTUALISATION | INSIGHT

controls, the implementation of the feature is quite


simple. Entering the parameter changes to enable
the feature and set the specific physical network
adapter shares is simply a matter of walking
through a couple of configuration screens that are
easily accessed from the vSphere client. I was able
to assign a low, medium, normal, high or custom
setting that designated the number of network on
an iSCSI-connected storage array. It also works on
Fibre Channel-connected storage, but not on NFS
or Raw Device Mapping storage.
  Virtual machines can be limited based on
IOPS (I/O operations per second) or MB per
second. In either case, I used storage I/O controls
to limit some virtual machines in order to give
others priority. I found that the large number of
vSphere 4.1 now adds a method to compress memory pages to reduce considerations—for example, each virtual disk
swapping and improve performance. associated with each VM must be placed under
control for the limit to be enforced—meant that
I spent a great deal of time figuring policy to get
  The payoff for the vCenter transition is a a modest amount of benefit when my systems
substantial increase in the number of VMs per were running.
cluster and the number of physical hosts that
each vCenter can handle. I was not able to test 3,000 Memory innovation

VMs
the posted limits due to hardware constraints. VMware included a handy memory innovation
However, VMware states that the latest version in vSphere 4.1 called “memory compression.”
of vCenter can handle 3,000 VMs in a cluster and up to 1,000 IT managers should become familiar with
and up to 1,000 hosts per vCenter server. hosts per the feature as it is enabled by default. In my
 Both of these large numbers are a threefold vCenter server tests, I saw improvements in virtual machine
increase over the stated capacity of VMware can be handled performance after I artificially constrained the
vSphere 4.0. Aside from the sizable scale increase by the latest amount of physical host memory. As my virtual
enabled in this version of vSphere 4.1, the main version of v machine systems started to access memory
advances in the platform are evolutionary Center to handle test workloads, my EXS 4.1 system
extensions of capabilities that improve how the started to compress virtual memory pages and
platform handles VM resource contention. stored them in a compressed memory cache.
 During tests, I used the new I/O controls in  Since accessing this memory is significantly
networking and storage to govern resource use. faster than swapping memory pages to disk,
IT managers who are already accustomed the virtual machines ran much faster with this
to using resource controls in VM CPU feature than they did when it was disabled and
settings will have a leg up when it comes to the same workloads were started. IT managers
using I/O controls in both network and storage should expect to devote at least several weeks
areas. Even with the CPU control heritage, my of expert analysis to determine the most
use of network and storage control features effective memory compression configuration
revealed a fair number of “version 1” limitations. for each workload.
Network I/O control prioritises network traffic VMware did some housekeeping in the
by type when using network resource pools incremental release of vSphere. The vSphere
and the native VMware vNetwork Distributed client is still available in the vCenter 4.1
Switch. Network I/O control works only with installation bits, but it is no longer included
the 4.1 version of the vNetwork Distributed in the ESX and ESXi code. There also were
Switch—not with the Cisco Nexus V1000 or some minor changes made to various interface
the standard switch from VMware.  screens, but there was nothing that would puzzle
an experienced IT administrator.
Implementation is simple Find similar stories
online on the
While it takes advanced network expertise to website
www.itnext.in/ Cameron Sturdevant is technical director for eweek labs,
design and tune the policy that runs network I/O Insight and can be reached at csturdevant@eweek.com. ©eWeek

A U G U S T 2 0 1 0 | IT NEXT 37
INTERVIEW | JIM WHITEHURST

38 IT NEXT | A U G U S T 2 0 1 0
JIM WHITEHURST | INTERVIEW

“CONSUMERS
WILL DRIVE THE
TECH AGENDA”
Jim Whitehurst, President and CEO, Red Hat, in a conversation
with Geetaj Channana, says that technology vendors must listen to
customers and not only sell products

Have the platform Yes, because I do not think cloud 1. They want to pay for what
wars, like the ones is a product that a vendor brings they use, and when they use it –
between Windows and to the table. My view of cloud, they don’t like the model where
Linux, turned into service the way customers say cloud, they buy all the software, and the
oriented wars? and what they really mean, is hardware, and take risks.
I think that platform wars are a modern layered architecture, 2. They want a layered modular
moving more towards a stack war. where you have a choice of architecture which allows them to
People are now looking for holis- those various layers and appli- move their applications and run it
tic environments to build and run cation development capabilities where it is best.
applications. For most companies that delivers rich quick appli- 3. Richer, better and faster
it is not about choosing between cation development. By defini- application development experience.
Unix or Linux, or Windows — it’s tion, you cannot have cloud in a People hear the hype and they
all about the platform on which box. So, I do think there is a bit think that it is cloud – which
developers will be developing of an over-simplification. does not necessarily mean
— that’s changing. With Red cloud. And cloud done wrong
Hat we have always been oper- Is there a disconnect actually makes these problems
ating system centric, but now between what people are worse. I think that is where the
we have to think about rea- asking for and what is disconnect is, because when
sonable well-integrated infra- being delivered? people say ‘cloud’ we literally
PHOTO GRAPHY: JI TE N GANDHI

structure components. Absolutely. Most IT heads are not take it as an off-premise solution
ready to move their applications to run functionality. I think that’s
Would you agree that outside of their data centre. There a mistake, and is not really what
vendors like you, Microsoft, is so much hype around cloud; the customer is asking for.
Amazon and Google, are people are saying different things.
trying to oversimplify the But, when I go to IT heads, I hear You have said in your past
cloud in some manner? three things – interviews that PCs would die

A U G U S T 2 0 1 0 | IT NEXT 39
INTERVIEW | JIM WHITEHURST

in the future – why and how?


PCs will exist, but they will be a
minority among devices because
of the explosion of the mobile. By
‘mobile’ I refer to mobile devices
and mobile broadband that have
changed radically the way we
interact with technology. The
iPhone, iPad, Android, the expe-
riences are getting richer.
The way we see the PC, may
exist on some desktops, but in
terms of computing devices,
it’s going to have a smaller
share everyday.

Earlier the enterprise drove


consumer technology
– now, do you think the
consumer is affecting the
enterprise more?
Oh yes! When I talk to IT heads
around the world, I hear over
and over again that they are
being forced to support con-
sumerist things like software as
“THE PROGRAMMING
a service or devices. And, they
have to do it, because everybody
MODEL BEING USED IN-
is demanding it. SIDE LARGE CORPORA-
People are going to blog and
they are going to tweet, whether implementation and spend years TIONS HAS TO CHANGE.
you like it or not. So, CIOs have spec-ing it and coding it - then
had to set policies to help people many years later you introduce a IT IS AS MUCH BEHAV-
connect their personal devices. I
do think that it is a very different
new product.
IOURS AS IT IS UNDER-
world where innovation is being
led by certain Web 2.0 type
Would you say the role of an
IT head in an organisation
LYING TECHNOLOGY”
companies and they are setting has changed from being a
the pace for IT. And, it really puts guardian of technology to an from keeping the lights on to focus
a lot of pressure on the CIO, not enabler of business? on strategic parts of the business.
only to support these devices and I think that the role of the IT head But IT drives business – it
applications, but also puts a lot of needs to change really to be an is a core of operation for many
pressure on the expectation levels enabler of the business, but, I’ll be businesses, and presents new
of what they should deliver. frank - half of them are still strug- opportunities, but in a day-to-
I would also like to talk about gling to keep the lights on, keeping day operation, the IT head is
the death of version 2.0. There is close to the budget, and just surviv- more concerned about how to
no Google Docs 2.0 or 3.0, there ing - that they are not playing the keep their e-mail server running,
is just rapid innovation that is role that they need to play. When or how to keep their ERP going -
adding feature and functionality. 80% of your costs are lights on, then things like that.
The whole programming model you are always concerned about That is why we see an interest
that is being used inside of large how you can keep those costs down. in the cloud because of the
corporations has to change. And, Most IT heads need and want Find other inter- frustration with what they have,
views online on
that is as much behaviour as it to be strategic, but are completely the website and what they have to maintain.
is underlying technology. The hampered by their IT infrastructure. www.itnext. They think that “if I could source
in/resources/
usual way was to plan a new They have no time left whatsoever interviews it from somewhere else, from this

40 IT NEXT | A U G U S T 2 0 1 0
JIM WHITEHURST | INTERVIEW

miracle light shining on top of that hill, – this is why there is going to be a valley prise Linux (REL) and they support
it would make life so much easier. of discontent. REL on Windows. It’s an interesting
set of relationships, and it is really
But are people really doing that; You entered pretty late into important. The key to the next genera-
shoving the old things out of the virtualisation space. How do tion data centres is that they have to
window and investing in the cloud; you see yourself placed in the be layered. So, we are adamant that we
or are they just talking about it? market within the next three to will neither lock layers, nor provide
Oh, they are just talking about it. There five years? the alternatives that our customers
are a lot of companies that are investing We see ourselves as one of the major want at each layer. We have something
in development and testing on Ama- players. This is because going for- called ‘cloud foundation’ for that.
zon EC2 cloud, or the IBM cloud. But, ward, architecturally, virtualisation It is important for us because we
these are all development and tests, lots will be a part of the operating system. cannot come out with a cloud in a box.
of playing around. We also have some This is similar to the way 25 years ago Thus, it is about giving your customers
companies pooling in and trying to set you used to buy the TCP/IP stack for choice, at the hypervisor level, at the
up private clouds, but I would say that networking. Virtualisation is now a operating system level, at the messaging
these things are in the advanced R&D feature in the operating system, it is layer, application layer, all the way up
stage now. And, most of it is because the not a standalone layer. the stack. We call it cloud foundation
CIO’s boss, the CEO, or the CFO, is ask- VMware was the first to find the because it is foundational elements
ing them about it. market as a standalone hypervisor, that you can take and set up together.
but there are so many architectural They would help you build and manage
Whenever I talk to the IT heads they constraints to that. I think our model cloud. That does not mean that it all
are sick of listening to the cloud! is superior. We made the switch in has to be on the cloud – it could be on
This is because it is so far away from November 2009, before that we were ESX or on Windows. Quite frankly, you
really being able to deliver on the offering our version of Xen. And it cannot run ESX without buying their
components and the pain points like was painful for us to explain to our management suite. You are tied to the
flexible modular architecture, newer, large base of customers why we were layer and stack together. The problem is
faster ways to develop functionality making the change. But, it is really that as soon as you tie them together, it
and paying on what you use and when the next generation of virtualisation is very difficult to move things around
you use it. that is built into the operating system. because you have to hardcode the links.
We think that it is the cloud – but You can get the benefit of reusing the On the other hand, if you have a nice
what is really happening is that the code and security. clean layered model, you do not face
technology industry does not listen Secondly, you get the power of these problems.
to the customer – we just take the open source and Linux for hardware However, this creates a problem for
technology that we have, and shove it management. This is what we vendors, as it is difficult to make money
down the customer’s throat. So, cloud, announced with KVM. In the Fall in these models because they are unable
from an IT industry perspective has when Red Hat 6 comes out, it will to lock-in their customers. A lot of these
turned out to be a hammer, while blow away ESX, whether it is in terms spaghetti architectures keep the cash
everything else is the nail, when of performance, the number of cores registers ringing.
actually, there are screws out there. We supported, server density and other
in the IT industry need a different tool. things. And I wish I could take credit for Finally, how do you see Red
That’s what I say in Red Hat’s that, but that credit goes to Intel. Hat evolving over the next five
marketing too, if you want to pay by In five years, our virtualisation years?
the drink, we do that already with share will be roughly the same as our We are focused on defining the 21st cen-
our subscription model; you want a operating systems share. It will be tury enterprise architecture. We may
layered modular architecture, we do difficult to say the same for VMware not deliver that architecture; but we
that already. though, when Microsoft and Red Hat will deliver com[ponents of it, if not the
What we have to be careful about is both integrate virtualisation, in our whole. We are working hard to ensure
what we understand from customers on underlying operating system. that this architecture is defined by open
what they think the cloud is, and so we layers that give, customers a choice at
are delivering off-premise computing. This is a very interesting each and every layer.
Off premise could be an option in the relationship that you share with This is a hypervisor that is open
long term, but what customers are VMware – you compete with them, and inclusive, an operating system
demanding now is a solution. yet you support the same too. that can run on any hypervisor, and
This is where the disconnect is, and this Yes, it’s the same with Microsoft. We application server that can run on any
is where I refer to the Gartner hype cycle support HyperV on Red Hat Enter- operating system.

A U G U S T 2 0 1 0 | IT NEXT 41
INSIGHT | Wi- fi

SECURING the
AIRWAVES A Wi-Fi plan should be robust enough to address
security concerns and clean enough to keep
legal risks at bay
BY B E R J ES E R I C S H R O F F

42 IT NEXT | A U G U S T 2 0 1 0
Wi- fi | INSIGHT

Aren’t we all at some stage dis- tors), and the security levels of Wi-Fi advisable to rename the default
gusted to see the mesh of those wires such as authentication or encryption administrator user name. Disabling
connected to our computers? Don’t are all very important prior to even pro- the SSID broadcast i.e. your network’s
we wish we could make it clutter- curing the infrastructure. ‘name’ is a good idea and mitigates the
free by getting rid of at least some of Aspects such as thickness and risk of an attack.
the wires? Don’t we wish we could material of the outer walls and ceilings, Restricting access through MAC
connect to the Internet or access the and those of the different cabins inside address filtering will not deter a hard-
printer without those wires, securely? also play an important part in the core hacker, as MAC address spoofing is
Well, Wi-Fi lets users access the planning process. not that great a deal, but a combination
Internet and other network resources, of disabling the SSID broadcast and
without the hassles of plugging in Why is all this so restricting access through MAC address
the Ethernet cable. It offers them important? filtering, will deter most novice hackers or
convenience of moving their machines Well, let’s say that you have installed script kiddies from compromising your
around the office, without losing an access point near a window, or Wi-Fi facility. Although it’s not always
connection to the Internet or other maybe close by, which causes the sig- possible to do so, especially in large
network resources. nal to leak outside the office. A person organisations, it’s a good idea to switch
Installing a Wi-Fi LAN in the office with a laptop in the opposite building off a Wi-Fi network when not in use.
initially helps you set up the network or maybe even a floor above or below Personally, I am very uncomfortable
for a fraction of the cost, especially if your office is able to access the Inter- with DHCP and prefer using static IP
your office does not have structured
cabling. Wireless access to the Internet
at airports, restaurants and coffee shops
is all courtesy Wi-Fi.
STRONG PASSWORDS RESIST BEING
However, like most good things COMPROMISED THROUGH BRUTE
FORCE ATTACKS. DISABLING SSID
in life, Wi-Fi comes with its share of
drawbacks. These negatives appear
in the form of security risks, which
can be of various types. These could
BROADCAST FURTHER MITIGATES
compromise your confidential data,
lead to theft of bandwidth resources,
RISKS
amount to a legal action against your
organisation and in some extreme cases net using your facility. He is now going addresses, as this definitely helps as an
even land you behind bars! to ‘steal’ your bandwidth resource to added layer of security, in spite of its
Considering all these risks, is access the Internet. slight inconvenience. Ensure that your
the convenience of Wi-Fi worth it? Not much harm done here, but what router’s firewall is not disabled while on
Alternatively, can we protect ourselves if this person now uses your Internet the other hand, firewall on all desktops
and the organisation against these risks, facility through Wi-Fi, to hack into and laptops is enabled.
and at the same time take advantage of another organisation? How would you Encryption scrambles messages
the benefits Wi-Fi has to offer? ever be able to trace this person? Like sent over the air. Deploying encryption
While there cannot be complete it or not, legally, it’s your organisation technologies such as WPA2 with EAP
security, there are ways to mitigate, that is going to get penalised. Of course, authentication, TKIP/RC4 or AES-
and to an extent, circumvent some this intruder can also hack into your CCMP encryption technology, is a must
of these risks. So how should own network, thus compromising your for large organisations and depending
an organisation go about taking organisation’s confidential data. And on the nature of the business, this is
advantage of the technology and at the once again, how are you ever going to applicable to SMBs too. WEP encryption
same time, protect itself from the risks be able to trace him or her? is outdated and should be avoided at
identified above? all costs, as it can be compromised in a
Securing the matter of minutes. Also, there is nothing
IMAGI NG: SANTO SH KUSH WAHA

It all starts with installation stopping you from deploying a second


planning Let us address some technical aspects layer of encryption, for added security.
Planning the strategic location to install of securing a Wi-Fi installation in your Deploying a Remote Authentication
the access points, the strength of these organisation. Start by using strong Dial In User Service (RADIUS) server
strategically placed access points, who passwords, to prevent the likelihood for authentication, authorisation and
in the organisation can and cannot use of this being compromised through accountability should definitely not
the Wi-Fi technology (including visi- brute force attacks. Also, it’s strongly be overlooked by medium and large

A U G U S T 2 0 1 0 | IT NEXT 43
INSIGHT | Wi- fi

2
Prepare a detailed plan for Wi-Fi
installation

Ensure strong passwords are used 7 4

5
Disable SSID broadcast and restrict
access through MAC filtering

Ensure firewalls are enabled on all

REMEMBER
POINTS TO
and the default administrator user- devices, including laptops
name is changed
6 Educate your users for safe usage of
3 Deploy encryption technologies such Wi-Fi
as WPA2 with EAP authentication,
TKIP/RC4 or AES-CCMP, but avoid 7 Conduct periodic IT audits

WEP which is outdated

EDUCATING USERS ON SAFE USAGE could be an expensive proposition, and


educating users on a regular basis is

OF WI-FI WILL HELP CONTROL the cheapest and best alternative. Also,
software to ensure that at any given point
COSTS FOR DEPLOYMENT OF in time, only one network connection can

EXPENSIVE TECHNOLOGIES SUCH be present on a laptop is available. This


solution too, can address the risk.

AS JAMMERS The IT manager should, even in the


absence of Wi-Fi deployment in the
organisation, have the network audited
for rogue signals, for reasons mentioned
organisations. This will ensure that it is more important that they are above. If Wi-Fi is deployed, then apart
the user is authenticated before being aware of the risks when they are in from the security measures such as
authorised to access the network and at office, even when your organisation encryption and authentication methods
the same time, a track is kept of usage in has decided against deploying used, the audit must also include rogue
terms of time and data transferred. Wi-Fi technology and your LAN is signals leaking into the office. At the
The IT manager of an organisation a wired network. same time, audit for signals leaking
must be aware that there exists a How? Well, your laptop users may outside the organisation from your own
plethora of free downloadable software access Wi-Fi at home or at airports network should also be carried out.
on the Internet for detecting presence and when they return to office, most There are even phones under
of Wi-Fi devices and hacking Wi-Fi of the time, Wi-Fi on their laptops is development that would help
facilities or capturing and deciphering still enabled. As a result of this, they organisations to switch seamlessly
packets. The IT manager must also be will be prompted of the presence of from cellular networks to wifi networks
aware of the laws relating to Wi-Fi and any external Wi-Fi signals leaking without a call drop.
the consequences of a Wi-Fi system into your building / office. Either Be it a wireless or a wired network,
being compromised. intentionally or unintentionally, a educating users and scheduling
user may clicks ‘yes,’ to connect to this periodic audits is extremely important.
Education is key external network, which could very Educating users on safe usage of
Educating users is a very important well be from a rogue access point. In Wi-Fi could help you control costs for
aspect, which sadly gets neglected this case, without the user’s knowledge, deployment of expensive technologies
by the best of organisations. Even the hacker can compromise not only such as jammers, while periodic audits
in the absence of a Wi-Fi facility in the user’s laptop, but your entire LAN will enable you to identify the loopholes
your organisation, educating laptop security with firewalls and IDS and and plug those. Many organisations
users regarding Wi-Fi security is IPS. All your security precautions ignore these two activities and as
absolutely essential. could go for a toss. a result, end up spending more on
There are multiple dimension of If you are able to detect, or an audit technologies while also increasing the
educating them. It is important that reveals presence of rogue signals in risk of their organisation’s data being
they know about the risks involved your office building, then a solution compromised.
when using Wi-Fi in public places might be to install jammers to prevent
like coffee shops and airports and those signals from entering your The author is Manager–Information Technology,
how these risks can be mitigated, but organisation’s premise. However, this Tata Services Limited

44 IT NEXT | A U G U S T 2 0 1 0
15MINUTE
TRAINING
EDUCATION
WORKPLACE
COPING
WITH
CTS
IT Strat Social only? No More THIS PAGE
MANAGER

Golf Basics Dummies guide to golfing PAGE 50


COMPENSATION PAGE 48
WORKFORCE TRENDS Manage IT Sweat your IT assets PAGE 51
SKILLS DEVELOPMENT Training Calendar Career booster courses PAGE 52
PERSONAL DEVELOPMENT

BY P R AV I N SAVA N T

E
veryone seems to agree and
predict that social media
is the next thing to watch
out for. The numbers and
analysis seem to agree as
well. Some findings suggest that social
media is growing by 100% in India, and
that the country is the fastest growing
country on LinkedIn.
Social media is definitely a buzz
word today, and every now and then,
one comes across a reference or an
article on it in business magazines and
IT journals.

The rise and the spread


As everybody knows, social media first
gained acceptance and prominence
among individuals, particularly the
IT STRAT

SOCIAL ONLY?
youngsters. Be it Orkut or Facebook,
social media was first embraced by
individuals who recognised its power
as a platform to connect and reconnect

NO MORE
with their friends and families. Later
benefits included knowledge sharing,
recruitment referrals and of course, fun
I LLUSTRATIO N: ANO OP PC

and entertainment. Very soon, it became


a way of life. A vast population of young
individuals became very comfortable To leverage benefits of social media for
using social media.
These early adopters carried the
your organisation, the approach has to be
experience and expectations into their strategic and not just social

A U G U S T 2 0 1 0 | IT NEXT 45
15-MINUTE MANAGER

workplaces. They wished and expected


that the ease and comfort with which
they connected with their friends
on social networking sites should be
replicated when they connected with
their peers at offices. Their main point
of argument was that why should it take
more time to search for any info on the
intranet for official work.
Before long, corporates started
recognising the huge user base and
growth of this media and the buzz
started to get around on the social media
and the opportunities it presented.
HEALTHY LIVING
What are those opportunities?
The answer, unfortunately, is not
as straightforward as setting up an
COPING WITH CTS
email account or creating a Blackberry
Are you experiencing excessive pain in the
interface for it. Each social media site CTS FACTSHEET
fingers of your hands, or a strange tingling
has to be seen as a different channel. CTS IS THE #1
REPORTED MEDICAL
PROBLEM, ACCOUNT-
sensation? Are you also a heavy user of tech-
nology, spending many hours on a computer or
Opportunities at a
ING FOR ABOUT 50%
OF ALL WORK-REL ATED
a smart-phone? If your answer to both these
glance
INJURIES

PRESENTLY, 25% OF ALL


queries are in the affirmative, then you might
Media and advertising necessarily fol- COMPUTER OPERATORS
HAVE CTS
be afflicted with Carpal Tunnel Syndrome or
low consumer attention, which is shift- WOMEN ARE T WICE AS
CTS. This common ailment usually afflicts the
ing towards social media in a big way. LIKELY TO DEVELOP CTS
AS OPPOSED TO THEIR
fingers of the hand, but one may experience
Internationally, most media companies, MALE COUNTERPARTS
pain, numbness and tingling sensations in the
large and small, have mounted some THE FAIL RATE FOR CAR-
PAL TUNNEL SURGERY
arm, which may extend to the shoulder and
sort of response to the phenomena of IS OVER 50%
neck area. Here are some tips on how to reduce
social media: they’ve launched their
CTS pain:
own blogs, added consumer commen-
tary and Web 2.0 features to their sites, Stretch and Clench: There are various
built or bought online communities, Blackberry thumb is a stretching exercises of the wrist that are known
and promoted or distributed media neologism that posits to relieve the pressure that gets built up. One
products in online social environments. a form of repetitive of the most basic and effective exercise is to
The biggest advantage that this strain injury caused rotate your wrists clockwise and counter-clock-
platform brings to the table is that it by the frequent use of wise, and clench and unclench your wrists.
cuts across the entire value chain. Your the thumb(s) to press Immobilizing braces: A rigid splint can
stakeholders, competitors, customers, buttons on PDAs, smart keep the wrist straight. A wrist splint helps
suppliers, agencies, employees, future phones, or other mobile limit numbness by limiting wrist flexion. Night
prospects--all are on a common devices. splinting helps patients sleep.
platform. It can cut both ways, as BP
recently found out with negative PR. Localized corticosteroid injections: Corti-
Therefore, it is all the more important costeroid injections can be quite effective for
that one approaches it with some temporary relief from symptoms of CTS for
thought rather than taking an “I too a short time frame while a patient develops
need to have something” approach. In a longterm strategy that fits with his/her
PHOTO GRAPHY: JAYAN K NARAYANAN

this context, answering some simple lifestyle.


questions will be useful:
PHOTO GRAPHY: PHOTOS .CO M

Medications: In special circumstances,


n  How does this impact my
various drugs can ease the pain and swelling
organisation and specifically my
associated with CTS. Nonsteroidal anti-inflam-
function or my team?
matory drugs, such as aspirin, ibuprofen, and
n How does it affect my customers?
other nonprescription pain relievers, may ease
n  Does it throw open some
symptoms that have been present for a short
opportunities in the recruitment area?
time or have been caused by strenuous activity.

46 IT NEXT | A U G U S T 2 0 1 0
n What is the impact for my alliance connections are thirty-four times which helped in the formulation of
partners, distributors and suppliers? more likely to be approached with a the strategy.
n  How does this change the job opportunity than people with less Facebook: Facebook has over 500
technology landscape? than five. million users, out of which about 9
The idea is to first decide the needs n There are also about 130,000 million  people are in India, as of June
and the corresponding approach and recruiters listed. 2010, and that number continues
then look around for the platform n Importantly, LinkedIn has over 6 to grow steadily. It is the third-most
that is best suited. You probably million members in India. trafficked website in the world (behind
cannot have a Twitter strategy or a n One new member was reportedly Google and Yahoo) and the most
Facebook strategy. added every 7 seconds in India over the trafficked social media site in the world.
past few months. As early as July 2007, Facebook started
Taking a closer look Here are some of the ways in calling itself one of the leading people
Each social media needs to be leveraged which LinkedIn can be used at your and social search engines on the web,
differently, based on its specialties. organisation: though some disagree with that.
LinkedIn: Most of us know that n Check references for potential Here are some business goals for
LinkedIn is an online network useful hires. using Facebook:
for sharing our professional updates n  Get advice using LinkedIn n  Reach to people who are searching
with people with whom we like to be Answers. for your products or services.
linked. Additionally: n Do research and get to know a n Connect and engage with current
n  Most of the Fortune 500 companies company. and potential customers.
are represented at LinkedIn and many n Discuss a topic on a forum and get n Create a community around your
of them are represented by director- feedback. business.
level and above employees. Recently, as part of an evaluation n  Promote content that your
n  More than 70 million experienced around feasibility to have employee- organisation creates, including
professionals from around the world owned assets, I started a discussion webinars, blog articles, or other
representing 130 industries are on at the CIO Club group forum. Within resources.
LinkedIn. a short period of time, there were a Some of the good examples of
n People with more than twenty number of comments and feedback, Facebook are: Amul Butter’s Facebook

HANDLING SOCIAL MEDIA: THE CHALLENGES


While everyone seems to agree that social media important, not many have a clear strategy or action
plan to explore and exploit it. There is often a dilemma when attempting to answer the following:

What about
Do we allow the privacy of Do we encourage
all sites to be What guidelines content? greater usage of
accessed by all are to be given internal sources like
employees? on publishing the intranet or allow Do we only
corporate content creation of sub-sites focus on
and even personal at popular forums? customer
views and personal
feedback or
information?
complaints?

Do we have the
right to monitor Do we engage
How much do we
and the means someone else to
invest in terms of
to measure its do it for us?
Should we explore time or money in
impact?
and rather focus this area?
on CSR initiatives
at these sites?

A U G U S T 2 0 1 0 | IT NEXT 47
15-MINUTE MANAGER

GOLF BASICS page is a repository of all the Amul Butter

DUMMIES GUIDE TO print ads and a way for the company to


share its platform with its customers.

GOLFING
Without an iota of doubt, golf is one of the most popular sports on the planet, espe-
Likewise, Vodafone zoo zoo is a good
example of usage of this platform which
over 6 lakh people claim to like.
cially with the rich and famous. In fact, it is often said that some of the biggest deals
Twitter: While Twitter gives us a
are not worked out in boardrooms, but on the golf course. So, before you pick up the
space to express “what are you doing
club to swing in the tee, here is a basic guide on what you need to know:
right now” in a quick 140 words, it has
some far-reaching impacts, which have
been used well by some organisations
and some business leaders in India.
Anand Mahindra is one of those few
who have been on Twitter and it’s been
simply amazing to observe the impact.
He has more than 86,000 followers.
Dell has found a way to use Twitter
to generate sales and says it surpassed
$3 million in sales attributed to Twitter.
Dell has now taken its Twitter campaign
to a new level by offering discounts
exclusively to people who follow @
DellOutlet.

Start with the gear: The biggest issue for a beginner is to decide on Summing it up
1 which club to use for which shot. The best thing to do when you are start- Social media offers structured ways to
ing out is to stick to just a few clubs, using only those. After you practice a little, track the relevant feedbacks and inputs
you will get the feel of what is required, understanding the differences between for your organisation, and the benefits
each club. this brings to the business can be critical
and valuable.
Gripping it right: How to grip the club is another bewildering thing for
2 most beginners. Well, here is one. Both your hands should work like a
However, it is important to note that lever-
aging the social media is a continuous and
single unit, each palm facing the other, as if joining your hands to pray. In order
gradual process. It is easy to start, but it
to check this out, get into the starting position, standing with your feet apart with
takes quite an effort to sustain the drive
your knees slightly bent, and then just bend your wrists and lift the club-head up.
and consequently the interest of an inter-
If you find that you can swing the shaft up straight, to the middle of your head,
active audience. It is therefore necessary
without the angle of the face changing, that means you have a good grip.
to keep the following considerations in
Pre-shot routine: Before every shot, most, if not all golfers, have a view when building a social media pres-
3 specific routine for getting ready. They may move a certain way, practice ence:
visualization of a successful shot, or concentrate on something motivating. This n It requires a long-term strategic
would be defined as a pre-shot routine. Every player has a unique prep ritual. thought process
n It’s not about getting lost in a sea
Tips for putting: Putting is probably one of the most important skills you
4 will need to develop. You need to master the pace, first of all. You can do
of Internet, but more about addressing a
focused, targeted audience that matters
this by practicing acquiring a smooth rhythm of putting. There are no particular
n  The objective should be clear
rules about addressing the ball; just keep practicing until you get a reliable and
and the benefits need to be visualised
smooth stroke.
in advance, so that the activities are
Matchplay: This term refers to the original way that golf was played - aligned to the goals
5 hole-to-hole. Whoever scores lowest on the first hole is the winner of that n It’s not technology, but a business
PHOTO GRAPHY: PHOTO S.C OM

hole, and then goes “one up”. Then, the winner on the second hole goes “two up”. initiative
This score pattern continues for each hole thereafter. If you lose a hole, then you As for the outcome, it may be complex
go “down one”. If a hole is tied, you then “halve” the hole. The final outcome is de- enough for even Paul the octopus to
cided by how many holes you are either up or down by, compared to the number predict!
of holes left. For example, if you are 4 up with only 4 holes left in the game, you
are the winner of the match. The author is CTO, Lowe Lintas (IPG)

48 IT NEXT | A U G U S T 2 0 1 0
MANAGE IT n  Life cycle management
n   Redeployment and disposal

SWEAT YOUR
management
IT asset management practices are

IT ASSETS
process-driven and matured through
iterative and continual improvement
process. Asset management data is
very important and is required in an
organisation at various levels such as
An asset management system will end users, budget managers, IT service

help you draw maximum leverage departments (for providing information


on warranties), and finance (for invoice
from IT investments in your reconciliation and updates for fixed
asset inventories).
organisation IT asset management is a very
challenging task for IT managers since
BY SAT Y E N D R A P T R I PAT HI many organisations normally outsource
the whole asset management part and
don’t have a single integrated asset
management application to manage IT
assets. In addition, due to high attrition
rates, assets are re-allocated to different
employees at different locations as per
the business needs normally, but that
doesn’t get automatically updated.
Manual verification of asset data is also
not fool proof due to human errors; so,
the sanctity of asset data is in question
most of the time.
IT asset inventory is very critical
for many management decisions like
opting for some newer technology
for business benefits, asset upgrade
decision, and asset optimisation or
virtualisation decision. IT managers
struggle to maintain accurate asset
details in large organisations in
the absence of an integrated asset
management system.
IT assets data requires best business
practices to be in place to manage it
properly. It is advisable that IT managers
adopt a process-driven approach and

I
follow best business practices. A good
T asset management is very organisation. Once the procurement IT asset management system must have
important for any organisation. process starts, it ends with the asset’s linkage with helpdesk management. It will
It refers not only to managing complete life cycle management. Here, be even better if it is also integrated with HR,
the IT assets but also amounts to assets are not only hardware but procurement and finance systems.
their effective utilisation, optimi- also include software in the business One way of adopting best business
ILLUSTRATI ON: ANOOP PC

sation or virtualisation. environment. practices is to drive an ISO 20000 or


Asset management starts from the A typical asset management process Information Technology Infrastructure
organisation’s business requirement. goes through the following life cycle: Library (ITIL) certification in the
It is the prime responsibility of IT n  New business requirement organisation. This will really help a lot in
managers to assess and ensure that the n  Request and approval process building and adopting the best business
right kinds of assets are bought into the n  Procurement management practices across the organisation. This

A U G U S T 2 0 1 0 | IT NEXT 49
15-MINUTE MANAGER

ASSET MANAGEMENT
OBJECTIVES
 The basic objectives of IT asset man-

TRAINING
agement primarily include the following:
l Fulfilment of business needs
l Standardization of IT assets and risk

CALENDAR reduction
l Complete control over asset inventory
and transparency of asset data
Career booster l Optimum utilization of IT assets
courses for you l Virtualization of IT assets
l Uncover savings through upgrade/re-
deployment and support for strategic
decision making
l For good IT governance and to ensure
compliance
Program Venue Dates l Enhance performance of assets and
the life cycle management

Financial Strategies for


ISB Aug 1-5, 2010
Creating Value

will not only help in organising the


Leading Teams for High assets, but also lead to many business
ISB Aug 11-13, 2010
Performance benefits like virtualisation and optimum
utilisation of assets.
Today, there are many freeware
Brand Management for asset management applications that
XLRI Jamshedpur Aug 13-16, 2010
Corporate Growth are available on the Internet. These
applications can be downloaded
and further customised as per the
Integrated Marketing and
ISB Aug 24-27, 2010 organisation’s needs. If the organisation
Communications is ready to go for a standard asset
management application, then one
Transformational Leadership, may opt for an ITIL/ISO 20000
Tapping into your Personal ISB August 27-31, 2010 compliant system. These applications
DNA will automate the whole activity,
starting from the asset’s requisition till
Managing Business and its disposal. There are tools available
Financial risks during IIM Calcutta Aug-29-30, 2010 which can automate the capturing of
Turbulent times asset data and populate the same in
Configuration Management Database
Strategic Sourcing and Supply (CMDB). The automatic capturing of
IIM Bangalore Aug 30- Sep 3, 2010
Chain Management asset data in real time ensures that
all asset movements are recorded in
Self Development for Global the system and asset data is always
IIM Shilong Sep 02-03, 2010
Managers updated. By using advanced tools, we
can find out the actual usage details of
Competing through each asset like who has used the system,
IIM Calcutta Sep 13-16, 2010
Manufacturing through which application and for what
duration. This information helps a lot in
ensuring that each IT asset is optimally
used in an organisation.
Development Projects IIM Shilong Sep 20-23, 2010

The author is Head – IT, JSL Limited

50 IT NEXT | A U G U S T 2 0 1 0
SOCIAL NETWORKING

HOW TO
STEM SOCIAL
THE MEDIA
LEAKS?
BIG EXPERT PANEL

RATNAKAR B MURALI ALOK KUMAR,


NEMANI, CIO NAIR, CTO, HEAD, SEARS IT
AND HEAD OF L AXMI VIL AS AND MANAGE -
IT PROJECTS BANK MENT SERVICES
WING, VST (INDIA)
INDUSTRIES

disturbed by what she had just seen: the mes-


THE SITUATION... sages posted by Vikas and some other colleagues
seemed to give out critical information regarding
Harsha looked at the “friend” request she had an ongoing project that it amounted to a serious
just received from a colleague. She remembered information security breach.
Vikas well, with whom she had shared the table It seemed that all witnessed by information
for an extended lunch at the company cafeteria. security measures, taken so far at Saensem India
Harsha had joined IT solutions company, Saensem had gone to the dogs due to unmindful messages
India, a day ago as a senior member of the Infor- posted on a public domain, Harsha said to herself.
mation Security Team. Vikas came across to her No doubt, they appeared to be very loyal to the
as a friendly and open person, who seemed to have company and there was no deliberate intent of
something to say on any subject under the sun. leaking information.
She clicked on the link in her mailbox, which took Harsha wanted to pick up the phone and warn
her to the social networking site. She clicked on Vikas how irresponsible he and his friends had
the “accept” tab and Vikas quickly appeared on her been, but she hesitated. She was not sure how
friends list. Vikas would respond to remarks from a newly
PHOTOG RAPHY: XXX XXXX

Harsha leisurely went to Vikas’ page and looked joined employee.


at the posts around. As she started reading, her Harsha was confused. She feared being seen by
expression changed. Suddenly, she sat very upright Vikas and his colleagues as someone who is trying
and started browsing through Vikas’ friends list. to bully them. Her caution could also make her
She went through the posts, many of those being unpopular, which in turn will affect her day-to-day
from fellow colleagues at Saensem. functioning. Yet, if she remains quiet, that can do
After some time, she sank into her chair, visibly irreparable harm to the company.
FROM HERE

Your responses count. Log on


to www.itnext.in/bigQ to submit
NEXT
CUT IT

your replies. The best entry will be


published in the next print edition.

A U G U S T 2 0 1 0 | IT NEXT 51
THE BIG Q

THE BIG QUESTIONS...


?WHAT SHOULD HARSHA DO TO STOP POSTING OF MESSAGES THAT CONTAIN
VITAL INFORMATION ABOUT THE COMPANY, WITHOUT BECOMING
UNPOPULAR AMONG FELLOW EMPLOYEES?

? WHAT INITIATIVES SHE CAN DRIVE AS A SENIOR MEMBER OF THE IS TEAM


TO COUNTER THE INFORMATION SECURITY BREACHES POSED BY SOCIAL
NETWORKING SITES AND OTHER SUCH WEB-BASED MEDIA?

HERE ARE THE ANSWERS...


‘INVOLVE ALL EMPLOYEES’

FIRST ANSWER
To start off, there are two aspects to Harsha’s dilemma, one pertains to
ethics and other to the business angle. First up, from a legal and ethi-
cal perspective, one should not mix personal, professional and social
activities. In this case, it is the clash between personal–vs-organisa-
tion entirely, that means if it is the security breach for customer, the
organisation can be closed down.
Now from a business perspective, even if Harsha doesn’t want
to raise an alarm, someone else may do it. So, she can alert the
authorities, without really revealing her identity. Looking at the
situation, impact and risks associated, it can be handled sensibly.
Usually, these kinds of issues occur at the workplace out of sheer
ignorance on part of the employees. People do not necessarily
RATNAKAR understand the true implications of their actions. Hence, it is
NEMANI incumbent upon the organisation to educate its workforce on what
is acceptable and what is not. It also needs to clearly spell out the
CIO and Head of IT consequences of such acts. For instance, in this particular case, Vikas could be counselled
Projects Wing, VST
Industries Ltd and, if need be, helped to find another job, etc. The action taken by the organisation is
completely dependent on the motives of the perpetrator, if it is found that the act was
About me: A finance a deliberate one, the punishment will be dour and if on the contrary, it was done out of
executive by choice
and an IT executive by ignorance, it could be light.
chance, he is an industry Interestingly, such issues are quite common in IT /BFSI sector where spouse or
veteran with over 18
years of experience in roomates work together. Harsha should not ponder too much over the issue, and bring it
the current organisation. to the notice of the management. Else, she could be aiding in compromising the security.
A recipient of multiple
awards, he is renowned
for his ability of bringing SECOND ANSWER
in business insights on
technology issues There are quite a few steps that can be taken by the Information Security team to counter
the threats posed by social media sites. Here is what they can do:
1. Immediately cut off Vikas’s Internet access at office
2. Check background from HR, both discrete and otherwise, to ensure that he is not
working for competition
3. Filter all data pertaining to the ongoing project through the proxy
4. Issue a circular to all from Head HR about gravity of exchanging data on public
domain
5. Separate the public domain collaboration from the internal collaboration unit
6. Conduct classes on security related issues for all employees
7. Counsel Vikas privately, informing him that such activities are not entertained
One thing is certain here, she should not be really worried about her image with the
colleagues, as she is bound to be at loggerheads with employees on one issue or another.
And that will be her mark of success as an IS professional.

52 IT NEXT | A U G U S T 2 0 1 0
THE BIG Q

‘FRAME AND ENFORCE AN IS POLICY’

FIRST ANSWER
As a corporate policy, we do not allow social networking sites on the
corporate network. This is a given policy in most corporate offices
where IS policies are in place and where customer information is
vital. Presently, the defamation and libel laws in the country are
not very stringent, but going forward I am sure the so called “dis-
claimer” clause we put everywhere will not be of any consequence.
In the present case, I think Harsha should post a newsletter bring-
ing out clearly the security loopholes in social networking sites and
how the vital information can be compromised by using the site for
official, or semi-official, work. If indeed the information leak seems
to be unintentional, she would be best advised to bring it to the notice
of the senior team members and also counsel Vikas in person about
what could be the possible consequences of the indiscrete postings. B MURALI
IS policies work best when the employees are well-informed about NAIR
them, otherwise, these issues keep cropping up.
CTO, Laxmi Vilas Bank

SECOND ANSWER
About me: A multi-
Harsha and the team should also put in place an Information Security Policy duly faceted banking
approved by the top management/board and implement the same across the manage- veteran, he is renowned
in the tech circles for
ment. This is a tough job since it will require a number of sessions for creating aware- his business acumen
ness, conditioning and bringing in certain inevitable changes in the work culture and and ability to resolve
technology issues
practices. But the matter requires firm handling and in spite of initial resistance, when in a short span of
the objective is well understood, the resistance will give way to acceptance. Like much time. Currently he
is overlooking the
else in life, prevention is always better cure, but in case of security prevention , its more complete technology
critical than cure. And not only should such a policy be framed, it should be prominently roadmap at LVB and prior
to that he was associated
displayed at all vital locations, so that the same is reinforced time and again. with Union Bank of India

NEXT

SOCIA
L Top Security Concerns of using Social Media Network by Organisations
MEDIA
Most social network users fail to perform basic security measures on a regular basis

47% 55%
26%
20% a tion
orm
Inf
l
tia

s
on
en

cti
ck
fed

nfe
ft

a
Att
the

co n

eI
Phishing
Identity

Sharing

Malwar

SOURCE: AVG
AND CMO
COUNCIL

A U G U S T 2 0 1 0 | IT NEXT 53
THE BIG Q

‘HIGHLIGHT SOCIAL MEDIA THREATS’


FIRST ANSWER
Whatever might be her concerns regarding her image, etc., Harsha
is required to take an action. There are no two ways about it. But
she should not take any unilateral decision. In all such cases, it is
important for any employee to give detailed information to the
concerned superior and follow up to see the action gets completed
in the interest of the company. On the other hand, it is also necessary
for her to immediately talk to the concerned person on the hazards of
such information leaks. Ascertain if the same was unintentional and
work in tandem with the employee to ensure that such leaks do not
take place in the future.

SECOND ANSWER
ALOK She should immediately formulate and circulate a “Social Media
KUMAR Policy” which should be applicable to all employees. Now a days, all
large companies understand the power and threat of the social media
Head, Sears IT and have come out with such policies to which each employee is bound. In such a policy there
Management Services
(India) are clear do’s & dont’s mentioned making easy for an employee to restrict his blogging &
messaging on things which are neutral or not part of the policy. Training and awareness
About me: Is a tech are also important, so training sessions and consequences in case of a breach should be
evangelist, who has a
distinguished career clearly spelt out. Security policy and social media policy in general should be hyped up
spanning multiple through sessions, posters, screen savers and like.
companies, like
Hutchinson and Reliance
Infosolutions

NOTES
NOTES

Social Networking, The “Third Place,” And The Evolution Of Communication: http://jobfunctions.
MORE RESOURCES bnet.com/abstract.aspx?kw=social+media&docid=328488
Social Media: Risk and Policies: http://www.socialfish.org/whitepaper#policies

54 IT NEXT | A U G U S T 2 0 1 0
4 Edu Tech December 2009
CUBE CHAT | BHOODEV TYAGI

TAKING UP
CHALLENGES
“I aspire to raise the standard of my
work,” says Bhoodev Tyagi, Leader–IT,
Dun & Bradstreet, India
BY JATIN D E R S I N G H

C
hallenges make you discover things The process is based on virtualisation and
about yourself that you never really maneges to reduce hardware and operating
knew. They’re what makes the costs—including energy costs.
instrument stretch—what makes “The project helps reduce the time taken to
you go beyond the norm.” This provision new servers,” he explains further.
statement made by Cicely Tyson, a successful The mark of a true leader, Tyagi pays a great
stage actress of 19th century, seems to go with the deal of attention on learning and teamwork. He
work philosophy of Bhoodev Tyagi, Leader–IT, is dedicated and passionate about any project
Dun & Bradstreet, India. that he is involved in. For him, the definition
An admirer of M.S. Dhoni for his leadership of a successful IT manager lies in the way he
skills, Tyagi believes that no problem ever comes collaborates with a client or stakeholders in
without a solution. And, one just needs to think order to understand them properly.
MY SUCESS differently to overcome it. “This belief helps If knowledge is a critical to achieving goals, it’s
MANTRA me to achieve my goals as an IT leader in my the vision of the future and the ability to create
Work hard, keep a organisation,” he explains. a good working team that, he believes, make a
positive attitude, Presently, he is handling the critical project project successful.
and concentrate on of server consolidation in a live environment to “Nowadays, IT is dynamic. Therefore, an
your goal achieve a zero downtime for his organisation. IT manager should be able to keep pace with

56 IT NEXT | A U G U S T 2 0 1 0
W

CUBE CHAT

FACT FILE

NAME
BHOODEV T YAGI

CURRENT DESIGN AT I O N
LEADER–IT FOR D U N &
BRADSTREET, IND I A

CURRENT ROLE
RESPONSIBLE FO R T H E
MANAGEMENT OF T H E
DATA CENTRE, US E R
SL A COMMITMEN TS ,
PERFORMANCE,
AVAIL ABILIT Y,
RESPONSE TIME A N D
PROBLEM RESOLU T I O N .
RESPONSIBLE FO R
EFFECTIVE RESO U R C E
MANAGEMENT, AN D
SYSTEM AND RES O U R C E -
PL ANNING BASED O N
BUSINESS FOREC AST

EXPERTISE
SOFT WARE DEVELO P M E N T
STRATEGIC PL AN N I N G

“KNOWLEDGE IS CRITICAL. BUT, IT IS THE VISION


INFRASTRUCTUR E
MANAGEMENT

AND THE ABILITY TO CREATE A TEAM, WHICH WORK EXPERIENC E

MAKES A PROJECT SUCCESSFUL”


2002 – PRESENT
LEADER – IT
DUN & BRADSTRE E T
(D&B), MUMBAI, I N D I A

2001-2002
technological advancements. One should spend quality time with his family. He
TEAM LEADER
be able to deliver innovative and timely is very particular about balancing his NIVA ONLINE, MU M BA I ,
solutions,” he stresses. personal and professional lives. “I always INDIA
“An IT manager should be capable try to live life to the fullest. Spending time
2000 -2001
enough to understand the pain of his with the family, listening to old Hindi
PROGRAMMER-CU M -
clients and learn how IT can help solve the film songs and watching cricket are some ANALYST
problem,” he adds. of my favourite pastimes,” he reveals. GEBBS SOFT WAR E
Tyagi is a strong believer in God. His There is a scripture in the Bible that says INTERNATIONAL , N J , U SA
faith is unshakeble, despite the fact that without a vision, people perish. Without
1999 -2000
the man has faced several hiccups during something to live for, we die, before we
CONSULTANT
various stages of his life. begin to live truly. So, does this IT manager DUN & BRADSTRE E T,
PHOTO GRAPHY: JI TE N GANDHI

“Every morning I thank God for the life aspire for a new (and bigger) role—perhaps MUMBAI, INDIA
that he has given me. Many a times I have that of a CIO?
been desperate, but I have always managed “My ambition is that I will continue to 1993 -1999
PROGRAMMER-CU M -
to keep a situation under control. And, I’ve raise the standard of the work that I do. I am
ANALYST
let a bad time pass,” he says. always ready to take on new challenges and CAPITAL MARKET
Despite the hard work at office and his responsibilities. But, I’m not after any tag, PUBLISHERS IND I A ,
commitment to work, he never forgets to even that of a CIO,” Tyagi concludes. MUMBAI

A U G U S T 2 0 1 0 | IT NEXT 57
UPDATE

OFF THE SHELF A sneak preview of enterprise products,


solutions and services

Ericsson introduces LTE


based solution
Faster mobile broadband applications
on offer , along with video on offer and ADATA intros 3.5”
video on demand external hard drive
ADATA technology has introduced
NH03, the 3.5” external hard drive
with SuperSpeed USB 3.0 interface. 

SuperSpeed USB 3.0 interface on


the sleek-looking NH03 3.5” external
hard drive is designed to deliver faster
data-transfer rates— never seen on
hard drives. With the addition of built-in
TurboHDD USB software, the transfer
performance is further accelerated,
reaching up to 140 MBs, based on real-
world results. Company claims that
the product will aid users to experience
a significant performance upgrade of
400% in terms of transfer speed com-
pared to devices with conventional USB
2.0 interface. The SuperSpeed USB 3.0
is backward compatible with previous
versions for greater flexibility and con-
venience in daily computing use.

Other than speed, NH03 includes 256-bit


Swedish networking firm Ericsson has KEY FEATURES
AES encryption to keep personal data
unveiled its TD-LTE solution at a recent * 256-bit AES encryption to keep
safe and confidential while protecting
China event. The solution will help run faster personal data safe
against any unauthorized intrusion.
mobile broadband applications, such as * Stylishly designed and innovative
video on demand (VOD) and video stream- heat vents The company is also providing 60 day
ing, using a live camera. * Blazing-fast backup solution trial version of Norton Internet Secu-
LTE, the next generation of mobile * Backed by 3 year product warranty rity 2010 with the product.
broadband technology, includes two
versions: one for paired spectrum, frequency division duplex (FDD); and one for
unpaired spectrum, time division duplex (TDD). The global deployment of LTE-
PHOTO GRAPHY: JAYAN K NARAYANAN

based solutions is expected in the coming years. The company has also introduced
a new base station as a part of its TD-LTE offering. RBS 6000, the TD-LTE base PRODUCT SPECIFICATIONS
station, offers an integrated solution with minimal dimensions and low-energy Interface: USB 3.0

consumption, fit for every implementation. “The demonstration reflects not Special Feature: one-touch auto backup button,

only Ericsson’s undisputed technology leadership in the LTE domain, but our AES encryption

unwavering commitment to the development of TD-LTE in the world,” said Mats Data Transfer Rates: Transfer rates reaching up

H. Olsson, President, Ericsson (China & North East Asia). The solutio has the to 140 MB/s

capability to achieve a single-user peak rate of 110Mbps in the downlink.

58 IT NEXT | A U G U S T 2 0 1 0
UPDATE

VMware intros
ZyXEL economical
launches Solutions
N Gigabit VMware, the global player
in virtualisation solutions right

Router from the desktop, through the


datacentre, to the cloud, has
introduced new VMware vSphere
4.1 solutions for small and mid-
size businesses with
Price prices starting at US$83 Price
Rs 13,500/- per processor and aims to $495 for six
help businesses improve processors
infrastructure-efficiency
and business continuity
ZyXEL Communications has unveiled a new KEY ADVANTAGES According to an independent
NBG 460N wireless and Gigabit router in India. * 8 times faster than the normal survey of North American and
This wireless N gigabit router delivers speed speed and 5 times more in European SMB x86 server
and coverage, and is compliant with the latest terms of coverage virtualisation decision-makers,
802.11n technology . * Ensure safe and secure data conducted by Forrester Research,
The product is aimed at helping enterprises transfer 60% of SMBs rated standardising
manage the limited bandwidth for multimedia * Enhanced wireless scheduler on virtualisation for server
applications. save the power deployment, disaster recovery,
It has an inbuilt feature, which enables * New build-in MBM v2 business continuity capabilities,
the device to save power and reduce wireless technology shape traffic and infrastructure consolidation,
radiation by configuring to fit in the needs. as a high, or critical, priority.
According to ZyXEL, the router also The company is focussing
supports IPSec VPN (Virtual Private Network), which ensures secure heavily on small and medium
transmission between two sites, eliminating the necessity for expensive size businesses in India and has
leased-lines, enabling interconnectivity at minimal expense. It is priced at Rs. tripled the number of customers in
13,500 this space in two years.

Telesoft unveils interac- KEY ADVANTAGES


* Features up to 240 media

tive VAS platform channels


* Easily connects to mobile and
fixed networks
Telesoft Technologies has introduced the ARNE IVR platform in India. * Uses open standard XML
Aimed at VAS and enterprise players in India and Asia, this product offers * Six-level output power control
voice and video platform, on which VAS developers can build innovative capability
new revenue streams. * 64/128-bit WEP
According to the company, the solution can easily connect to mobile and fixed
networks, and provides services such as caller ringback tones (CRBT), customer
self-care—bill payment systems—as well as information and entertainment
applications; news, timetables, horoscopes and cricket scores.
It has built-in SS7/ISUP signaling protocol software for call control, an MRCP
interface for text-to-speech (TTS) and automatic speech recognition (ASR) and
built-in in video streaming capability.

A U G U S T 2 0 1 0 | IT NEXT 59
UPDATE

INDULGE The hottest, the coolest and the funkiest next


generation gadgets and devices for you

Presenting a range of must haves


that will cast an impressive spell on
those around you

HOT

DELL STUDIO
ONE 1909
19 inch touch-screen monitor,
Core2 Duo Processor,
Nvidia GeForce 9400
PRICE:
R S 34,000

P3110 3G READY
LIFEBOOK
SAMSUNG C9000 Ultra-low-voltage processor, 3G
Collector’s edition, swiss ready, size 11.6 inch, weighs 1.6
durability, improved mechanical kg, perfect for video conferencing
grounding, HDMI 1.3 Video and and Internet telephony (VoIP)
Audio digital output PRICE:
RS 63,500

PRICE: NEW
US$5,999 AND ABOVE

ZENITH XTREME
TOURBILLION ZEROG
Watch that can operate in Zero
gravity, mounted with a free
moving gyroscope, water proof
up to 1,000 ft.
PANASONIC
HD 3D CAM PRICE: US$ 500,000

3D camera, convenient
replacement for their 2 camera
and mirror, can record 3D HD
content on 2X32 GB SD cards
PRICE: US$21,000

Like something? Want to share your


objects of desire? Send us your wish-list or
feedback to editor@itnext.in

60 IT NEXT | J U N E 2 0 1 0
UPDATE

BOOK FOR YOU


OPEN DEBATE A platform to air your views on latest
developments and issues that impact you Gandhi CEO
14 principles to guide and Inspire

Can iPhone replace


modern leaders

PUBLISHER : STERLING
PRICE : RS 499

the Blackberry?

The latest novel by Alan Axelrod looks


DHIRAJ SINHA DEEPAK KUMAR RAKESH MOHAN at Gandhi in modern light, focusing on
LEADER (TECH), MANAGER PROJECT his leadership style to serve as a guide
DELL PEROT IT, TRIVENI MANAGER, FLYTXT to help existing and aspiring CEOs. It
SYSTEM INFRASTRUCTURE Well, I will put it in this aims to relate Gandhi’s thoughts to
One should not forget & DEVELOPMENT way. Blackberry is a modern day complex business environ-
that the iPhone has long I have been extremely very trusted enterprise ment and identifies truth, non violence,
been seen as the phone, loyal to my Blackberry device. iPhone4 is a good do or die, sacrifice, and its co-relation,
which simplifies the so far. Can you name attempt, but its still an exemplary miracles as the critical
smartphone functional- even a single organisa- underdog when you see traits which a CEO should focus upon.
ity. It is certainly simpler, tion which has com- its level of expertise and Born in 1869, Gandhi’s struggle and
efficient and easy to use pletely rolled out the sophistication which an circumstances, according to the author,
device compared to the iPhone. Not possible. enterprise will be seek- make his life a true example relevant to
Blackberry. On the other From an IT perspective, ing. The style and look is the multinational business environment
hand, RIM has not been BlackBerry provides certainly tempting, but of the 21st century. It discusses the
able to come with any features such as native when it comes to reliabil- leadership scenerios, that lie beyond
new cutting-edge tech- VPN, native Mobile ity, Blackberry wins the the complacency of the everyday and
nology to outsmart the Device Management race, hands down. There the ordinary.
popularity of the iPhone. (MDM), private on- are different people who
Written in a conversational style,
For me, the first thing premise secure OTA app have different needs.
the book holds a distinct potential
which is critical while se- push etc that the iPhone The usability of both the
to mentor young leaders in parts.
lecting the smartphone does not have. In addi- devices is pretty different
However, it fails to match the practi-
is its high-end security tion, the IT department and I strongly feel that
cal approach that drives the leaders
features like data en- of most organisations at least in the forseeable
in the highly complex period such as
cryption, wireless access are not compatible with future Blackberry will
recession. For instance, the lesson
to business applications, the Android platform. continue to be a widely
“be an open book,” cannot be of much
remote IT security It lacks the acceptance popular enterprise de-
value to CEOs today.
controls, etc., which both when it comes to enter- vice, meanwhile iPhone,
these devices have. prise usage. a consumer one. IT NEXT VERDICT
Recommended for second generation of
entrepreneurs and leaders trying to make their
presence felt in any given industry. Written in a
simple language, the book is handy for people
who aspire to become people’s leader .
Your views and opinion matter to us. Send us your feedback on stories and the
magazine to the Editor at editor@itnext.in STAR VALUE:

A U G U S T 2 0 1 0 | IT NEXT 61
SUBHOJIT PAUL
MY LOG Chief Photographer,
9.9 Mediaworx

Saying it in
1000 Words
You have to be sure of what
you are doing in that moment

M
when you click

.CO
OS
OT
PH
:
ON
TI
RA
ILLUST
Honestly speaking, I had never planned on thought comes after a picture has been
becoming a photographer. It just happened. clicked (perhaps through the simpler
It began as an infatuation of a 12-year-old, auto mode). If this trend continues, soon
and inadvertently grew into a passion. And there will be newspapers and magazines 3 ESSENTIAL
the love affair is on. The relationship, how- carrying photo credits for the camera READS
ever, began after school, when yours truly company, and not the person clicking it. INSIGHT | VIRTUALISATION VIRTUALISATION | INSIGHT

VMware vSphere 4.1


laid hands on a 35mm single-reflex cam- As time went on, I found myself
controls, the implementation of the feature is quite
simple. Entering the parameter changes to enable
the feature and set the specific physical network

LEADS
adapter shares is simply a matter of walking
through a couple of configuration screens that are
easily accessed from the vSphere client. I was able
to assign a low, medium, normal, high or custom
setting that designated the number of network on
an iSCSI-connected storage array. It also works on
Fibre Channel-connected storage, but not on NFS

THE PACK
or Raw Device Mapping storage.

era–Vivitar V3800. graduating to storytelling through the


Virtual machines can be limited based on
IOPS (I/O operations per second) or MB per
second. In either case, I used storage I/O controls
to limit some virtual machines in order to give
others priority. I found that the large number of
vSphere 4.1 now adds a method to compress memory pages to reduce considerations—for example, each virtual disk
swapping and improve performance. associated with each VM must be placed under
control for the limit to be enforced—meant that
I spent a great deal of time figuring policy to get
The payoff for the vCenter transition is a a modest amount of benefit when my systems

Back then, Agfa, Nova and ILFORD, lens–I began to shoot musicians and
substantial increase in the number of VMs per were running.

IT managers should ensure that the


new memory management, storage and
cluster and the number of physical hosts that
each vCenter can handle. I was not able to test 3,000 Memory innovation

VMs
the posted limits due to hardware constraints. VMware included a handy memory innovation
However, VMware states that the latest version in vSphere 4.1 called “memory compression.”
network control features of vSphere of vCenter can handle 3,000 VMs in a cluster and up to 1,000 IT managers should become familiar with
4.1 lead to improved host utilisation and and up to 1,000 hosts per vCenter server. hosts per the feature as it is enabled by default. In my
Both of these large numbers are a threefold vCenter server tests, I saw improvements in virtual machine
REVIEW automated scale from the VM systems. increase over the stated capacity of VMware can be handled performance after I artificially constrained the
vSphere 4.0. Aside from the sizable scale increase by the latest amount of physical host memory. As my virtual
BY CAMERON STURDEVANT enabled in this version of vSphere 4.1, the main version of v machine systems started to access memory

were the preferred monochrome films. models for magazines. The intent was to
advances in the platform are evolutionary Center to handle test workloads, my EXS 4.1 system
extensions of capabilities that improve how the started to compress virtual memory pages and
platform handles VM resource contention. stored them in a compressed memory cache.
During tests, I used the new I/O controls in Since accessing this memory is significantly
VMware vSphere 4.1 continues to lead the networking and storage to govern resource use. faster than swapping memory pages to disk,
enterprise virtual machine platform pack. New IT managers who are already accustomed the virtual machines ran much faster with this
memory management, storage and network con- to using resource controls in VM CPU feature than they did when it was disabled and
trol features enable resource pool creation that settings will have a leg up when it comes to the same workloads were started. IT managers
improves scale while reducing performance using I/O controls in both network and storage should expect to devote at least several weeks
drags. Virtual machine management gains areas. Even with the CPU control heritage, my of expert analysis to determine the most
increased importance in the vSphere 4.1 plat- use of network and storage control features effective memory compression configuration

Around 40 per cent of the process capture motion. Like a chapter of a story.
form, and IT managers should plan to have their revealed a fair number of “version 1” limitations. for each workload.
virtualisation experts devote themselves full Network I/O control prioritises network traffic VMware did some housekeeping in the
time to studying these new features to ensure by type when using network resource pools incremental release of vSphere. The vSphere
that they lead to improved host utilisation and and the native VMware vNetwork Distributed client is still available in the vCenter 4.1
automated scale from the VM systems. Switch. Network I/O control works only with installation bits, but it is no longer included
During tests at eWEEK Labs, I learned that the 4.1 version of the vNetwork Distributed in the ESX and ESXi code. There also were
vCenter 4.1—the command and control module of the Switch—not with the Cisco Nexus V1000 or some minor changes made to various interface
VMware virtual infrastructure world—is now 64-bit the standard switch from VMware. screens, but there was nothing that would puzzle
only. As part of the move to vSphere 4.1, IT managers an experienced IT administrator.
should build in extra planning and migration time to Implementation is simple Find similar stories
online on the

was about clicking the picture, the rest As a photojournalist I have been fortunate
A vNetwork Distributed Switch can now assign priority to a variety of move any vCenter 4.0 or older servers to systems that While it takes advanced network expertise to website
www.itnext.in/ Cameron Sturdevant is technical director for eweek labs,
traffic types. are running a 64-bit operating system. design and tune the policy that runs network I/O Insight and can be reached at csturdevant@eweek.com. ©eWeek

36 IT NEXT | A U G U S T 2 0 1 0 A U G U S T 2 0 1 0 | IT NEXT 37

took place in the darkroom in trying to to meet people from different walks of Building automation system
life. Celebrities, artists, students, actors, conserves energy and saves much
develop and print a picture. Photography
money in the bargain Pg 34
was more about the process back then. leaders, professors, business heads, IT
Geometry, textures, patterns, hues and managers, models and designers. And INSIGHT | Wi- fi

Aren’t we all at some stage dis-


gusted to see the mesh of those wires
connected to our computers? Don’t
we wish we could make it clutter-
free by getting rid of at least some of
tors), and the security levels of Wi-Fi
such as authentication or encryption
are all very important prior to even pro-
curing the infrastructure.
Aspects such as thickness and
Wi- fi | INSIGHT

advisable to rename the default


administrator user name. Disabling
the SSID broadcast i.e. your network’s
‘name’ is a good idea and mitigates the
risk of an attack.

flora were few of my favourite subjects. I have discovered that a simple picture
the wires? Don’t we wish we could material of the outer walls and ceilings, Restricting access through MAC
connect to the Internet or access the and those of the different cabins inside address filtering will not deter a hard-
printer without those wires, securely? also play an important part in the core hacker, as MAC address spoofing is
Well, Wi-Fi lets users access the planning process. not that great a deal, but a combination
Internet and other network resources, of disabling the SSID broadcast and
without the hassles of plugging in Why is all this so restricting access through MAC address
the Ethernet cable. It offers them important? filtering, will deter most novice hackers or
convenience of moving their machines Well, let’s say that you have installed script kiddies from compromising your
around the office, without losing an access point near a window, or Wi-Fi facility. Although it’s not always
connection to the Internet or other maybe close by, which causes the sig- possible to do so, especially in large
network resources. nal to leak outside the office. A person organisations, it’s a good idea to switch

After a shoot, the long wait for the final is sometimes the hardest to shoot. Or
Installing a Wi-Fi LAN in the office with a laptop in the opposite building off a Wi-Fi network when not in use.
initially helps you set up the network or maybe even a floor above or below Personally, I am very uncomfortable
for a fraction of the cost, especially if your office is able to access the Inter- with DHCP and prefer using static IP
your office does not have structured
cabling. Wireless access to the Internet
at airports, restaurants and coffee shops
is all courtesy Wi-Fi.
STRONG PASSWORDS RESIST BEING
However, like most good things COMPROMISED THROUGH BRUTE
FORCE ATTACKS. DISABLING SSID
in life, Wi-Fi comes with its share of
drawbacks. These negatives appear

BROADCAST FURTHER MITIGATES

product would be excruciating. Processing that, clicking a baby’s picture is more


in the form of security risks, which
can be of various types. These could
compromise your confidential data,
lead to theft of bandwidth resources,
RISKS
amount to a legal action against your
organisation and in some extreme cases net using your facility. He is now going addresses, as this definitely helps as an
even land you behind bars! to ‘steal’ your bandwidth resource to added layer of security, in spite of its
Considering all these risks, is access the Internet. slight inconvenience. Ensure that your
the convenience of Wi-Fi worth it? Not much harm done here, but what router’s firewall is not disabled while on
Alternatively, can we protect ourselves if this person now uses your Internet the other hand, firewall on all desktops

SECURING the
and the organisation against these risks, facility through Wi-Fi, to hack into and laptops is enabled.

films and printing them was like giving challenging than shooting a supermodel.
and at the same time take advantage of another organisation? How would you Encryption scrambles messages
the benefits Wi-Fi has to offer? ever be able to trace this person? Like sent over the air. Deploying encryption
While there cannot be complete it or not, legally, it’s your organisation technologies such as WPA2 with EAP
security, there are ways to mitigate, that is going to get penalised. Of course, authentication, TKIP/RC4 or AES-

AIRWAVES
and to an extent, circumvent some this intruder can also hack into your CCMP encryption technology, is a must
of these risks. So how should own network, thus compromising your for large organisations and depending
an organisation go about taking organisation’s confidential data. And on the nature of the business, this is
advantage of the technology and at the once again, how are you ever going to applicable to SMBs too. WEP encryption
same time, protect itself from the risks be able to trace him or her? is outdated and should be avoided at
identified above? all costs, as it can be compromised in a
Securing the

birth (if I can use that term). Today, the Shooting IT managers is really unique, as
matter of minutes. Also, there is nothing
A Wi-Fi plan should be robust enough to address
I MAGI NG : SA N TO SH KUSH WA H A

It all starts with installation stopping you from deploying a second


planning
security concerns and clean enough to keep Let us address some technical aspects layer of encryption, for added security.
Planning the strategic location to install of securing a Wi-Fi installation in your Deploying a Remote Authentication
legal risks at bay the access points, the strength of these
strategically placed access points, who
organisation. Start by using strong
passwords, to prevent the likelihood
Dial In User Service (RADIUS) server
for authentication, authorisation and
BY BERJES ERIC SHROFF in the organisation can and cannot use of this being compromised through accountability should definitely not
the Wi-Fi technology (including visi- brute force attacks. Also, it’s strongly be overlooked by medium and large

most of them are camera shy. If there is


42 IT NEXT | A U G U S T 2 0 1 0 A U G U S T 2 0 1 0 | IT NEXT 43

development of technology is providing SOA and Cloud can complement


every person a chance to experience no control over that moment, it might not each other to help enterprises
the magic of photography. Having said just happen. And then there are logistics increase productivity Pg 30
that, I don’t believe everyone becomes a of the moment–deadlines, opportunities, INSIGHT | CLOUD COMPUTING CLOUD COMPUTING | INSIGHT

photographer–unless, there is that special locations, props, lights, number of people,


insomnia has become more than Now on that, Carr’s theories have the industry is driven by supply and
Enrique’s copyright. some intellectual company. Another demand as it should be in a free market.
And why not? maverick thinker, who has been vocal But, as Massa would underline here,
Hardly a few budgets old, the ‘cloud’ against the likes of Google, takes the while it is true the cost of bandwidth and
phenomenon has made more noise and same drift when it comes to cloud storage is dropping, the resources required
more impact than any other new kid computing power as a nemesis, albeit to handle the amount of data we’re talking
who ever arrived. What is more, this in his own ways and arguments. about is still a huge barrier to entry of all but
kid has all the power and prognosis to “Of course, to a guy like me, that just those with the deepest of pockets.
elbow out the boys who have always run means an opportunity to start another “There is no question that in the
the show, so far. niche service.” He quips first. coming months there are going to be

something in the blood that makes the etc., involved in a shoot. Not to forget that
So far! Now that’s the operative word. But ask Bob Massa, and there is more mergers, acquisitions, takeovers and
The argument that cloud’s advent can
hurt or challenge the very existence of
internal IT departments has naturally
started ‘hurting some brains.’ HARDLY A FEW BUDGETS OLD,
It’s not just applications any more.
The wave is touching networks, server
‘CLOUD’ HAS MADE MORE NOISE AND
provisioning, infrastructure monitoring IMPACT THAN ANY OTHER NEW KID
THAT EVER ARRIVED
IS IT
and management, and what not. The
interesting part is that there is no sign

RAIN
of it sucking back.

process into an addiction . a picture plays a critical role in every


The way it has arrived and
announced itself – cloud computing, to the argument, as you discover. buyouts.” In his incisive glance into the
certainly signifies a fundamental shift Massa is a mind and a voice that will future, Bob Massa, opens another volley
in the role of IT in the way it removes go into the annals of history for more of questions.

OR A from IT much of its mundane chores. than his coup d’etat of suing Google “What effect is cloud computing

DRIZZLE?
Ok! But why the heck were we talking some years back. His polemic, bold and going to have on privacy, intellectual
about insomnia? candid wisdom continues to challenge property rights, open source
Here’s why. perceptions again, when the word agreements, software licensing, and
The worry mercury was initiated ‘cloud’ pops up. so on?”
dramatically by Nicholas Carr, who “As for Mr. Carr, as much as I like to There could be more to be alarmed

story–thus, you have to be sure of what


augured the rise of utility computing in think of myself as an optimist, I’m afraid about if what he prognosticates

Earlier, the art of photography


his second book, ‘The Big Switch.’ I tend to agree with his rather dark comes true.
His argument that stirred many a vision of IT and how it is going to affect With everything on the cloud, there
Will cloud computing decimate internal IT? media pages, is, “IT would abandon business,” he opines. is no guarantee that your competitor

Is it worth losing your sleep over its rise? running their own IT infrastructures.”
What does that mean?
“Once computing becomes a utility
and the collective sum of ‘data’ is stored
won’t have your source code in his
back pocket tomorrow. There may be
Simple—one may no longer need the within the cloud and becomes available many a cost associated with all that
BY PRATIMA HARIGUNANI
IT firemen or plumbers to keep things to all but controlled by a few, then I can cheap bandwidth, storage and access
up and running because someone certainly see where Carr may have a very to everything.
‘on-call’ is going to do to it much easily, valid point. I know from experience that “Where’s your competitive advantage
much cheaper and much faster. IT aka technological advances run far ahead of when ‘everyone’ has access to the same

entailed that a photographer would give you are doing in that moment when you
your pizza delivery boy, could capsize the ability of any country’s legal system everything too?” He serves you a ‘too big
The thing about underdogs is, well, they seemingly petite things. Anyone who does the traditional hulks, if the hypothesis to keep up,” explains Massa. to chew’ question here.
are still dogs, and everyone likes them to win. so has yet not been bitten by a mosquito. is interpreted right. Now that raises the quintessential
From the pages of The Godfather to the There’s more than just a mosquito question again. Scared yet?
blind alleys of politics; from the vuvuzela- somewhere disturbing the sleep Teddy bear or bug bear? Can cloud computing have enough As is clear by now, cloud computing is
I L LUSTR AT I O N : SA N TO SH KU SH WA H A

drowned battles to a corporate tug-of-war; of some men nowadays. And this So, while almost every vendor and potential (or promise) to sideline influencing a lot of intelligent debate.
you will find them everywhere. is a breed of men who won’t let an lighthouse customer is giving it the erstwhile IT functions handled At the same time, it has also started
Crawling upwards silently, tip-toeing underdog shadow their power, or bear hug, is cloud computing strong internally? When and where will impacting IT budgets and decisions in
in the stranglehold of their prey, and shall we say, ‘cloud’ their power? enough to arrogate the power and internal IT be indispensable, cloud or a significant way. Yet, is there a negative
shadowing its might while it snoozes Ever since, the ‘IT Doesn’t Matter’ functions of traditional IT? Does it no cloud? fine-print in this ballyhoo? How should
unaware; the underdog usurps it all. author Nicholas Carr, made another not raise worries on new redundancy At the moment, there are several internal IT engines of an enterprise

considerable thought to the “frame” before click! Obviously, the art needs constant
May be that’s why the wise men know new, big stir that needs absolutely no spots, and thus a threat to internal companies jumping into the cloud game interpret it? Cause for worry for IT
that one should never underestimate small, introduction in CIO bastions today; IT teams? and there is choice and competition as managers already?

28 IT NEXT | A U G U S T 2 0 1 0 A U G U S T 2 0 1 0 | IT NEXT 29

shooting. Now, with the process becoming innovation to simplify the meaning of Peer coaching can help an aspiring
simpler and, to some extent, cheaper, the thousand words with a single click. leader to grow in stature Pg 51

62 IT NEXT | A U G U S T 2 0 1 0

Potrebbero piacerti anche