64
Technology for Growth and Governance CTO FORUM A 9.9 Media Publication Volume 06 | Issue 10 January | 07 | 2011 | 50 Volume 06 | Issue 10 DIGGING OUT INEFFICIENCIES | SOCIALISING IN THE ENTERPRISE | WAYS TO AVOID SCREWING UP What they say about you Page 30 I BELIEVE Private Data, Public Domain, Opportunity PAGE 06 NEXT HORIZONS Getting the Right Tablet PAGE 43 NO HOLDS BARRED Clouds Can Lock You in PAGE 55

12 Tech Behaviours

Embed Size (px)

DESCRIPTION

ctof 1st jan 2011 issue

Citation preview

Page 1: 12 Tech Behaviours

Technology for Growth and Governance

cT

o

fo

ru

m

A 9.9 Media Publication

Volume 06 | Issue 10

January | 07 | 2011 | 50Volume 06 | Issue 10

Dig

gin

g o

ut

ine

ff

icie

nc

ies

| so

cia

lis

ing

in t

he

en

te

rp

ris

e | W

ay

s t

o a

vo

iD s

cr

eW

ing

up

What they say about you

Page 30

I belIeve

Private Data,Public Domain, opportunity Page 06

NeXT HORIZONS

Getting the right tablet Page 43

NO HOldS baRRed

Clouds Can Lock You in Page 55

Page 2: 12 Tech Behaviours

ad

Page 3: 12 Tech Behaviours

editorialRahul Neel MaNi | [email protected]

12 Tech Beviours: What they say about youAre you always on email or do you forget to charge your phone? Each of your tech behaviours, says something about you. See which behaviour describes you the best.

30editors pick

This opinion [more so for its content] may sound a little

weird at this time, but I want to narrate a real-life disaster management case that was dealt with wonderfully. Therefore, it deserves mention.

I was at the Fortis Hospital in Shalimar Bagh (North Delhi area) attending a medical emergency last week. In less than half an hour of being at the hospital, I saw a few men screaming in the corridors. A fire broke out in an adjacent

problems. The Code Red was issued to alert the hospital staff for fighting the emergency, but what I saw the hospital staff doing was beyond belief.

The entire support staff sprung into action literally instantaneously. The fire-fight-ing equipment deployed for the hospital were pulled out. In no time, about 35-40 person-nel including Sunil were at the site to extinguish the devilish looking fire. There wasn’t any sign of a fire brigade until then. Three hose pipes (pulled from different directions in the hos-pitals) were spraying water with an aim to saving human lives.

Inside the hospital, an emer-gency team of doctors and ancil-lary staff were on alert to tackle the situation (part of the Code Red). Messages were constantly broadcast over the (PAS) updat-ing the emergency response

slum. Fire spread like it does. In no time the sky was black. I couldn’t see anything but smoke all over the place.

Sunil Kapoor, Zonal Director of Fortis (Sunil joined Fortis in year 2000 as the CIO and then moved on to a business/opera-tions role) was at the helm. Sensing an emergency, Sunil issued a ‘Code Red,’ a message announced over a hospital's public address system (PAS), indicating a fire or other adverse conditions that can cause grave

teams. In less than half an hour, the smoke settled. I peeped out of a window. The fire was almost extinguished. It caused damage but it was not widespread. The disaster management system of a Hospital came in handy in not only saving its own assets but also precious lives outside its ecosystem. The sheer effective-ness of a ‘Plan’ and the proac-tive approach of the personnel to avert the disaster was what made me exclaim in joy.

Disasters seldom strike with a warning. All you need is to remain fully geared up to act upon a disaster management plan, the damage can be mini-mized. In this case, I saw no casualties/injuries.

I wish you a safe year ahead.

1 07 january 2011 cto forumTHe CHIeF

TeCHNOlOgyOFFICeR FORuM

Code Red in Action: Disasters need to be dealt with

as disasters

Page 4: 12 Tech Behaviours

2 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

january 11

No holds barred

55 | Clouds Can loCk you in Ken Steinhardt, VP, and CTo, emC, talks about the closed nature of public clouds and future of data migration

Co

ve

r d

esi

gN

: a

nIL

VK|

Ca

rTo

oN

s b

Y H

ar

SHo

mo

Ha

n c

Ha

tto

ra

j

Cover sTorY

30 | 12 Tech Behaviours: What they say about you. Are you always on email or do you forget to charge your phone? Each of your tech behaviours, says something about you. See which behaviour describes you the best.

co nte nt S TheCToforum.Com

30

ad

Page 5: 12 Tech Behaviours

regulars

01 | Editorial10 | EntErprisE roundup

a QuesTioN of aNsWers

16 | HPC In The Enterprise Eng Lin Goh, CTO, SGI on the evolution of the company after its takeover by Rackable

20 | BEst of BrEEd: soCialising in thE EntErprisE A look at what brings people and applications together. By cameron

sturdevant

48 | tECh for govErnanCE: how to sEll to thE CEo on ChangEBy ken Bylsma

20

16

48

CANON IFC

SCHNIEDER 05

TATA COMMUNICATIONS 07

SUN 09

SAS 13

POLYCOM 15

EMPRONC 23

ACE DATA 25

AIRTEL INSERT AFTER 32

AIRTEL IBC

MICROSOFT BC

This index is provided as an additional service.The publisher does not assume any liabilities for errors or omissions.

COPyRIGHT, All rights reserved: Reproduction in whole or in part without written permission from Nine Dot Nine Interactive Pvt Ltd. is prohibited. Printed and published by Kanak Ghosh for Nine Dot Nine Interactive Pvt Ltd, C/o Kakson House, Plot Printed at Silverpoint Press Pvt. Ltd. D- 107, MIDC, TTC Industrial Area, Nerul, Navi Mumbai- 400706

Please Recycle This Magazine And Remove Inserts Before

Recycling

advertisers’ index

ad

Page 6: 12 Tech Behaviours

4 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

january 11co nte nt S TheCToforum.Com

ColumN

6 | i BEliEvE:privatE data, puBliC domain, opportunity

Data mining to create value perception that drives business will occupy the minds of Cios By k B venkataramanan

47 | hiddEn tangEnt: from smartphonE to supErphonE The humble mobile gets elevated to a new statusBy geetaj channana

60 | viEw point: ConsumErisation of thE EntErprisE By sameer shelke

www.thectoforum.com

Managing Director: Dr Pramath Raj SinhaPrinter & Publisher: Kanak Ghosh

Publishing Director: Anuradha Das Mathur

EditorialEditor-in-chief: Rahul Neel Mani

Executive Editor: Geetaj ChannanaResident Editor (West & South): Ashwani Mishra

Senior Editor: Harichandan ArakaliAssistant Editor: Varun AggarwalCorrespondent: Nipun Sahrawat

dEsignSr. Creative Director: Jayan K Narayanan

Art Director: Binesh Sreedharan Associate Art Director: Anil VK

Sr. Visualiser: PC Anoop Sr. Designers: Prasanth TR, Anil T, Joffy Jose

Anoop Verma, NV Baiju & Chander Dange Designers: Sristi Maurya & Charu Dwivedi

Chief Photographer: Subhojit Paul Photographer: Jiten Gandhi

advisory PanElAjay Kumar Dhir, CIO, JSL Limited

Anil Garg, CIO, DaburDavid Briskman, CIO, Ranbaxy

Mani Mulki, VP-IS, Godrej IndustriesManish Gupta, Director, Enterprise Solutions

AMEA, PepsiCo India Foods & Beverages, PepsiCo

Raghu Raman, CEO, National Intelligence Grid, Govt. of India

S R Mallela, Former CTO, AFLSantrupt Misra, Director, Aditya Birla Group

Sushil Prakash, Country Head, Emerging Technology-Business Innovation Group, Tata

TeleServicesVijay Sethi, VP-IS, Hero Honda Vishal Salvi, CSO, HDFC Bank

Deepak B Phatak, Subharao M Nilekani Chair Professor and Head, KReSIT, IIT - Bombay

Vijay Mehra, Former Global CIO, Essar Group

salEs & MarkEtingVP Sales & Marketing: Naveen Chand Singh

National Manager-Events and Special Projects: Mahantesh Godi (09880436623)

Product Manager: Rachit Kinger (9818860797)GM South: Vinodh K (09740714817)

Senior Manager Sales (South): Ashish Kumar Singh

GM North: Lalit Arun (09582262959)

GM West: Sachin Mhashilkar (09920348755) Kolkata: Jayanta Bhattacharya (09331829284)

Production & logisticsSr. GM. Operations: Shivshankar M Hiremath

Production Executive: Vilas MhatreLogistics: MP Singh, Mohd. Ansari,

Shashi Shekhar Singh

oFFicE addrEssPublished, Printed and Owned by Nine Dot Nine Interactive Pvt Ltd. Published and printed on their

behalf by Kanak Ghosh. Published at Bunglow No. 725, Sector - 1, Shirvane, Nerul

Navi Mumbai - 400706. Printed at Silver Point Press Pvt Ltd, D-107, TTC Industrial Area, Nerul,

Navi Mumbai 400706.Editor: Anuradha Das Mathur

For any customer queries and assistance please contact [email protected]

feaTures

43 | nExt horizons: gEtting thE right taBlEt A quick guide to help you decide for an enterprise tablet By don reisinger

43

Page 7: 12 Tech Behaviours

ad

Page 8: 12 Tech Behaviours

I BelIeve

6 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

the author BrIngs more than 17 years of experience in large scale systems design

and operation, product development and infrastructure management.

K B venKataramanan CIO, Viteos Capital Markets Services Ltd.

currentchallenge

creating a knowl-edge management repository to scale up and how well you are able to collect data from the public domain

there Is a fundamental shift happening in the way organisations are looking at data. it is driven by people putting private information in public forums, at all times of the day. The next wave of services oriented organisations will look at mining this data before they start any strategies.

organisations therefore would rather look at effective and differenti-ated strategy drivers. There will be a significant shift in business strategies from building brick and mortar based organisations to organisations that are small and extremely agile even in the way they structure themselves to deliver value to the marketplace.

We are a financial services back-office organisation that does post-trade processing for clients around the world. When we started about four-and-a-half years back, there was a need for understanding the domain and accumulating a lot of knowledge. We literally had 250-300 people. Back then scalability was all about adding headcount. We then asked 'what can we do to automate what someone else is doing without adding value either to himself or the process/organisation ?'

The answer to that question has helped us increase business, and maintain additional capacity, even as the number of people dropped to hardly about a 100 today. our story for scalability revolves around creat-ing that knowledge repository.

This is the crux of it: one, this is about creating a knowledge manage-ment repository. Two, how it will work depends on how you are able to collect data from the public domain.

let's go back to the question 'what is innovation' and how does a Cio facilitate it? Today, it's all about creat-ing the value perception that drives the business. People in an organisa-tion necessarily need to see value in what is being presented. The creation of the value will come from how well you're able to mine data and strategise. That's the biggest chal-lenge – how will we get systems that help you mine data from the public domain, not necessarily in private domain. how will we get people to think in ways that allow us to look at all this very differently.

– As told to Harichandan Arakali

Private Data, Public Domain, Opportunity Mining public-domain data to create the value perception that drives business will increasingly occupy the minds of cIOs

PH

OT

O B

Y J

iTe

n G

an

dH

i

Page 9: 12 Tech Behaviours

ad

Page 10: 12 Tech Behaviours

8 07 november 2010 cto forum The Chief

TeChnologyoffiCer forum

LETTERS

WRITE TO US: The CTOForum values your feedback. We want to know what you think about the magazine and how

to make it a better read for you. Our endeavour continues to be work in progress and your comments will go a long way in making it the preferred publication of the CIO Community.

Send your comments, compliments, complaints or questions about the magazine to [email protected]

21 21 DECEmbEr 2010 cto forumThe Chief

TeChnologyoffiCer forum

20B 21 DECEmbEr 2010 cto forum The Chief

TeChnologyoffiCer forum

We continue our series with the

second part where a different set

of CIOs share their experiences.I N S I D E

20C | Help the Business Help Themselves

22 | Right Brains in the Right Place

24 | Are You an Output Driven CIO?

26 | The Strategic Enabler

28 | Pushing IT outside

30 | Technology as a Business Enabler

32 | Make P&L Your Next Love

34 | Tale of Two Lives

36 | Don’t Cut–off Your Roots

38 | CIO as an Innovator

40 | Being Board Ready

42 | Krishna and Arjun

45 | State of the Indian CTO 2010

ILLU

ST

RA

TIO

N B

Y A

NIL

T

P r e s e n ts

HOW mObILE gEnERaTIOn IS cHangIng THE bFSI SEcTOR?

The increasing importance of mobile internet and social networking is currently the subject of much public discussion. The new technological possibilities have set in motion a process of change that necessitates a rethinking of existing customer communications. Although the effect of these trends on revenue and margins is not measurable, they impact the sales and advisory processes.AshfAque AhmAd khAn, GM-IT, RR Group

BEYOND THE suppOrT.

“One needs to move away from quantifying the return, but look at qualitative improvement of the business process execution that IT is able to bring out.”To read the full story go to:

http://www.thectoforum.com/content/business-analytics-roi

cTOF connect Information is the lifeblood of not just corporations but organised crime terrorism, says Steve Durbin of the Information Security Forum in conversation with Rahul Neel Mani. The ISF’s released its Threat Horizon Report, and Durbin says we may have to give up some individual privacy in return for responsible governance and security.  

http://www.thectoforum.com/content/less-privacy-better-security

OpiniOn

chandrasekaran nspecial director - itashok leyland

cTOForum LinkedIn groupJoin close to 700 CIOs on the CTO Forum LinkedIn group

for latest news and hot enterprise technology discussions.

Share your thoughts, participate in discussions and win

prizes for the most valuable contribution. You can join The

CTOForum group at:

www.linkedin.com/

groups?mostPopular=&gid=2580450

Some of the hot discussions on the group are:What are / shuld be the attributes of a good cTO ?

What are the prerequisites for a cTO role ?

CTO should be more creative because CTO is top

technical architect of the organisation, he should design

and recommend technology for product lines and various

applications. His major responsibilities are :

1. CTO is completely in charge of engineering and

development

2. CTO suggests the new technology to enhance new

technical offerings and focus on external customers too.

3. CTO is responsible to manage vendors with solution to

enhance products line and applications.

4. CTO helps to develop technical strategies for top line

product, core and satellite applicationsconnects to the

business network.

—Kapil Mehrotra AVP - IT Application Development at AVIVA LIfe Insurance, India

IT can be a profit centre instead of just a cost centre.

8 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

S P I N E

Technology for Growth and Governance

CT

O

FO

RU

M

A 9.9 Media Publication

Volume 06 | Issue 09

December | 21 | 2010 | 50Volume 06 | Issue 09

TH

E S

TR

AT

EG

IC C

IO | IS

DL

P F

IT F

OR

YO

U | C

IO =

CA

RE

ER

IS O

VE

R?

MORE THAN200 CIOSSHAREOPINIONSON HOW THEIR ROLES ARE CHANGING

SUPERMANAGER

TAKESFLIGHT

SUPERMANAGER

TAKESFLIGHTWE CONTINUE OUR SERIES WITH

THE SECOND PART WHERE A

DIFFERENT SET OF CIOs SHARE

THEIR EXPERIENCES. | PAGE 28

Page 11: 12 Tech Behaviours

ad

Page 12: 12 Tech Behaviours

10 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

Enterprise

Round-up

feature InIsde

dell to acquire secureWorks Pg 12

SMART-PHONES GROWTH IN INDIA.

Hotmail Users Find Empty Inboxes on New Year. Company working with impacted users to solve the problemThe New Year evening saw many hotmail users miss-ing important mails from their inboxes. in fact many hotmail users, across the globe, reported that all their important data went missing since the beginning of the new year. microsoft defined the problem as not so widespread and said it is working with impacted users to resolve it. Some microsoft hotmail users are starting off the new year scrambling to get back old e-mails, the Daily mail reported. microsoft, how-ever, did not give any technical explanation for this unpleasant situation.

many of its users shared the problem through vari-

ous forums and popular social networking sites."got my emails and personal folders back, i know

some of us will not trust hotmail, but this is the case with any online services, and in some cases it's very hard to change our emails because it's related to many things, so what i did, i just create gmail account and forward copy of my hotmail to it," com-mented a hotmail user on facebook.

launched in 1996, hotmail is the most widely used email service in the world and boasts of around 360 million users. it was later acquired by microsoft for around $400 million.

294.9%data BrIefIng

PH

OT

O I

MA

GIN

G B

Y s

rIs

TI

MA

ur

YA

—Source: IDC

Page 13: 12 Tech Behaviours

E nt E r pr i s E ro u n d - u p

11 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

The Android platform is already becom-ing a target for virus writers. Infosecis-land has reported an Android Trojan—Geinimi that has been discovered in some Chinese games. ‘geinimi’ not only steals personal data from the phone, but even has some botnet-like command and control features.

QuICk Byte on seCurIty

Cloud Adds Complexity to DR Initiatives. symantec study reveals gap in expectations versus realitySYmaNTec has announced the india findings of its sixth annual Symantec Disaster recovery Study. The study demonstrates the growing challenge of managing disparate virtual, physical and cloud resources because of added complexity for organisations protecting and recovering mission critical applications and data.

As indian enterprises increasingly adopt virtualisation, it is having a big impact on their disaster recovery plans. The study highlights that in india nearly 50 percent of data on virtual systems is not regularly backed up and only 10 percent of the data and mission-critical applications in virtual environments is protected by replication. The data also highlights that 70 percent of those surveyed were concerned about data loss as an impact of a disaster.

The study indicated that virtualisation led 71 percent to re-evaluate Dr plans in 2010; this is up from the 61 percent reported by respondents in 2009.

“While indian enterprises are adopting new technologies such as virtualisation and the cloud to reduce costs, they are currently adding more complexity to their environ-ments and leaving mission critical applications and data unprotected,” said Anand naik, director, Systems engineering, Symantec.

THEy SAID IT

SANjAy jHA

During an the launch of a slew of new devices at CES, Las Vegas, Sanjay Jha, Chariman and CEO, Motorola Mobility said that the company is set to revolutionise mobile computing.

“We’re innovating across the board as we revolutionise mobile computing with experiences that push the limits of what you thought was possible with your mobile device.”—Sanjay Jha

Chariman and CEO,

Motorola Mobility

Page 14: 12 Tech Behaviours

E nt E r pr i s E ro u n d - u p

12 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

Dell To Acquire SecureWorks secureWorks’ security-as-a-service solutions expand dell’s services portfolio with enterprise protectiondell has announced it has signed a defini-tive agreement to acquire SecureWorks inc., a globally recognized provider of informa-tion-security services. SecureWorks’ indus-try leading Security-as-a-Service solutions include managed-Security Services, Security and risk Consulting Services and Threat intelligence. The acquisition expands Dell’s global iT-as-a-Service offerings and informa-tion security expertise.

organizations of all sizes and across diverse industries – including global 500 companies, mid-sized businesses, financial services, utilities, healthcare, retail and manufactur-

ing – rely on SecureWorks’ industry-leading security services to reduce risk, improve regu-latory compliance and lower costs of manag-ing iT security. The company’s proprietary threat management platform is scalable and integrates easily with client environments. in addition, SecureWorks’ world-class Coun-ter Threat unit research team helps protect clients across multiple industries from ever-changing global iT threats.

The acquisition is the latest strategic invest-ment by Dell as it expands its portfolio of enterprise-class iT-as-a-Service solutions. Building its capabilities as a managed Security

Worldwide IT spending is forecast to total $3.6 trillion in 2011, a 5.1 percent increase from 2010, according to Gartner. In 2010, worldwide IT spending totaled $3.4 trillion, up 5.4 percent from 2009 levels.

Services Provider (mSSP) is an impor-tant next step in Dell’s strategy to help clients drive better efficiency across the enterprise and dramatically simplify the management of iT infrastructure.

founded in 1999, SecureWorks is headquartered in Atlanta, gA and serves thousands of clients in 70 coun-tries, including more than 15 percent of the fortune 500. The company has approximately 700 employees and projects fiscal year 2010 revenue of more than $120 million. gartner has positioned SecureWorks in the leaders quadrant of its “magic Quadrant for mSSPs, north America” report based on criteria that includes a company’s completeness of vision and ability to execute. forrester named SecureWorks as one of only two “leaders” cited in The forrester Wave: managed Security Services, Q3 2010. SecureWorks was among the companies that received top ratings in several categories: including value proposition, vertical and geo-graphic footprint, and infrastructure and perimeter security.

“The frequency and sophistication of attacks on technology infrastruc-ture and malicious attempts to access data, requires reliable, capable and innovative information security,” said Peter Altabef, President, Dell Services. “SecureWorks is a recog-nized industry leader in information security services and its offerings and expertise will immediately enhance our solutions portfolio. We look for-ward to welcoming SecureWorks team members – who bring their passion and dedication to serving clients with best-in-class security services – to Dell and our clients.”

"Dell’s global scale and relationships with clients provides a tremendous opportunity to rapidly expand Secure-Works’ business," states michael Cote, Ceo and Chairman of SecureWorks. "With Dell’s commitment to our cli-ents, our team and our market, i am confident that SecureWorks will flour-ish as part of the Dell Services organi-zation and that our clients will contin-ue to be well-served and well-protected by the services on which they rely."

gloBal traCker

PH

OT

O B

Y P

HO

TO

s.c

OM

IT spendIng

2011

2010

$3.6Trillion

$3.4Trillion

Page 15: 12 Tech Behaviours

ad

Page 16: 12 Tech Behaviours

E nt E r pr i s E ro u n d - u p

14 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

Mobile handset market grows 3.6%.According to IDC, the sales reached 40.08 million units in Q3.

MObIlE APP

trIPadvIsor launCh-es neW IPad aPP

Travel site TripAdvisor has

announced the launch of its

new application for the iPad, avail-

able in Apple’s App store. The free

application allows travellers on the

go to search for popular hotels, res-

taurants and attractions, as well as

find the cheapest flights, from their

iPad. The application is available

in 18 languages and 26 countries

around the world, giving travelers

a localised experience on TripAdvi-

sor. The new TripAdvisor iPad app

features a map-based browsing

experience that allows travellers to

see traveller reviews for hotels, res-

taurants and attractions and quickly

get the lay of the land in their travel

destinations. If travellers want to

scope out points of interest at their

destination of interest, they can sim-

ply move the map with the slide of

a finger. The app also supports one-

click map-based searches, making

it easy to find hot spots in different

parts of town. In addition to its

map-based functionality, the TripAd-

visor iPad app includes a number of

other helpful features for travellers

on the go, including TripAdvisor’s

more than 40 million reviews and

opinions for hotels, restaurants,

and attractions.

“With millions of travellers using

TripAdvisor Mobile on a monthly

basis, it’s clear that they are finding

trusted travel advice that’s indispen-

sible while they’re on the go,” said

Mike Putnam, director of mobile

product at TripAdvisor.

accordiNg to IDc’s India

Quarterly Mobile Handsets

Tracker, in the third quarter

of 2010, Nokia had the larg-

est share of 31.5% in terms

of units shipped during

to the second quarter ended

June 30, 2010, according to

IDc India. The year 2010 is

expected to end with total

mobile handset sales of 155.9

million units.

The sales in smartphones

category saw a growth of

34.2% quarter on quarter

and increase by 294.9%

year-on-year and is likely to

touch nearly 6 million in cal-

endar 2010.

maNY orgaNiSaTioNS that choose to move iT services to lower-cost countries are daunted by the task of determining which country (or countries) would best host their operations. gartner has conducted an analysis of these countries to assess their capabilities and poten-tial as offshore services locations. gartner has identified the Top 30 countries for globally sourced activities in 2010-11, and found that eight new countries have made

their debut in the Top 30.The lead-ing emerging offshore locations evaluated by gartner in the Asia/Pacific region are (in alphabetical order): Bangladesh, China, india, indonesia, malaysia, the Philip-pines, Sri lanka, Thailand and Vietnam.“Clients continue to seek a portfolio of offshore countries, and with india again experiencing increasing labour costs and attri-tion, this is creating opportunities for other offshore locations to target

the services needs of more-mature Asian clients,” said ian marriott research vice president at gartner. gartner elected to focus on emerg-ing countries this year due to the dynamic changes taking place as they move towards developed country status. gartner excluded the mature countries of Australia, new Zealand and Singapore this year because their maturity has led to little year on year change to their rating. gartner also included two new countries to this year's analysis - Bangladesh and Sri lanka.

india is already the most suc-cessful country amongst the offshore locations. it continues to score very well across all 10 criteria. With the rising rupee, its cost competitiveness is being chal-lenged, but this is compensated by its strength in other areas. China on the other hand improved its scores for "political and economic environment" from “good” to “very good”, and "culture compatibility" from “fair” to “good”. Contribut-ing to the increased rating for China is its rising global political and economic leverage, especially during the recent global economic crisis. China held a steady positive growth rate spurred by the $583.9 billion stimulus package in 2009. The Shanghai 2010 World expo has helped to increase cultural awareness within China.

India Still No. 1 in Off-Shoring. attractive cost structures in Philip-pines, and Indonesia create tough competition for India.

faCt tICker

ILLu

sT

rA

TIO

N B

Y A

NIL

T

the third quarter of 2010.

The chinese brand G’Five

emerged as second largest

player in terms of unit ship-

ments market share and

Korean handset manufac-

turer samsung stood at third

position during the quarter.

The country’s mobile hand-

sets market recorded a

growth of 3.6% to touch

40.08 million units in the

third quarter ended septem-

ber 30, 2010, as compared

Page 17: 12 Tech Behaviours

ad

Page 18: 12 Tech Behaviours

16 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

A Q u e s t i o n o f An swe rs E n g L i n g o h

an Sgi system in the background. increasingly, we have morphed into a server-and-storage company.

We have now gone in the back-end and have diversified. But, we still have the know how of the data work flow of the movie industry, the cloud and hPC. We have now moved one step back into the server and storage side and at the same time diversified to embrace and accommodate the front-end.

Eng Lin goh | CTO, SGI.

Eng Lin Goh, CTO, SGI in a conversation with Geetaj Channana on the evolution of the company after its takeover by Rackable, and their contribution to cloud computing and high-performance computing in the enterprise.

What has changed, in the 18 months since Rackable took

over SGI?rackable acquired Sgi about a year and a half back and changed the name of the merged company to Sgi. What has changed is the addi-tion of the cloud customer base in addition to the hPC (high-perfor-mance computing) and visualization customer base. for me as a CTo, who has been with Sgi for more

than 20 years, i have seen the addi-tion of this new customer base on the cloud side. i see a lot of leverage on both sides – cloud and hPC visu-alization customer base.

We are a major supplier to cloud companies such as Amazon. We have shipped hundreds of racks to the Amazon cloud. When you touch the Amazon cloud you are actually going through an Sgi system. if you are using a motorola Droid, you are using

hPCEnterprise

in the

Page 19: 12 Tech Behaviours

PE RSo n ' S n A M E A Q u e s t i o n o f An swe rs

17 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

Embracing Backend: We have now moved one step back into the server and storage side

Page 20: 12 Tech Behaviours

18 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

A Q u e s t i o n o f An swe rs E n g L i n g o h

You have been talking about one Peta-Flop in a Box,

what is that?We always push the envelope and that’s how we differentiate. on the movie industry side, we differentiat-ed ourselves by ensuring the movie frames in our servers move in an uninterrupted way and we can give the reassurance that not a single frame is dropped. for the movie industry, each and every frame is intellectual property. on that end, the i/o and data throughput is taken care of by us. Then on the hPC side, we are trying to move from teraflop, to petaflop to exxaflop. The problem has been space and power. We are working on the power side right now as a long-term effort. But, for space, we are always working on packing more compute power in a single cabinet. So, Peta-flop-in-a-box is a first step to that goal. We do this by using graphics-processing-units or gPus in a small footprint. But, this is not free lunch – there is a lot of re-programming required to use gPus instead of CPus to get more flops in a box. if someone is ready to do that re-programming we are ready to give them peak-peta-flop-in-a-box today.

What is the kind of customization and

programming required and what are its applications?if you take different levels of com-puting, the traditional level is one CPu core and one piece of memory. When you are writing code it is run-ning on this single core and single piece of memory. The next level is when you need more power from one CPu, you are linking multiple CPus together under one operat-ing system. here you want your program to split into various parts to use all the available CPus. This level of reprogramming is not extreme as you use the open mP model which allows you to use more CPus. The next level up becomes more difficult where the CPus are not under one

climb up that ladder. The applications include predict-

ing climate change in the future. We have examples of people using 10,000 cores for one such simula-tion for creating earth models. nASA, one of our customers, is using a cluster with 75,000 cores, to help detect planets. in science they already using thousands of cores for a single application.

What is Cyclone – your cloud offering?

in the cloud services space we start with the lowest level, iaaS (infra-structure as a Service) like Amazon eC2, the next level is Platform as a Service and the highest level is Soft-ware as a Service where an applica-

operating system, they are essentially a cluster of systems. here you use the mPi programming model which is a bit harder to do. here you explic-itly split your code to run your code in these clusters. And, the highest level of complexity in the code is that it can not only use this cluster, but use graphics processors in the cluster for computing. earlier graphics pro-cessors were only used for drawing, more and more people are looking at using them for computation also.

in the past all this has been ignored in the enterprise space because people were happy doing one processor and one memory. But, now the clock speed has stopped improving, even the enterprise world cannot ignore that now, they have to

“We are always working on packing more compute power in a single cabinet. So, Peta-flop-in-a-box is a first step to that goal. We do this by using graphics-processing-units or gPUs in a small footprint.”

one of the

early successes

of HPC in the

enterprise

world is in Data

Analytics.

We are ready to

give them peak-

peta-flop-in-a-

box today.

The niche for

us will be the

ability to handle

large amounts of

data with deep

analysis of that

data.

things i Believe in

Page 21: 12 Tech Behaviours

E n g L i n g o h A Q u e s t i o n o f An swe rs

tion is given as a service. We provide this service for some sectors like genomics, engineering Design, oil and gas and so on.

We have started this business recently and now we have a number of customers that are using our systems. Typically we build a system based on requirement. We do not have a big outlay of hardware behind that is waiting for customers. Since we are build-ing the hardware, anytime we get an order, we build a system for them. Currently our business is at the SaaS level.

How do you see HPC evolving to the enterprise?

This is something that we have thought of for a number of years now. in order to be a highly successful company we not only have to diversify our feature set, but our market too. rackable's acquisition of Sgi gave us that avenue on the cloud side. The big question is, can we use hPC-class sys-tems in the enterprise?

one of the early successes of hPC in the enterprise world is in Data Analytics. We

realize this more and more that one thing that is common between the enterprise and hPC is data handling. The common problem is dealing with massive amounts of data and making sense of it. We have started selling our big memory systems for doing fraud detection in the enterprise world. for instance, ebay uses our systems for fraud detection in their PayPal system. We have other enterprise customers that are doing the same but prefer not to be named. our systems are also being using for efficient deep packet analysis of internet traffic.

So, as we started niche in the media space before diversifying, similarly we will be starting niche in the enterprise segment also. The niche in this case will be the ability to handle large amounts of data with deep analysis of that data.

Probably in telecom companies in India?

A certain big telco in the u.S. came to us because their main database server grew very large due to mergers and acquisitions.

Whenever somebody tried to call from their phones, it was taking longer and longer for the connection to be made. A large chunk of the connection time is related to scanning the database for that connection. They are using our servers for this now, to handle that large database and do that deep inspec-tion of data when a call is being made on their networks.

What about banks, are they also using it?

We are actually of great interest to the finan-cial services industry, not only to BfSi but to high frequency traders too. These people buy fast computers to do massive amounts of trade in a very very short time. They earn their profit from very small variation in the stock price. They do thousands of transac-tion in a day, that cannot be done manually. They want systems to take decisions very fast at the flutter of variation. We have been very popular with those customers.

[email protected]

Page 22: 12 Tech Behaviours

20 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

Best of

Breed

Status update services, sometimes called micro-blogging, took off in 2010. A Pew research Centre study released last month revealed 8 percent of American adults who use the internet also use

Twitter. using social media tools in the enterprise pits open sharing against corporate controls. it also opens

socialising in the enterpriseeWEEK Labs Technical Director Cameron Sturdevant looks at what’s bringing people, and applications together in social media platforms.

Illu

st

ra

tIo

ns

BY

an

Il t

IO Virtualisation: The “Hypervisor” for Your Infrastructure

fEaTurE InSIDE

a range of integration questions about how best to connect people and applications in an activity stream that is immediately relevant, secure and collaborative.

iT vendors, including Salesforce.com, Socialtext, Socialcast, yammer and a host of others, have taken notice of the social media explosion by releasing a new wave of social media tools for the enterprise. The

share of android based smart -phones shipment in q3 2010 in india

9.4%DaTa BrIEfIng

Page 23: 12 Tech Behaviours

21 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

so ci a l n e t wo rk i n g B E S t o f Br E E D

IT managers have choices when it comes to 'socializing' the non-human elements of a social-media platform

big bang that is the birth of social media platforms includes the initial formation of specifications and integration tools that seek to ease interconnection problems, while maintaining the fast-flowing and lightweight nature of social media interactions.

it’s fair to say that business users aren’t looking for another place to search for the information necessary to do their job. iT managers in larger enterprises may encounter multiple social media platforms inside a single organization.

What’s the best way to use social col-laboration tools with partners? is there a better way to integrate social media and back-end systems? The answer today is that a tangle of integration tools and a dearth of standards mean that iT managers must pay careful attention to a wide range of integration tools to curtail client creep. To this end, there are some emerging efforts that are worth watching.

Connecting social systems Jonathan green, vice president of informa-tion technologies at Den-mat, a dental-care products company, implemented Chatter as part of a broader Salesforce.com roll-out. “We chose to implement Chatter to sup-port our new direct-to-consumer product Snap-on Smile and to collaborate quickly with our vendors, partners and ultimately customers,” he said.

green implemented Salesforce to replace an aging Crm management application running on its iBm AS400. The Salesforce installation was also integrated with a manufacturing component that is still run on premises. Chatter is used to facilitate com-munication between sales and accounting. green indicated that Chatter adoption has been successful enough that he may migrate off an existing intranet and use Chatter to support internal collaboration.

To connect social media systems to your vital applica-tions, vendors such as Cast iron and a host of others use custom-coded templates and reST (representational State Transfer) APis. The good news is that social media tools are no strangers to the integration process. on the consumer side, facebook,

Twitter, linkedin and other social plat-forms can share posts and status updates across platforms.

The not-so-good news is that specific inte-gration tools that are built to support specific platforms are the norm today. for example, there is a specific Salesforce.com integration that links Salesforce’s Chatter social collabo-ration tool with facebook and Twitter. Social-text provides SocialPoint to inter-operate with microsoft’s SharePoint intranet software.

When it comes to connecting the social puzzle pieces, reST APis are the main-stay for posting actions such as a status update into another platform’s activity stream. emerging tools including the Atom programming language and JSon (JavaScript object notation) are being con-sidered for use in social platforms to share updates. Socialtext is exploring a Twitter-supported development called Annota-tions to handle payloads that are greater than 140 characters.

iT managers have choices when it comes to 'socializing' the non-human ele-ments of a social-media platform. unlike classic enterprise process integration, in which data is taken from one application and given to another, social integration takes specific types of events and places them into an activity stream that will be read by a person.

one example of this is the integration provided by Cast iron, which uses templates

to capture noteworthy events from a back-end system (such as an SAP inventory manage-ment system) and releases the data (such as a ship date) into an activity stream that a sales-person will read — all in near real time. This bypasses the batch-process reporting pro-cess that traditionally would have been used to present this information.

People Who Need PeopleTwo standards are emerging to manage the tension between widespread participation and the need for corporate data control. To be clear, these specifications are still piping hot from the forge.

one specification is ActivityStreams, an effort to enrich data feeds between social platforms by standardizing the format used to exchange information. in the consumer world, this means making it easier for plat-forms such as foursquare to exchange sta-tus, comments, bookmarks and news with other sites such as identi.ca. The specifica-tion has been unevenly adopted among enterprise social media tools, but it’s useful as an indication of the work needed to ease information sharing between platforms.

Another specification, oStatus, is an open specification for distributing status updates between different social networks. The goal is to enable disparate social media hubs to route status updates between users in near real time. As is typical of the social media space, both of these specifications are at version 1.0.

further, some of the security protocols that enable social systems to talk with one another and the back-end systems are also fresh from the oven, including oAuth (tinyurl.com/26y9lh8). Thus, iT manag-ers who lean heavily on standards when making technology decisions could get left behind when it comes to implementing social media projects.

securing the socialitesAs the consumerization of enterprise social collaboration pushes forward, the commer-cial-grade social platforms distinguish them-selves from consumer platforms by wrapping security policies that protect corporate secrets around the activity stream. for iT managers, this means that some of the most basic infra-structure — including the directories that hold authoritative data about employees and

34.2%Q-o-Q growth

of smart phones

in india in Q3,

2010

Page 24: 12 Tech Behaviours

22 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

B E S t o f Br E E D so ci a l n e t wo rk i n g

contractors — must be in order for a social collaboration project to succeed.

in fact, while social media products are pushing productivity with consumer-like crowds, iT basics become even more rel-evant to success. A clean, well-maintained directory is necessary to support the security underpinnings that control access.

Almost as important is directory informa-tion, which is essential for populating user profile data. in a nod to the importance of easing employee adoption through simple profile creation, Salesforce.com’s Chatter recently gained the ability to pull in a user’s facebook profile information.

After ensuring that the iT basics are up to snuff, iT managers who are considering a social media integration project must con-sider the security technology used by each of the platforms. According to Sean Whiteley, senior vice president of product marketing at Salesforce.com, the Chatter platform explic-itly prohibits openiD as a user authentica-tion method at this time, although he thinks the standard is a good one for consumer and 'prosumer' applications.

Conversely, matt Wilkinson, the vice president of products at Socialcast, said that openiD is used by reach, Socialcast’s flagship microblogging tool.

related to the authentication methods used to govern who and what has access to the activity stream is the question of single sign-on. iT managers should take care to ensure that any social media plat-form they consider has support for the single sign-on solution already used in the organization.

one of the best ways to prevent a social media platform from being orphaned is to ensure that users can easily access the activity stream without being burdened with another set of credentials.

SOURCE: eWeek.

IOV does to IO in the infrastructure domain what Hypervisor does to software in the application domain. It is in an explosive technology, but don't treat it as a standalone product. By Ken Oestreich

io Virtualisation: the “hypervisor” for Your infrastructure

more than ever in 2010, io Virtualization (ioV) has been showing-up in products, written about, spoken about. Because i’ve had a few years’ experience with this technology, i wanted to give a very brief explanation of the concept,

and focus more on why it will be increasingly important. in particular, i want to draw an analogy where you should view

ioV as a critical enabling feature of future iT management … but not as a stand-alone product. Why? it's similar in concept to how the hypervisor is an enabler (but usually not used as a stand-alone prod-uct) of data centre management services.

This blog is related to my 2009 instalment on fabric as an iT enabler.

Page 25: 12 Tech Behaviours

ad

Page 26: 12 Tech Behaviours

24 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

B E S t o f Br E E D v i r t ua l i sat i o n

2. The hypervisor used to be the focus, but now it’s merely an enabling feature embedded within higher-level iT management products. Those products leverage the hypervisor to perform tasks such as migration, fail-over and consolidation. you should view ioV similarly: it is an enabling feature that will allow for analogous io consolidation, migration and fail-over.3. Where hypervisor implementations and performance used to be hotly-debated, nobody really cares anymore. Today the real *value* is not in the hypervisor, but in the management tools surrounding it. Similarly, ioV should be judged less on how it is implemented, and more on the management tools and automation which manage it.

forrester analyst galen Schreck made a similar observation recently:… Aside from benefits like reducing cabling and switch ports, i

think the most interesting aspect of virtualized io is the ability of a physical server's personality to be moved to any other server in the data center. in addition to the underlying network technology, the thing that makes this possible is integrated management of the server and data center fabric. in most cases, this won't be a stand-alone product that you acquire (though you can build your own solution from infiniBand and PCi express products on the mar-

What is IoV? io Virtualization is an approach whereby physical io components such as network interface Cards (niCs) host Bus Adaptors (hBAs) and Keyboard/video/mouse ports (KVm) are reproduced logically rather than physically. in other words, a physical io port (ethernet, infiniband, PCi, etc.) might logically represent itself to the o/S as different configurations.

Clearly this is convenient because it (a) eliminates multiple costly io devices that also consume power and instal-lation time. But it’s also convenient because io – and it’s associated address-ing such as iPs, mACs, Worldwide names, etc. – can be instantly config-ured with a mouse.

The other consequence of ioV is that a single physical port means a single physical cable. in essence, a server’s logical io is consolidated down to a sin-gle (physical) converged network which carries data, storage and KVm traffic. So this means that no matter how many logical io devices you configure for a server, there is still only a single cable out the back. So ioV yields the ideal “wire-once” server environment that’s still infinitely re-configurable.

The overall value of ioV becomes clear fast: fewer physical io devices to buy, fewer cables to install, zero re-cabling, fewer physical ports to buy, and instantly re-configurable io.

in brief, there are a few differing approaches to io virtualization:n existing on-board ethernet with new io drivers: (e.g. egenera)n Converged networking Adapters (e.g. Qlogic, emulex)n Appliances + high-throughput io devices (e.g. Xsigo)n existing physical io but with address hardware-based mapping/virtualization (e.g. hP VirtualConnect)

Putting IoV in Perspectiveyou should think of ioV using the following analogy: The way in which the hypervisor abstracts software in the application domain, ioV abstracts io and networking in the infrastructure domain. (however, to be clear, ioV is not a software layer unlike the hypervisor)

This analogy leads to a few more observations:1. Where the hypervisor added software portability in the software domain ioV will do the same for the infrastructure domain. high-er-order services like hA and consolidation were made possibly by the hypervisor. Similarly, hA, Dr and migration can be accom-plished with ioV. And what’s more, a hypervisor is not required for ioV, so you can use ioV with native applications too.

APPOS APP

OS

APPOS

OS, Application

Server

Today's Physical Infrastructure

I/O (NICs, HBAs)

Cabling

HyPervISION

I/O vIrtuAlISAtION

NetwOrk/StOrAge

Switching

vNICnetwk

vNICnetwk

APPOS APP

OS

Server

Differing Implementation

Approaches

HyPervISOr

I/O vIrtuAlISAtION

vIrtuAl SwItCHINg

vhbAnetwk

vhbAnetwk

— source: K. oestreIch

APPOS

Page 27: 12 Tech Behaviours

ad

Page 28: 12 Tech Behaviours

ket). This capability will most likely be an integrated part of whatever server and network environments you select, but now is the time to begin planning how you'll tie it in with the rest of your system manage-ment environment.

Io Virtualisation in the It Management Landscapehow might io virtualization be used as part of the iT ecosystem in an integrated manner?

in much the same way that the hypervisor has since been embedded in tools like Vmware’s vCenter, ioV can (and has been) embedded with higher-level management tools.

Taking an example i’m rather familiar with, egenera’s PAn manager Software surrounds ioV technology with facilities such as integrated with converged fabric networking, server boot control and storage connectivity. When used alongside these and other services, ioV enables:Server high Availability: in the case of hardware failure, a server’s infrastructure state (io addressing, storage naming, net-work topology and workload) can be re-instantiated on another bare-metal server. This provides a ‘universal’ style of failover that doesn’t require clustering software. And what’s more, the failed-

over server workload could be a native oS, or a Vm host. ioV is agnostic to the workload!Disaster Recovery: expanding on the example above, if an entire domain of servers fails, the entire group of server io states, networking states, etc. can be recovered onto another domain (assum-ing shared/replicated storage). This approach to Dr is elegant because it fails-over not just work-loads but the entire logical server/environment configuration as well.Scaling-Out: where a series of server profiles can be instantly replicated into an instant cluster. Work-loads, niCs, hBAs, networking addressing and storage connections (complete with fabric-based load

balancing) can all be cloned … starting with the io and networking profiles, made possible through ioV.

in future blogs i’ll dive more deeply into how software-based ioV operates as part of the iT management ecosystem, and why it is a popular approach because of its cross-platform compatibility in a heterogeneous data center.

—Ken Oestreich is Vice President - Product Marketing at Egenera

4.6%forecasted

growth for it

services in 2011,

according to

gartner

B E S t o f Br E E D v i r t ua l i sat i o n

Page 29: 12 Tech Behaviours

ad

Page 30: 12 Tech Behaviours

B E S T O F BR E E D ca s e s t u dy

28 07 january 2011 cTO FORum The Chief

TeChnologyoffiCer forum

however, this wasn’t the only challenge that had to be dealt with. “our distributed iT architecture had made this difficult,” says m. Sathyanarayana, erP project manager at SCCl. manual integration of processes for purchasing, sales and distribution, finance, stores, and payroll resulted in duplicated data entry and paper-based processing that wasted time and caused errors.

f or a coal company in india which has an order book much bigger than its produc-tion capacity, timely delivery is the key to success. Singareni Collieries Company limited (SCCl) currently operates 13

opencast and 42 underground mines in four districts. The $1.4 billion company is also one of the largest coal mining companies in the country.

While the company has iT set-up in all its branches, the challenge for SCCl was to integrate and streamline opera-tions at multiple locations for enhanced decision making and business consolidation. With either manual or dis-integrated systems, there was no central management of information leading to frequent delays in delivery causing financial losses in terms of loss of opportunity. A com-pany that produces 50 million tonnes of coal per annum, integrating all its units and streamlining the processes was perhaps more complex than mining coal.

Integrating Diverse SystemsWhile thinking of deploying an erP to solve the prob-lem might sound easy, the bigger hurdle that lay ahead of the company was its own 70,000 employ-ees who feared delays in payments with the new sys-tem. The change management process had to be kicked in before any formal rollout could take place.

Digging out Inefficiencies

Case study | Sap

challenge: For Singareni CollierieS was to integrate and streamline operations at multiple locations for enhanCed deCiSion making and business consolidation.By Varun aggarwal

Key Objectives of the Project Provide integrated view

of operations at various

locations

Support real-time data

capture and processing for

supply-chain functions

Improve inventory visibility

Reduce paperwork and

manual processing

Streamline payroll process

for transferred employees

Reduce IT maintenance and

other costs

Key Performance Indicator Impact Time to process sales

orders – reduced by 50% Days to close annual

accounts – reduced by 50% Time to settle advance

payments – reduced by 40% Duration of purchase

requisition cycle – reduced

by 98% Time to generate coal bills –

reduced by 95% Unmanaged spend –

reduced by 55%

Project Highlights

Page 31: 12 Tech Behaviours

29 07 january 2011 cTO FORumThe Chief

TeChnologyoffiCer forum

plus an alert framework within the application, has significantly improved decision making. integrated materials management has given SCCl bet-ter control over stock and inventory. “Timely provisioning of spare parts and other items for maintenance, repair, and operations has increased the availability of essential equipment and made it easier to meet production targets,” Sathyanarayana opined.

“We have reduced the overall cycle time for sales order processing from months to days, cut the time for set-tling advance payments made against sales orders, and increased customer satisfaction,” adds n. V. rajasekher, superintendent engineer for market-ing and movement at SCCl.

There has also been a significant decrease in the time needed to close annual accounts. Singareni is the first coal company in india to use an SAP solution–supported balance sheet in the first year the new soft-ware was implemented.

The company can now manage and control spending at the enter-

prise level. The new software, which supports 300 to 400 items related to material requirements planning, has significantly reduced the purchase requisition cycle and eliminated accounting at individual store locations.

increased integration has also facilitated better procure-ment policies, encouraged collaboration with suppliers, and significantly reduced stock-outs at plant locations. in addition, paper consumption related to the accounting process has dropped significantly.

“The four SAP modules we’ve added are like the first floor of a building that will help us build many floors in the future,” says m. Sathyanarayana, erP project man-ager at SCCl.

“Today, SCCl is a truly integrated enterprise. As we con-tinue this journey, we hope to leverage other functionalities and develop a robust business intelligence platform that will further enhance decision making.” J. V. Dattatreyulu, Direc-tor of operations, Singareni Collieries Company limited

next StepAfter reaping the fruits of a successful erP implemen-tation, SCCl is planning to implement SAP’s man maintenance module which is very useful for the coal mining industry. “We are also planning for certain hrm and Crm modules within the next six months or so,” Sathyanarayana.

in addition, the company could not process data for logistics and financial supply chains in real time. inventory visibility was poor, and distributed han-dling of payrolls for employees who moved from mine to mine led to errors that had to be manually corrected.

To handle these challenges, SCCl chose financial, con-trolling, materials management, quality management, payroll, and sales and distribution software in the SAP erP application. Key to this choice were strong SAP refer-ences from comparable public sector enterprises in india. Also important were SAP’s global support infrastructure and mining-focused functionality.

one of the first public sector companies in india to undertake a large-scale, enterprise resource planning (erP) implementation, SCCl rented the hardware it needed early in the implementation rather than trying to purchase it. This minimized procurement delays that are typical in public sector installations. iT employees were thoroughly trained on SAP technologies and now main-tain the software with little external support. Development of certain applications prior to implementing SAP erP facilitated data migration.

The BenefitsWith SAP erP in place, information is more visible throughout the enterprise and available in real time. This,

M. SatHyanarayana, eRP Project Manager at sCCL has moved from a segregated infrastructure model to consolidated infrastructure

COMPANY DASHBOARD

Company:Singareni Collieries Company Ltd.

industry:

Mining

revenue:

$1.423 billion

employees:

70,000

headquarters: Hyderabad, India

Page 32: 12 Tech Behaviours

30 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

What They Really Say About You

What they say about you

Page 33: 12 Tech Behaviours

31 07 JANUARY 2011 cto forumThe Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

Are you always on email or do you forget to charge your phone? Each of your tech behaviours, says something about you. See which behaviour describes you the best.

ur behaviours essentially define who we are. How we choose to

conduct ourselves when it comes to interacting with technology speaks

volumes about who we are and where our priorities lie. Are you a classic

early adopter or a technology Luddite? Are you constantly texting away on a tiny

mobile gadget, or do you look to unplug as often as possible? Do you use technology

as a way to connect with others, or as a shield to avoid real human interaction? To find

out more about what these and many other tech traits communicate to others about

who you really are, CIO Insight consulted with Melody Brooke, a Richardson, Texas-

based licensed counselor to professionals. The author of the book "Oh Wow, This

Changes Everything" (Changes Press/Available now), Brooke is also host of the radio

programme, Wake Up Call. CIO Insight asked Brooke to come up with a dozen “tech

behaviours,” and interpret for us what they say about who we are – not only in our

personal lives, but in our professional lives as well.

Based on these findings we ran a small survey with our community in India to see what

their tech behaviours are. Here are the results - no pun intended.

CA

RT

OO

NS

BY

HA

RS

HO

MO

HA

N C

HA

TT

OR

AJ

Page 34: 12 Tech Behaviours

32 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

“I am only on Linked In. I may get back to Facebook soon, since we have a beta

project in Holcim to see how we can sell cement using

facebook. Why not?”

Prince AzariahHead IT Services, ACC

“I'm on a half-dozen or more social network sites every day”

ThIS SAYS:You're determined and ambitious. You gain rewards by building a lifetime of valuable

connections. On the troublesome side, however, you may spread yourself too thin.

@master: come on, give me the bone, already! #Epicfail

Are you on practically all the relevant social networking sites?

32%YES

68%NO

SELF ASSESSMENT

YES

NO

Page 35: 12 Tech Behaviours

ad

Page 36: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

32A 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

“I’m always checking my iPhone when dining with my significant other”

“Not required. As I use it primarily for mails and messages and I get alerts for both. I do not keep it on

always.”Subhasish Saha

CTO, Apeejay Surrendra Group

ThIS SAYS: You may be commitment and/or intimacy challenged.

In the office, you may detach yourself emotionally from colleagues, ultimately hurting your career.

Only if he ever listened to me, would he know that I need

BONES, not Spaghetti.

40%YES

60%NO

Are you always checking your phone even when you are with

your significant other?

SELF ASSESSMENT

YES

NO

Page 37: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

33 07 JANUARY 2011 cto forumThe Chief

TeChnologyoffiCer forum

“If I don't weed out the unwanted ones from the important ones, it will be difficult to manage the

emails.”Lalit Wadhwani

CTO, Frameboxx Animation & VFX Ltd.

“I keep every single piece of e-mail I've ever received”

ThIS SAYS:You're a pack rat, and maybe even compulsive. On the plus side, you may be perceived as the top “institutional authority” within your organisation – the one who can be depended upon to keep track of everything that's happened over the years.

Enough is enough, take all the mail

out of the Dog house RIGhT NOW!

Do you keep every single email/ SMS that you receive?

16%YES

84%NO

SELF ASSESSMENT

YES

NO

Page 38: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

34 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

“I Google every source I can before buying a tech toy”

“No, I go by self analysis, reference and proof of

concept.”

Rajeev BatraCIO, MTS India (Sistema Shyam

TeleServices Ltd.)

ThIS SAYS: You make smart, informed decisions.

As a manager, you are highly analytical.

If your search is over,

the house is on fire!

Do you google every tech application to reach a buying

decision?21%YES

16%NO63%

SOMETIMES

SELF ASSESSMENT

YES

NO

Page 39: 12 Tech Behaviours

35 07 JANUARY 2011 cto forumThe Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

“There is no time even to do it once a day. Secondly the access to social networking is blocked by our system

administrator.”

Bihag LalajiVP (Special Projects), Ambuja

Cements

“I do status updates 10 times a day”

ThIS SAYS:You feel “invisible” out there. You could be the kind of manager who's always writing

a memo to the “big bosses” simply to justify your existence.

And he would be using the same

phone again at dinner.

Do you update your status on social networking sites 10 times

a day?

100%NO

SELF ASSESSMENT

YES

NO

Page 40: 12 Tech Behaviours

36 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

“I curse at my computer screen when it freezes up, or the Internet

connection is slow”

“Being responsible for all systems and IT -- the curse

will come back to haunt us..”

Rajeev BatraCIO, MTS India (Sistema Shyam

TeleServices Ltd.)

ThIS SAYS: You feel like you always have to be in control, even of situations that you have no control over. Your employees may feel that you'd be happier if you did all of their jobs for them.

I am sorry!I did not take the bone. Is it really about the bone?

Do you find yourself cursing when your system freezes or is

slower than expected?

23%YES

28%NO

49%SOMETIMES

SELF ASSESSMENT

YES

NO

Page 41: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

37 07 JANUARY 2011 cto forumThe Chief

TeChnologyoffiCer forum

“I know it is dangerous, but it is adrenaline.”

Anil AroraDy.GM, Raymond Limited

“I'm always texting when I drive”

ThIS SAYS:You're narcissistic and somewhat reckless. At work, you likely think that the rules don't apply to you.

I wish I could turn his phone

into a bone. RIGhT NOW!

Do you text when you drive?

4%YES86%

NO

11%SOMETIMES

SELF ASSESSMENT

YES

NO

Page 42: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

38 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

“I'll keep a tech device for years. Being 'trendy' means nothing to me”

“EOL and discard keep us uncluttered with junk.”

Lalit WadhwaniCTO, Frameboxx Animation &

VFX Ltd.

ThIS SAYS: You're thrifty and manage resources well. You're also likely to keep a car for 200,000-plus miles, and are equally nurturing and invested in your personal and professional relationships.

hey babe! Know what, I just saw a

rotary phone.Guess who has it?

Do you cling to your gadgets beyond its point of usefulness?

9%YES

67%NO

25%SOMETIMES

SELF ASSESSMENT

YES

NO

Page 43: 12 Tech Behaviours

39 07 JANUARY 2011 cto forumThe Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

“Yes till it breaks down. It is a way to keep the asset and

maximize its return.”

J.RameshGM- IT, MIRC Electronics Limited

“I never replace a gadget ever. Even if it's beyond the point of usefulness"

ThIS SAYS:You're resistant to change. As a manager, you may be in danger of ignoring important business shifts.

Don't tell me,do you really think this will ever work?

Are you an early adaptor to technology?

61%YES

39%NO

SELF ASSESSMENT

YES

NO

Page 44: 12 Tech Behaviours

40 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

coVE r S torY 12 T e ch B e h av i o u rs

“I never remember to charge my mobile devices”

“No, I will die, if I will be disconnected from

the world.”Vivek Dharia

CIO, KNP Sec. Pvt. Ltd.

ThIS SAYS: You're a classic absent-minded genius, so lost in thinking “big thoughts” that the little things slip by.

Why do you always have to take my phone?

4%YES

68%NO

28%SOMETIMES

Do you forget to recharge your mobile devices?

SELF ASSESSMENT

YES

NO

Page 45: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

41 07 JANUARY 2011 cto forumThe Chief

TeChnologyoffiCer forum

“E-mail - because it is a written document and can

be kept as record. We tend to forget phone conversation. Face-to-face is ok but time

consuming.”

Kazim MerchantACM IT, CMIFPE Ltd

“I only communicate via Email or text. I don't do phone or face-to-face”

ThIS SAYS:You're highly efficient. But, that efficiency comes at the price of appearing aloof.

Yeah, I just bought

shares in his phone

company.Lots of

bones now!

How do you prefer to communicate?

53%E-mail

30%Face-to-

Face

18%Phone

SELF ASSESSMENT

YES

NO

Page 46: 12 Tech Behaviours

coVE r S torY 12 T e ch B e h av i o u rs

42 07 JANUARY 2011 cto forum The Chief

TeChnologyoffiCer forum

“I'm always Googling myself”

“Why would you do that, you narcissist.”

“To show someone that I am being quoted on Internet.”

Prince AzariahHead IT Services, ACC

Bihag LalajiVice President (Special Projects),

Ambuja Cements

ThIS SAYS: You're insecure about what people are saying about you. It's OK to be mindful of your public persona – so long as you don't allow this to overwhelm you.

SELF ASSESSMENT

YES

NO

Mirror mirror on the wall , who is the dumbest of them all?

28%YES

37%NO

35%SOMETIMES

Do you often find googling yourself?

Page 47: 12 Tech Behaviours

43 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

NEXTHORIZONS Feature InsIde

ph

ot

o b

y p

ho

to

s.c

om

Getting the right tablet Pg 46

information technology has been a part of our lives for almost four decades. While we’ve seen dramatic decreases in cost and increases in capabilities, we are still faced with

fragmented architectures, failed invest-ments and consistently delayed projects. What have we learned from our successes and what have we learned from our mis-takes? how can your organisation better structure its processes for developing and updating information technology strategy?

Those who do not learn from history are destined to repeat it, said george Santayana, many years before the development of tech-nology strategy. With that in mind, here are some of the most common mistakes that wise Cios and iT managers can learn from:

Mistake 1: Identifying new tech-nology and trying to develop ways to apply it to your organisationexperience shows us that projects succeed or fail based on their alignment with busi-ness requirements. many times organisa-tions have tried to “back-end” technology plans by attempting to match them with elusive prospective business gains. hard-ware and software vendors are notorious

Learning from mistakes and looking at It projects through the eyes of the business will greatly reduce failure. Here are some mistakes to avoid. By MalcolM Slovin

Ways to Avoid Screwing Up

Page 48: 12 Tech Behaviours

44 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

N E X t H or I Zo N s proj e c t s

in their encouragement of this. While technology often presents opportunities for altering business capabilities, linkages must be carefully analysed and pilot busi-ness metrics defined.

Mistake 2: Assuming that project costs include hardware and/or software onlymany projects run over-budget as a result of incomplete estimation. ensure that any pro-posed project includes all the costs through project implementation and maintenance, including those that are both direct and indirect. estimates of project cost range from 7-10 times the cost of the software or hardware alone.

Typical project costs often include sup-porting system and application software and hardware as well as training. Don’t forget software maintenance (frequently 15 percent of product cost) as well as the human costs of implementing new pro-grams. A frequently forgotten cost is the loss of productivity during the learning curve of system implementation.

Mistake 3: Considering only the technological implications of proposed initiativesThe iT implementation landscape is littered with failed projects that underestimated the impact of technology projects on organisa-tional processes, metrics, reporting struc-tures, customer perceptions and employee morale. Technology is best considered a component of the strategic triumvirate – the other two being process and culture. Attempting to implement a new technology without considering the implications for supporting mechanisms often dooms an initiative to failure.

Mistake 4: Not identify-ing and implementing risk-mitigation plansnew projects, like new rela-tionships, often begin with rosy scenarios only minimal-ly infused with cognisance of potential risks. While this enthusiasm can help drive the momentum of project success, it often does not prepare the organisation for

the risks likely to be encountered along a project route.

A good project implementation plan should try to identify the risks to project suc-cess; making sure to include non-technical risks such as vendor viability, process target resistance, and potential changes to organi-sational strategic variables such as competi-tive pressures and reduction of resources.

Mistake 5: Not learning from (and continuing to fund) poorly performing projectsmany organisations have two kinds of metrics: stringent metrics about project outcome expectations that precede project funding and project efficiency metrics that commence after project funding. Without active efforts to compare expected to actual business results, the organisation’s project selection process remains stagnant.

Almost all project selection methodolo-gies can benefit from post-project audits that improve future selection efforts by actively incorporating lessons learned. This helps the organisation prune efficient but not effective projects as it improves future project selections. it’s crucial that this effort be managed in a fault-free environment. Blame-gaming discourages frank assess-ments and attributions of project success.

Mistake 6: Inadequate communication with business staffTechnicians often have a lim-ited view of communication targets to include only other technicians and organisational management. it’s often neces-sary to appeal to a wider audi-ence in order to build support (and minimise resistance) for the new project. often

forgotten constituencies include functional management, functional staff and indirectly impacted staff.

Business-directed communication should include the expected business results of the project, impact matrices including schedule of expected changes for all relevant stakeholders, and summary project status. Communications should be targeted for each stakeholder class with technical jargon kept to a minimum for all but technical audiences.

Mistake 7: Failing to integrate new systems, processes and technologies with existing investmentsPrint off a comprehensive systems and soft-ware list from any fairly large organisation and you will see a hodge podge of architec-tures, languages, databases and telecommu-nication protocols. This is most likely the result of development efforts undertaken at different points in time when different gen-erations of technologies were available.

While it is impossible to perfectly antici-pate the future, a modular architecture that provides flexible integration of these systems together with an adaptable growth path for future technologies is crucial. This architecture should be updated on a regular basis as new architectural tools and tech-nologies become available.

Mistake 8: Inadequate documentation and knowledge managementThere are often two kinds of project docu-mentation: business focused pre-funding documentation and technically focused post funding documentation.

Technology strategy would be improved by reworking both types.

Project nomination documentation

15%of product

cost is the cost

of software

maintenance

New projects, like new relationships, often begin with rosy scenarios only minimally infused with cognizance of potential risks.

Page 49: 12 Tech Behaviours

45 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

proj e c t s N E X t H or I Zo N s

should include measurable business met-rics that can be audited and updated based upon results. Post-funding documentation should include detailed records of all chang-es to processes, related applications, and databases so that those people not actively involved in the project are able to easily track the sources of failures that may occur long after project implementation is com-plete. Technology strategy knowledge often leaves an organisation in the head (or the files) of the person in charge of a specific project selection or implementation.

Mistake 9: Over-centralisation of IT functionsAs organisations have recognised the value of technology, many have restruc-tured around the Cio function, providing large budgets and even larger expectations to technology managers. While this cre-ates an opportunity for standardisation and synergy, a centralised iT function is often focused more on efficiency than cor-porate effectiveness.

Any central iT function must have active outreach programs to business groups to constantly improve the project selection, requirements identification, project metric determination and project management functions.

Mistake 10: Enabling ‘rogue’ IT projects through over-decentrali-sation of the IT functionorganisations whose centralised iT func-tions are not meeting the needs of the

business areas often find themselves with "unofficial" technology (i.e., shadow iT, rogue projects and, now, stealth cloud) efforts funded and managed by their busi-ness areas. While such proj-ects are more likely to achieve their business metrics, they can suffer from lack of integra-tion with other efforts. Costs, both human and systems, for such rogue projects are often duplicative. rogue iT organisations are often a valuable aid in improving an organ-isation’s technology health by focusing attention on ways that technology business service can be improved.

A Framework for Improvementlearning lessons from these common iT mistakes is vital to avoiding future mis-steps. here are three specific things that every Cio and iT manager can do right now to make their iT strategy more effec-tive and more efficient:

Assess and improve your project align-ment processes. Do you have post-

project audits and an experienced-based, business metric centric project selection structure? Do you know which investments have led to your biggest (and smallest) busi-ness gains? What have you learned about selecting projects? how have you applied this knowledge?

Check the integration of technology in your organisation. Do you anticipate

and plan for process and cul-ture changes needed for proj-ect success? is your architec-ture modular to enable flexible growth? Can new projects take advantage of data and applica-tions that preceded them?

improve project man-agement to better serve

your business areas. Assess requirements analysis and project communication efforts to see how they can better

serve the business areas. Check business line satisfaction with central iT. identify rogue projects that may be symptomatic of larger problems.

improving your organisation’s approach-es for alignment, integration and project management can significantly improve the success of your information technology efforts. Simple ways to begin are in the pro-cesses and metrics that surround project selection and assessment. Begin post proj-ect audits to improve knowledge manage-ment and documentation. include in every project nomination and/or implementation plan sections for risk mitigation and project re-use (mandated inclusion of previous project tools and or results). identify your organisation’s own lessons learned and ensure that they are incorporated in your metrics and processes.

This article does not touch on all common iT mistakes and certainly does not include all possible remedies. however, constantly assessing the relationship between technol-ogy, process and culture is the key to learn-ing from and avoiding iT mistakes. review the effectiveness of iT as seen through the eyes of the business and through the exis-tence of rogue projects for a leaner, more effective iT strategy.

Improving your organisation’s approaches for alignment, integration and project management can significantly improve the success of your information technology efforts. simple ways to begin are in the processes and metrics that surround project selection and assessment

14.9%growth of

worldwide

enterprise

social software

revenues

1

2

3

— Malcolm Slovin is vice president for EM&I,

which offers innovative solutions in the areas of

strategy, governance and engineering.

To see more articles on this or any topic affect-

ing IT today, please visit www.cioupdate.com, a

premier destination site for CIOs, CTOs, and IT

executives from around the world.

Page 50: 12 Tech Behaviours

46 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

N E X t H or I Zo N s ta b l e t s

The tablet market is dominated by a handful of devices. Chief among them, of course, is the Apple iPad. But, through early 2011, several more companies will join the fray in an attempt to capitalize on that space and steal some market share away from Apple. Whether or

not those products will be successful is anyone’s guess at this point. if anything is clear, it’s that the tablet market, at least for the foresee-able future, will be the one to watch.

Getting the Right Tablet Our guide should help you narrow your choices when you introduce tablets to your enterprise. By Don ReiSingeR

Companies today are realizing that providing employees with tablets isn’t such an outlandish idea. not only do slates provide outstanding mobility, but they can deliver on hopes for cost-savings and improving productivity compared with convention notebooks, for some users.

read on to find out important features of tablets that are available and will be available soon. This should help you narrow your choices down when you finally decide to bring tablets into your operation.— This article was first published at www.cioinsight.com.

Features Apple iPad Samsung Galaxy Tab HP Slate 500 Cisco Cius RIM PlayBook

Operating system

iOS 4 Android 2.2 Windows 7 Android Blackberry Tablet OS

Connectivity

Wi-Fi only in some models, Wi-Fi and 3G in more expensive models. Available on Verizon and AT&T in the U.S. Indian carriers

yet to announce plans.

Wi-Fi, and 3G available on all major carriers in the U.S.

Wi-Fi-onlyExpected to have both Wi-Fi and 3G

capabilities built-in

Wi-Fi only out-of-the-box, with 3G and potentially 4G to be made available over time.

Office editing Yes, through native application or with the help of third-party

programs.

Comes with ThinkFree Office Mobile to edit Office docu-

ments

Boasts support for a full version of Office, thanks to Windows 7

Likely will have Office document editing through the help of third-par-ty application, as in the Galaxy Tab

The PlayBook will be shipping with Office editing

capabilities

Productivity

A mixed bag. The 3G capabilities help, but the device is decidedly consumer- focused when apps

are factored in

Features multitasking, which should help, but Android

still has some design flaws and quirks that might hold

employees up

Features a full version of Win-dows 7, providing employees with the same OS environment

they’re used to

The Cius will likely run Android 3.0. At this point, little is known about the mobile OS, and IT staff should

evaluate it before deploying

Features a new, unproven operating system. IT staff should evaluate it prior to

deploying

Integration with existing infrastructure

Simple functionality: back up contents to PCs, able to access

network

Simple functionality: back up contents to PCs, able to

access network

Windows 7 turns it into any other PC in the office, giving it

equal functionality

Can be integrated into Cisco products to double as a video-

conferencing tool and other options

Will connect to BlackBerry Enterprise Server and will

likely operate as any Black-Berry smartphone.

IT ControlFull administrative control, includ-ing access to programmes and

allowed content

Remote wipe is available, but remote application manage-

ment is still lacking

Full control that IT staff employs on Windows PCs in their

operations

Unknown. Will likely offer more IT control than existing Android-based

devices

Full details are cur-rently unknown, but will

likely feature most (if not all) controls found on BlackBerry

smartphones.

Business apps avail-

ability

Several, thanks to App Store. However, beware of many more

consumer-focused apps

Android Market is so far, designed for smartphones, leaving the Galaxy Tab out

Ability to install standard Windows programs on device,

thanks to Windows 7

Will likely feature apps designed for tablets, and made available through

Android Market

BlackBerry App World will feature apps designed

specifically for the tablet

Multi-taskingYes, but it was only recently

implementedYes Yes Will have multi-tasking Will have multi-tasking

Security concerns

Phishing and network attacks are possible, but Windows-focused

malware cannot hurt it

Phishing and network attacks are possible. Concerns are also arising over security of

Android apps

Can be targeted by Windows-focused malware. Phishing

and network attacks are also possible

Phishing and network security will be a concern. However, OS-based

issues are unknown

Phishing and network security will be a concern. However, OS-based issues

are unknown.

Price Starts at $499, in the U.S.Starts at $399, depending on

data plan, in the U.S.Starts at $799, in the U.S. Unknown Unknown

Page 51: 12 Tech Behaviours

hiddentangent

47 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

the author is Executive Editor, CTO Forum Geetaj Channana [email protected]

From Smartphone to Superphone The humble mobile gets elevated to a new status

The way the cellphone has trans-formed and taken over our lives is a marvel in itself.

phone in, it launches its own ver-sion of bare-bones linux. Besides other basic multimedia utilities it has a flash enabled firefox browser that can be used to access any of the numerous web-applications. While in this web-top view, you still have full control of the phone and can use it in a separate window on this oper-ating system – it can be used to make calls or access applications on the phone. So, if you want to send SmS or play games on your phone while connected, you can easily do it while it is docked. And, all this is done without losing your session on the mobile phone – so if you were load-ing a video on the phone it will still keep loading when you dock it. And, when you un-dock it, you can still access the tabs that you had opened in the browser in the web-top view. how cool is that?

for the enterprise, it comes with a beautiful hidden surprise. This docked netbook also includes Citrix connectivity to connect to a virtual desktop on your enterprise Citrix server. So, if the user wants to do processor-intensive content creation, they can connect directly to a micro-soft Windows environment hosted on your enterprise server. imagine the flexibility and the security options that it gives to the Cio. now you have a device that can serve as a netbook for regular tasks or an extremely capable phone when it is not connected.

When mobile phones were first launched, who would have thought that one day, the small hand-helds would be as or more powerful than the computer, play videos like your television or serve emails to you like your laptop? The way the cellphone has transformed and taken over our lives is a marvel in itself.

As was evident at the Consumer electronics Show in las Vegas, the mobile phone is the centre of the world, and more than half of all tech-nology coverage is around mobility – be it phones or tablets.

But, what really takes the cake is the latest offering by motorola – the motorola Atrix. it really stretches the boundaries of what a mobile phone can accomplish. Powered by google Android 2.2, a dual core processor, 1gB rAm and 4g network capabil-ity, it has more firepower than some netbooks. But, the hardware is not the only differentiator – it is the way the Atrix changes its form that is most exciting, both for the individual as well as the enterprise.

Straight out of the Transformers movie, the phone can transform into a PC, a netbook or a television. Starting with netbooks, the phone can be attached to a netbook dock-ing station – which is essentially a dumb-terminal-netbook. it is an lCD screen, track-pad, uSB ports and a battery with a built-in dock for the phone. As soon as you dock the

But, the Atrix is something else too – it is a mini media centre. using another dock – called the hD dock, you can connect it to a Television or a Keyboard/ mouse/ monitor to con-vert it into a media center or a PC. While the PC has a similar interface as the netbook, the media centre gets even more interesting. As soon as you switch to this view the system that loads up on the TV shows large icons that can be viewed from a 10 ft. distance. This dock can then be oper-ated by using an infra-red remote control that is already provided. now, you can watch all the videos/ pho-tos on the phone or listen to music already stored, from your couch. you can switch to the full web-top view to access the full-blown operating system. While in the web-top view on the TV, the phone can be used as a track pad with left and right buttons, and the phone’s keyboard can be used as a keyboard to type on.

Phew, isn’t that a bit much? not really, google the lenovo ideapad u1 for more hybrid goodness.

Page 52: 12 Tech Behaviours

48 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

t E cH f or G oVE r NAN cE ch a n g e

5POINTS

Bottom line: It’s a whole lot easier

for you to give them

what they want.

Roi:Faster time to revenue

costs:Lower costs of

acquisition and

implementation

Reseponse: Increased responsiveness to

business changes

peRfoRmance: Predictable

performance and

lower risk

In this article, we look at why converged infrastructure may make sense for your organisation; and provide some guidance on how to sell your decision in-house to the business folks. By Ken Bylsma

How to Sell to tHe Ceo on Converged Infrastructure

Illu

st

ra

tIo

n B

Y B

Ine

sh

sr

ee

dh

ar

an

Page 53: 12 Tech Behaviours

49 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

ch a n g e t E cH f or G oVE r NAN cE

if you could get your servers, storage and network assets working effectively together under one operating management system behind a single pane of glass, your entire iT infrastructure (as well as your iT staff) could be humming along. load balancing would be automated, downtime would be minimised and your team would spend less of its time holding the data centre together by sheer force of will.

Pitching your Ceo or Cfo on a com-mon modular infrastructure of virtualised compute, memory, storage and network resources, however, ain’t gonna cut it. few Ceos and Cfos will respond enthusiasti-cally today when you sing the praises of “a common, wired-once, virtual i/o network.”

The so-called “converged infrastructure” has these attributes, but outside of the iT department, converged infrastructure tends to sound like another request for money for some trendy new technology.

Ceos and Cfos have their own param-eters that every request for funds for tech-nology has to meet, which, if you translate it out of their arcane financial jargon, comes down to “What’s the bottom line?”

This article looks at how you can articulate the business case for a phased approach to implementing a converged infrastructure in terms that Ceos and Cfos can understand and appreciate. The bottom line for the business side: it’s a whole lot easier for you to give them what they want.

Crossing the great business/IT divideCeos and Cfos have been talking about their vision of aligning iT with the overarch-ing business goals of their organisations for as long as iT professionals have been talk-ing about their vision of “utility computing,” a.k.a converged infrastructure. in translat-ing their respective visions into a common

language you find, in fact, that everyone on both sides of the business/iT divide has been talking about the same thing.

Ceos and Cfos who have been reading about the financial merits of cloud comput-ing in their trade magazines are already half sold on a converged infrastructure. finance types are naturally attracted to the idea of cloud computing because they recognize economies of scale in the cloud model. They look at cloud and see shared resources, on-demand provisioning, and the ability to re-deploy capacity somewhere else as needs change. it sounds like pay-as-you-go, and it is music to their ears.

you can use the same list of benefits to support implement-ing a converged infrastructure that your Ceo has read about for cloud computing. for example: Faster time to revenue – the advantage of on demand provi-sioning of compute capacity, in your data centre. Lower costs of acquisition and implementation – the result of a simplified and standardised infrastructure. Increased responsiveness to business changes – an easier to manage infrastruc-ture frees up your time and makes it easier to give them what they want. Predictable performance and lower risk – systems that are designed to work together run better and break less.

Position of Strengthyou can add that a converged infrastructure can be implemented incrementally as your budget and resources allow. With virtualisa-tion, which saves your Cfo lots of money, you’ve already done most of the work.

experience with a converged infrastruc-

ture also puts you in a position of strength if you subsequently decide to move select sys-tems into a public cloud and need to negoti-ate terms with a cloud provider. having a cloud in your own data centre, you’ll already know what you need, and how it works.

The primary risk associated with imple-menting converged infrastructure is doing things in the same old piecemeal way. Sprawl can happen much faster with virtual servers than with physical servers. instead of thinking about adding a new server for a new application, think adding capacity, even better think shared capacity. instead of thinking three-year life cycle, think on-demand. instead of thinking that business guy who was just in my office is out of his freakin’ mind, think self-provisioning (with-in guidelines that you establish, of course).

you have to think differently or you won’t realise all the benefits of converged infrastructure.

There is more to a functioning converged infrastructure than innovative technology. To truly align iT with business, everyone, including iT, has to understand the busi-

ness requirements. Commu-nication between iT and the business side, as a result has to be much better than it has been in the past.

in fact, communication within the iT department has to be better than it is in most iT departments. implement-ing a converged infrastructure requires breaking through the feudal dynasties that have grown up around the server,

storage, and networking specialities that exist in most iT departments. A key step in converging the technologies is converging the competing cultures into a single well-coordinated team.

—Ken Bylsma is the director of HP Storage &

Software Solutions at Logicalis, an international

provider of integrated information and com-

munications technology solutions and services,

where he is responsible for building solutions

around HP Storage and Software products.

To see more articles on this or any topic affect-

ing IT today, please visit www.cioupdate.com, a

premier destination site for CIOs, CTOs, and IT

executives from around the world.

70%time of it

departments is

spent in putting

out fires

Most IT departments spend 70 percent of their time putting out fires and only about 30 percent responding to the needs of their business users. you might think, “There must be a better way.”

Page 54: 12 Tech Behaviours

50 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

t E cH f or G oVE r NAN cE sa l e s ca l l s

I was in the lobby of a client in hous-ton, cooling my heels waiting for an appointment, and then i noticed the pattern of phone calls coming into the

receptionist: “no, i’m sorry, our Cio [insert name] is in a meeting. leave your name, number and why you want to talk with him and i will be sure he gets it.”

every couple minutes it was the same rou-tine – and this is a mid-sized private busi-ness. go figure the volume of hungry sell-ers pounding on doors of Cios at fortune 2000 companies. especially in the closing days in December as the rush to meet quota kicks into frenetic gear.

So consider this our holiday gift to you: 10 proven ways to snuff out the calls that get through and you don't want to take but somehow find yourself cellphone-to-cellphone with a salesperson. Some are silly, some are cranky, you won’t like them all, but you will find a few tips to help you make quicker work of nuisance calls:

“how did you hear about me?” That is how consultant Chris Spivey quickly separates the sales wheat from the chaff. “i ask

how they got my name and contact info. That usually qualifies them out pretty quickly. if it's from a list, well ... if it's from a mutual con-tact, i'll take the call.”

“Be clear with the annoyance,” advised Chris Westfall, a sales train-er. Don’t hem, don’t haw, because you don’t want to be entered as

a "maybe" in the Crm log, which will only trigger follow-up calls in a few weeks. “let them know in no uncertain terms that you are not inter-ested, and why. Take the time to have a professional conversation. other-

wise, that bulldog will keep barking at your door until you answer.” no calls, email only. That is the policy of many Cios who said they short circuit sales call with a fast, “Sorry, i don’t take calls.

Please email me about what you are selling. if i am interested i will be in touch. no need to follow up by phone.”

“i’m broke.” Bang the tin cup, suggested Alain raynaud, Ceo of foundrs.com, which helps link up tech start-ups with co-

founders. he elaborated: “The #1 best way to get rid of a call is to say ‘sorry, your product looks great, but we have no money.’”

“oops, gotta go, my Ceo is on the other line.” oK, it’s a lie (and everyone knows it) but it’s a to-the-point way to justify

instantly hanging up.

The wise CIO knows how to fend off pesky sales calls without really giving offence. S/he also knows that a vendor avoided today might be the one needed tomorrow. By RoBeRt mcGaRvey

Top 10 Ways To Avoid Annoying Sales Calls

1

2

3

4

5

ph

ot

o B

Y p

ho

to

s.c

om

Page 55: 12 Tech Behaviours

51 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

sa l e s ca l l s t E cH f or G oVE r NAN cE

Talk in a foreign language, urged comedian Jim Dailakis, who added that this ploy definitely helps him make sales

calls shorter. Typically, the sales rep just hangs up in a huff. Don’t know any languages? no big deal. “make one up,” said Dailakis. Klingon anyone?

Ask for something they do not sell, suggested Adam Kruse, an estate agent who personally puts in time working the phones. if it’s a PC sales rep, tell him you’re switching to Apple – can he line you up with a good deal on macs? The rep probably will

hang up on you. final Jeopardy. Turn the tables and ask the caller to sum up, in 60 seconds, what your company does. Tell him you will

hang up if he does not nail the summation. expect most callers – working off leads sheets – to fail miserably because they haven't done their homework.

for the passive-aggressive among us: “Say, ‘sorry, i need to put you on hold’” – and leave the caller there. if they

call back, repeat.

Cut to the chase, advised Alan Canton, an insurance rep who comes by his counsel from years of personally working the phones. “i make these sales calls each day. The best way for a Cio to deal with them is to stop the caller from speaking, take control by saying: 'you have 30 seconds to pitch me on why we need to talk further.’”

“if it is something the exec wants he/she will say ‘let's get togeth-er.’ if not, he/she says ‘Thanks, but we are well represented with the vendor we have’ and hangs up without being rude and causing ill-will. A good Cio knows that the vendor that is dismissed today may be one vitally needed tomorrow.’”

—Robert McGarvey – As a busy freelance writer for more than 30 years,

Rob McGarvey has written over 1500 articles for many leading publica-

tions from Reader's Digest to Playboy and from the NY Times to Harvard

Business Review.

—To see more articles on this or any topic affecting IT today, please visit

www.cioupdate.com, a premier destination site for CIOs, CTOs, and IT

executives from around the world.

6

78

9

10

In a recent study on information gover-nance, the economist intelligence unit found that the single biggest worldwide challenge to successful adoption of

information governance (ig) is the difficulty of identifying its benefits and costs. in other words, the difficulty of understanding and making the case for ig.

Since i will be writing a series of articles on ig, i am going to use my first few columns to help readers address this problem. There is no magic formula, no perfect argument for information governance. But, there are many reasons why ig makes sense today and will make even more sense in the future.

While the case for 'Information Governance' is yet to be universally made, understanding it and learning how to sell the story will be increasingly important in the coming days and years. By BaRclay BlaiR

It's Time for Information Governance

Defining IGig is a relatively recent term for a set of activ-ities that have been around for a long time. i like the term because it’s simple. it places the emphasis of the activity (i.e., governance) on the thing we want to act on (i.e., informa-tion). The simplicity of this phrase, however, belies the complexity of a field that borrows ideas and practices from a variety of speciali-ties and packages them together to address a difficult problem in a holistic manner.

for example, ig is not synonymous with corporate governance, but it incorporates ele-ments of corporate governance (some have called ig 'grC for information' i.e., gover-

nance, risk management, and compliance for information). The same goes for information protection, records management, compliance, and so on. Some of the other fields that are part of information governance include:

information management iT governance Privacy Knowledge management

enterprise Content management and Docu-ment management enterprise risk management Storage, Archiving, and Business Continuity e-Discovery.

Page 56: 12 Tech Behaviours

52 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

t E cH f or G oVE r NAN cE i n f o r m at i o n g ove rn a n ce

So how exactly should we define IG? The economist defines ig as the “strategi-cally created enterprise-wide frameworks that define how information is controlled, accessed and used,” and the mechanisms that enforce those frameworks.

Aiim international defines it as “the establishment of enterprise-wide policies and procedures and the execution and enforcement of these to control and manage information as an enterprise resource.”

These definitions are pretty similar and they illustrate two important points:

first, ig is about building a foundation of rules in the form of policies, procedures and practices that guide information manage-ment across an enterprise.

Second, ig requires enforcement in the form of technology and human-focused pro-grams to be successful. ig rules themselves don’t solve any problems and in fact can create problems if they are not properly enforced.

At the highest level, ig is, quite simply, about managing information better.

Telling the IG story“At first sight, legal compliance would seem to be the major driver for taking better con-trol of emails. however ... roi from efficien-cy improvement is a genuine justification.” – Aiim industry Watch: email management, The good, The Bad and The ugly

To be successful with ig, you must learn to tell the ig story. more correctly, you must learn to tell ig stories as different audiences need to hear different versions of the ig story.

At a large financial services company i worked with for many years, the chief ig evangelist understood this implicitly. i tagged along with her to many meetings and listened to her tell the ig story. There was one story for the lawyers who were going to have to defend the company’s prac-tices in court. There was another story for the corporate chiefs who were going to have to pay for it. And yet another story for the heads of business units and departments who were going to have to live with the ig program everyday in the real world.

in made to Stick”Dan and Chip heath argue that storytelling is a critical skill for anyone wanting their ideas heard, remem-bered, and acted upon. According to them, “stories have the amazing dual power to

simulate and to inspire” because they provide a simple, concrete way for others to under-stand your ideas.

The ability to tell stories is so important in the ig world because of its complexity and breadth. Despite this complexity, i believe that there are only two basic “plots” to the ig story:

The first is the “faster, better, cheaper” plot. in other words, ig can help organisations make decisions/create products/go to mar-ket/etc. faster. it can also make business pro-cesses more efficient (i.e., better), and enable the organisation to lower the costs of many business processes (i.e., cheaper).

Steve Bailey, author of managing the Crowd: rethinking records management for the Web 2.0 World convincingly argues in his work that the information management community hasn’t done a good job of put-ting hard numbers behind the “faster, better, cheaper” story. i agree. Aside from some near-apocryphal statistics that are frequently used, to my knowledge, the economic case has not been universally made.

however, ig professionals can make solid

economic arguments that are specific to their organisations. i have helped many of my clients do this. Some arguments have been financially dramatic (increase profit $300 million over 3 years), some strategi-cally profound (competitive advantage in our market for 2 years), and some have been very practical (cut email costs).

The second basic plot of the ig story is “fear, uncertainty, and doubt (fuD).” This story focuses on the risk side of ig. This has been a relatively easy story to tell in the past few years, with many massive business failures, data breaches and high profile court cases tied to ig shortfalls.

A note of caution about this plot: don’t overuse it. many in the ig field are guilty of over-relying on the “sky is falling” argument to make their point. i have seen too many presentations in too many dimly lit confer-ence rooms where the ig story starts with the same few slides detailing eye-popping court judgements, executives going to jail, and so on. This story can be effective, but it loses is power if it’s overused.

The Economist defines IG as the “strategically created enterprise-wide frameworks that define how information is controlled, accessed and used,” and the mechanisms that enforce those frameworks.

Illu

st

ra

tIo

n B

Y p

c a

no

op

Page 57: 12 Tech Behaviours

53 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

i n f o r m at i o n g ove rn a n ce t E cH f or G oVE r NAN cE

Both ig plots have merit. in fact, a recent survey of the global 1000 conducted by the Compliance, governance and oversight Council found that enterprises expect to “reduce legal risk and enable compliance” as well as “increase iT efficiency and ensure routine data disposal,” as a result of the ig projects they are undertaking now.

Start in the right place“organisations become overwhelmed when they start recognising the many risks inherent in information mismanagement. ‘Trying to address them all at once can feel like trying to boil the ocean.’” – “The future of enterprise information governance,” economist intelligence unit

Some time ago, i had a client with over 10,000 poorly indexed, improperly stored, and nearly undocumented backup tapes. The metaphorical weight of these tapes around the neck of the poor folks trying to implement an ig programme at the compa-ny was massive. how could they even begin

to think about “easy” things like policy development when they had the problem of 10,000 legacy backup tapes to deal with?

many organisations are in this position. They have so much unmanaged information in their environment that it effectively paral-yses them. it doesn’t have to be this way. in fact, organisations should focus first on building the foundation for their program (policies, procedures, etc.), implementing those foundations (tools, training, etc.) and only then cleaning up their environment.

This isn’t the only way to approach ig, but it is a useful framework for organisations that are stuck.

This approach encourages organisations to build the “new world” of their ig pro-gram, and then bring old content into that world over time. This is a conceptual model since, in the real world, these things often happen simultaneously, in a different order, and faster or more slowly than we like.

in my next few columns, i’ll be provid-ing several ideas on how you can make

the case for ig at your organisation. i will focus on the value that managing informa-tion can provide, and the way in which it can reduce risk associated with informa-tion mismanagement.

—Barclay T. Blair is a consultant to Fortune 500

companies, software and hardware vendors,

and government institutions, and is an author,

speaker, and internationally recognised author-

ity on a broad range information governance

issues. He is the founder and principal of

ViaLumina Group, Ltd. His blog, http://www.

barclaytblair.com, is highly regarded in the infor-

mation governance community. Barclay is the

award-winning author of several books, includ-

ing Information Nation., and is currently writing

Information Governance for Dummies. Barclay is

a faculty member of CGOC.

—To see more articles on this or any topic

affecting IT today, please visit www.cioupdate.

com, a premier destination site for CIOs, CTOs,

and IT executives from around the world.

Business-IT alignment is mandate that goes way beyond the CIO's job. It includes the CEO and even the board. By sumit D chowDhuRy

Business IT Alignment: A Never-ending Chase

Information Technology (iT) had traditionally been considered as a 'support' unit and was not necessarily included in the 'core' business. it could have been driven by the fact that iT had emerged as a business enabler relatively recently and organisa-

tions were still figuring out its true potential. however, we have come a long way and the key challenge today is not the 'alignment' but the overall 'integration' of iT into business.

Business iT alignment has conventionally been viewed as the Cio's job but it is as much, if not more, the responsibility of the boardroom and the leadership team of the company. Thankfully, businesses are realising that fast. for example, data centres are the

heart of telecom companies and form a critical cog of their entire business engine. Data centres are therefore not only a priority for the iT department but that for the entire organisation. no business plans of telecom service providers could be developed without tak-ing data centres into account.

Today, the role of iT is not restricted only to the smooth running of operations but goes far beyond into every aspect of the business – productivity, efficiency, revenue generation, and cost control, among others. iT cuts across all the key constituents of a business and also works as a binding force in many ways.

The leadership at the top (Ceo/Chairman) has to set the right

Page 58: 12 Tech Behaviours

54 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

t E cH f or G oVE r NAN cE b u s i n e s s - i t a l i g n m e n t

goals and key performance indicators (KPis) of all the CXos of the company and align them towards the business objectives. The duty of the CXos is to turn these business objectives into departmental priorities. it is critical that the Cio is part of the discussion and has a clear view to the organisational strategy and road-map. Without an understanding of the business direc-tion, it will be impossible for the Cio to set an effective departmental goal.

Another typical problem faced by a Cio is the lack of an executable business plan. organisational business plan and annual operating plan (AoP) typically deal with the revenue and profit targets across geography and across product lines. Sometimes profitability across product lines cannot be determined due to common and shared infrastructure in the company and in proportion-ing the cost of this shared infrastructure across the prod-ucts. in most instances, the AoP outlines the 'what' and does not articulate the 'how.' The plan does not identify what has to change in the business to be able to achieve the goal. it is left to each next level leader to articulate.

The second problem that the Cio faces is the lack of a longer term AoP for year 2 and year 3. The ability of the Cio to influence plans and results in these years is more certain than his/her ability to impact the results of the current year.

let us take an example: The business sets an AoP of adding 10 million new customers a year and thus lead-ing to annual growth rate of 10 percent. To achieve this target the business need to increase the distribution and marketing. They need to help the distributors get productive very fast and enable them with information about products and services such that they can be effective in front of the customer. The relationship of the company with the distributor also has to be improved so they need to calculate and pay out the com-missions quickly. The annual operating plan does not articulate any of the above details. An alternate plan of getting new customers without adding distributors would be to launch products faster, to respond to market changes faster. They need to target customers directly and attract them differentially. All of these would require a high degree of automation if the company wants to expand their business with keep-ing their cost increase at minimal. here comes iT into the picture.

There has to be an agile and nimble iT plan that can support this robust growth. it would include automation for distribution enrol-ment, marketing, commission calculation and payout, and process streamlining. The iT plan should also encompass faster enablement of channel, spending and effectiveness analysis, customer seg-mentation and target marketing, scaling of hardware and software resources selectively or centrally.

Cios who achieve alignment typically do so by establishing a set of well-planned process improvement programs that systematically address obstacles and go beyond executive level conversation to per-meate the entire iT organisation and its culture. They therefore need to see consider themselves as business leaders and not just technol-ogy heads and should be equally concerned with the overall busi-

ness in terms of revenue, profitability, share price, and dividends. They should therefore create a strong business benefits realisation team, which comprises of resources with business consulting back-grounds and an ability to understand strategy, and translate that into process, people and technology.

The Cio also needs to define an iT strategy that is in sync with the business strategy. The first task would be to take the AoP and break the business strategy into iT goals and map it into a set of programs and projects that need to be executed. The year 1 AoP should be used to drive tactical plans and year 2 and 3 AoPs should be used to drive strategic changes. longer term strategic goals (those beyond year 3) should also form part of the overall iT plan. The next critical task is the successful execution of the plan through tracking of proj-ects in terms of timeliness, quality, and effectiveness. no plans are complete unless they are executed seamlessly.

At the end, the success of any business lies in its ability to inte-grate diverse constituents and operate holistically. iT is a key con-stitute of any business and is increasingly taking a centre-stage. it is paramount for businesses to recogni e this and make iT an integral part of their strategy and future direction. There are no two ways about it. —The author is Vice President and Partner at IBM. He is also the former

CEO of Reliance Tech Services and former CIO of Reliance Communications.

The IT plan should also encompass faster enablement of channel, spending and effectiveness analysis, customer segmentation and target marketing, scaling of hardware and software resources selectively.

ph

ot

o B

Y p

ho

to

s.c

om

Page 59: 12 Tech Behaviours

K e n S t e i n h a rdt N O H O LDS BARR E D

55 07 january 2011 ctO fORumThe Chief

TeChnologyoffiCer forum

Ken Steinhardt, VP, and CTO, EMC, talks about the closed nature of public clouds and how eventually data migration would get non-disruptive. Steinhardt spoke in an interview with Varun Agarwal.

Clouds Can loCK You In

What do you think 2011 would be about? What kind of evolution do

you see in virtualisation technologies going forward?To me cloud is the next logical evolution of virtualisation. The first wave of virtualisation to me is when people virtualised in those four traditional tiers of iT infrastructure – Storage, network, Server, and operating system. To me cloud is nothing more than virtualised infrastructure and at the same time, i don’t want to know what the server is, what the network is, what the storage is. i just want to know if there is a place i can run my applications and store my information and have pre defined service level.

however, virtualisation has been there since the mainframe era and the flexibility and the barriers to change today is so differ-ent and so much lesser than they were back then. The barriers to change back then were that the applications and databases tended to be unique to individual server platforms , they could never run on anyone else’s load. But today through standardisation, software and the interconnects, the barriers to change are nowhere near what they were back then, so it’s a lot easier to get from one place to another.

i will give you a bold prediction — in over the next couple of years, some of the stor-age virtualisation technologies are going to see the ability for non disruptive migration of data from any major vendor to any other major vendor without having to shut down anything. So you will see the ability to feder-ate multiple heterogeneous devices- servers, storage, networks — where people will be able to replace the infrastructure components individually without shutting down the oth-

DoSSier

Company:EMC

EstablishEd:

1979

foundEd by:

Richard J. Egan and

Roger Marino

produCts:

Storage, security,

virtualization,

information

governance etc.

Page 60: 12 Tech Behaviours

56 07 january 2011 ctO fORum The Chief

TeChnologyoffiCer forum

N O H O LDS BARR E D K e n S t e i n h a rdt

cific tier i.e. high end or mid tier, the ability to typically have different class or tiers of stor-age technology (each with a different associ-ated with it) all co exist on one system at the same time. The vast majority of applications have a very wide skew between the number of i/os that run on a particular volume and the number of volumes.

This is what we found, is usually it's the tiny number of volume generates a majority of i/os, there is usually a large number of volumes that generate with very little i/os then there is something in the middle. So logically if you can move just a little bit of the hot ones that were hot up to flash drives to almost everything else to lowest cost drives, we bring massive reduction to space, power, cooling cost complexities but you actually improve the performance. histori-cally those two things have been diametri-cally opposed — i want higher performance that means i am probably spending more money for more expensive type of device i want to reduce my cost i compromise my performance and service level. This is being able to do both at the same time so the customers that have been deploying these technology had it in the market for about a year now could basically have consistently been saying massive reduction in cost space power cooling by configuration are actually shrinking or my performance is improving while i do this.

The other is de-duplication. i believe that virtually all environments at source, at target would benefit over the next time especially over the next few years with de-duplication. up until now if we were to save the same PowerPoint file, systems were designed to do what they were asked to do, i.e. every single instance of it, every single copy i store, is taking up unnecessary additional space. So being able to go into de-duplication becomes key. now we have been massively acquiring de-duplication intellectual capital for emC like Avamar and Data Domain most recently.

The couple of other of basic ones that are becoming pretty common in the industry, but i will mention them and just because they are becoming common doesn’t mean they are any less important – thin provision-ing, the premise of thin provisioning has a very basic value proposition: one its unbe-lievably easier and faster to provision and other, is direct impact on capex.

ers. This will be a fairly revolutionary break-through. historically people have had major issue with migration sometimes driven by the fact that they have to disrupt production envi-ronment to be able to make changes.

i personally believe the greatest single either enabler or obstacle towards cloud infrastructure is security. What i think a lot of people miss sometimes is the security from all perspective. organisation looks at it as i have to protect my data either in terms of importance or compliance reasons, my own organisation, my data, maintain it and have it total secure. individuals feel it the same way, no less important to them wheth-er they are storing family photos or personal information, so the security need to play the both ends so whether it be the aspect of authorisation, authentication, encryption of the data, information management security becomes a key component.

the appropriate solution for them, they didn’t have the flexibility to make it easy to move out of cloud. These are the kinds of things where non disruptive movement of data between heterogeneous devices becomes a key.

EMC has been on acquisition spree for quite a while. What would be the

technologies or companies you would be looking at? We have pretty consistently stuck to the ones that are close to where our core com-petencies are. i don’t believe we will stray from that in future acquisitions. Virtually all the major acquisitions we have made for fairly extended period fell into one of the four categories: security, document manage-ment, information management and vir-tualisation. Then we tended to look for the company to be the prime integrator within

“Once you're in the cloud, it can get difficult to get out of it. I believe there will be people that will need to go in both directions and transition from traditional infrastructure to cloud has to be easy.”

Do you also see public clouds being neutral completely wherein you

can shift your data from one cloud to another? great point. This has become a huge obstacle today. A particular public cloud infrastructure can be very much of a lock in today, which can be a problem. What the industry needs there is some standardisa-tion, which from a cloud perspective there are some discussion going on in some vari-ous bodies now but there is no technology today to standardise making that seamless for customers yet.

once you're in the cloud, it can get dif-ficult to get out of it. i believe there will be people that will need to go in both direc-tions and transition from traditional infra-structure to cloud has to be easy. There will be some that will realise may be the cloud infrastructure wasn’t at that point in time

that category so for security it was rSA, for document management it was Documen-tum, for virtualisation a lot of it was driven by Vmware. now we realised to advance the category and we went to the consumer space with iomega and with mozy in cloud space. That evolved to be our new plan. These are really new interesting categories where we must play. All our acquisitions methodically pretty much revolve around these, i can’t think of any significant exception into those primary categories plus the two which is basically cloud and consumer.

Any specific technology EMC has or would really be bullish about?

There are a couple of technologies right now that we're really bullish about. first is the concept called fully automated storage tearing(fAST) which is the ability for the storage system instead of having to be a spe-

Page 61: 12 Tech Behaviours

Hide time | CIO PrOfIle

57 07 january 2011 cto forumThe Chief

TeChnologyoffiCer forum

PH

OT

Os

BY

AlP

es

H D

HO

lAk

iA &

JiT

en

GA

nD

Hi

education: Junnarkar completed her entire education from Mumbai. She did her BSc in Mathematics and Statistics from Mumbai University post which she joined SPJIMr, Mumbai for an MBA in Operations Management

entrepreneurial: when not enough opportunities were available in Ahemdabad, Junnarkar teamed up with her husband and started her own IT

company—Applications Software Group, from home. The company is still running and taken care by her husband.

Family: A geographical spread but strongly bonded family. Her husband in Ahmedabad, son studying in US and only her daughter staying with her in Mumbai, Junnarkar tries to bring everyone together as often as possible.

miles to Go...asmita Junnarkar CIO, Voltas Ltd

a wiFe, a mother, a Cio, a consultant, an entrepreneur and a lot more is how you can define Asmita Junnarkar. Born and brought up in mumbai, married in Ahmedabad, and lived in Baroda & Ahmedabad, Junnarkar is a woman of strong will who is determined to /.create a mark wherever she was. Junnarkar completed her BSc in mathematics and Statistics from mumbai university post which she joined SPJimr, mumbai for an mBA in operations manage-ment. Soon after her mBA she joined an iT consultancy company called hin-ditron Consultancy in 1983 working on mainframe systems at that time.

Junnarkar left her job soon as she got married in 1984 and moved to Baro-da. With a penchant to keep working, she switched sides from a consultancy to in-house iT and started working with Dinesh Suitings in their eDP Depart-ment, also switching from mainframes to mini Computers..

Again, two years later she left the job as she was expecting her first baby. later she moved to Ahmedabad and it was difficult for her to start working again with small kids. At the time there weren’t many iT companies in Ahmedabad either and trying to get a job with flexible timings was even more difficult.

Teaming up with her husband, she started her own iT company—Appli-cations Software group, from home. They started serving local custom-ers with some basic iT needs. As she strove for excellence, the company grabbed some all india contracts within a couple of years. The technology

transformed from mini to micro and all applications were developed on Personal Computers.

The lure of a large playing field continued to attract her, and when TCS opened its first office in Ahmedabad in

Page 62: 12 Tech Behaviours

Hide time | CIO PrOfIle

58 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

t snap shot philosophy in life: Can be summed up in her

favourite lines of robert frost:

The woods are lovely, dark and deep,

But I have promises to keep,

And miles to go before I sleep,

And miles to go before I sleep.

Good leader: One who takes people along and

has a vision. A vision of reaching a place, people

haven’t thought of in the past.

outlook at workplace: lage raho! Keep trying till

you succeed. An outlook that helps her keep going…

Hobbies: Junnarkar loves travelling. She prefers to

see new places each time, meet new people and see

the world from their eyes.

1995, she grabbed the opportunity to launch her career with a global brand and joined TCS in January 1996. The entrepreneurial venture, entrusted to her hus-band, continues operating in Ahmedabad.

Since January 1996 Junnarkar has managed multiple large engagements in TCS. Technology platforms kept changing every two years and it was an inter-esting challenge keeping up with the speed of change. Junnarkar says, ‘mBA background helped me to understand the business challenges and relate with the customers.’ She became regional delivery head of TCS in December 2004. Within 3 years Junnarkar grew TCS’s strength in gujarat from 250 to 1500 employees and changed the business mix from majority domestic to majority overseas through innovative service delivery platforms such as shared services.

in 2008, she joined Voltas as a Cio, switching the sides of the table again. Since then, she has focused on strategic iT roadmap and bringing iT closer to the business. Junnarkar is managing multiple teams, engaged in various tech-nology initiatives such as mobility solutions, Decision Support Systems and Virtualization. She is also managing multiple partners for maintaining and expanding the technology footprint on SAP & .net platforms. She believes in empowering the teams for day-to-day operations while personally focusing on reviews and risk mitigation.

however, achieving all this wasn’t easy with Junnarkar as she had to travel across the world for work while with TCS. maintaining the right balance between work and family was the biggest challenge, which she evidently suc-ceeded in doing. Junnarkar believes that if women are able to manage the right balance between family and work, then sky is the limit.

With her 23 years old son, who’s doing his mS in uS and her 19 years

daughter who’s currently studying mass media in mum-bai, life has been quite fulfilling for Junnarkar. As an iT leader, her aim is always to motivate and inspire her team to not only work hard but also to enjoy the work.

Junnarkar says, ‘i always looking for new challenges, big-ger the challenge, bigger the opportunity it will open up.’

Page 63: 12 Tech Behaviours

“Security needs to take an

engineering approach” Au

thor

: Ros

s An

ders

on

ABOUT THE REVIEWER

Ben Rothke is a

Senior Security

Consultant at BT

Global Services.

He is an accom-

plished security

professional with

passionate and

innovative future-

oriented vision,

focusing on devel-

oping security and

risk management

as both an inter-

nal asset as well

as a competitive

advantage.

Security Engineering: A Guide to Building Dependable Distributed Systems by Ross Anderson is argu-ably the best information security book ever written.

Anderson's premise is that security technology needs to take a structured engineering approach to systems design, with detailed requirements and specifications from start-up to development and implementation; just as those designing buildings and bridges do.

Without a deeply embedded struc-tured approach to security systems design, Anderson argued that we find ourselves in the situation we are in today, with applications and operating systems full of bugs, vulnerabilities and other serious security flaws.

As good as Security Engineering is, it was not written to be a detailed information security design guide. That vacuum has been filled by an incredibly important and valuable new book Security Strategy: From Requirements to Reality.

Security Strategy is one of the first

evaluating or designing facilities, the book provides the insight needed to enable an organisation to achieve the operational efficiencies, cost reduc-tions, and brand enhancements that are possible when an effective secu-rity strategy is put into action.

Security Strategy: From Require-ments to Reality is an incredibly valuable book that advances the state of information security. For organi-sations that are looking to get serious about information security, and those that want to go from good to great, the book is an invaluable guide that lays the groundwork on how to devel-op a first-rate information security infrastructure.

Taking a look at its table of con-tents shows the many fine points in which the book goes into each par-ticular point, showing how it can be properly designed and deployed for effective security controls.

My only peeve with the book is that it lacked a CD-ROM or website from which to download the many tables and matrices the book is built on.

books that shows how to perform a comprehensive information security assessment and design, from sec-tion, development and deployment of a security strategy best suited to a specific organisation.

The book's focus is on the plan-ning, requirements and execution needed to ensure that formal and comprehensive information security elements are built into systems, applications and processes.

Authors Bill Stackpole and Eric Oksendahl each have over 25 years in the industry and the book reflects their vast expertise. Oksendahl spent time at Boeing, one of the most secu-rity aware organisations, with Stack-pole spending a decade at Microsoft.

While Microsoft is chided for creat-ing more insecurity than security, it is worth noting that no organisation in the world has spent more on train-ing its staff and developers on secu-rity than Microsoft.

Complete with checklists of the physical security requirements that organisations should consider when

two Books on Security Strategythese are two brilliant books that no one tasked with security should ignore – the first is an advocate of a structured-engineering approach and the second is a comprehensive how-to.

59 21 JANUARY 2011 cto forumThE ChiEF

TEChnOlOGyOFFiCER FORuM

Hide time | BOOK REVIEW

Page 64: 12 Tech Behaviours

VIEWPOINT

60 07 january 2011 cto forum The Chief

TeChnologyoffiCer forum

AbOuT ThE AuThOr: Sameer Shelke is

the Co-founder,

COO and CTO at

Aujas Networks

Pvt. Ltd. He has

handled cross

functional areas

such as technology

development &

management,

business

management, P&L

management,

people

management etc.

I rEcENTly read an article “John Scul-ley on Steve Jobs,” which as the name suggests was an interview transcript of John Sculley the former Ceo of Apple. John Sculley talks about “The Steve Job’s methodology” on how to build great products, he says Job’s always looked at things from the perspective of what the user experience is going to be. he didn’t believe in asking consumers what they want, but rather built beautiful products which people ended up wanting. Similar to what henry ford had said about consumer views on the car, “if i had asked people what they wanted, they would have said faster horses.”

0how is this changing the 'enter-prise' behaviour? The way people in an enterprise looked at end-user technol-ogy is different from how individuals in their capacity as consumers looked at it. i guess that’s why end-user tech-nologies such as laptops or operating systems had enterprise range products and consumer range products. enter-prises used to determine what specific laptop or mobile product models could be used for corporate iT services.

“enterprise” technology firms such as rim getting more consumer friendly (“Blackberry Boys”) or the younger generation doing special behavioural changes to get “their first android.”

Apple released the iPad on April 3; it sold 1 million units by may 3. Ana-lysts predict close to 8 million iPad’s will sell in 2010. rumours are that the iPad 2.0 would be released soon with a prediction of selling 6 million units a month! now consider this in the context that the iPad is available for sale in only select countries and other tablets are also making their mark. mobile applica-tions are expected to touch sales of $35 billion by 2014, and gartner has predict-ed a 10 percent drop in their PC sales forecast for 2011 mostly on account of the increased interest in tablets.

hence i am of the opinion that consumerization of the enterprise is a foregone conclusion and organizations need to modify their risk management postures to allow for a range of 'con-sumer' devices and applications to be used within the enterprise. “Adapt or perish, now as ever, is nature’s inexo-rable imperative.” – h. g. Wells.

Apple, i think, is changing this – consumerization of the enterprise is happening. i was involved in an infor-mation risk management framework transformation project for a service provider in Japan. While the manage-ment, iT, Business and Security teams had their own requirements and expec-tations from the project, the end-users hoped the project would enable use of the iPhone for business commu-nication and email (only one specific mobile device was allowed to be used for company email). incidentally the transformation of the risk framework did allow iPhone-like devices to be used by modifying the process and control framework.

Several organizations are now allow-ing or thinking of ways they can let the users choose the end-user technolo-gies to access iT services in a secure form. The advent of the iPad or the tablet phenomenon would only make it impossible for companies to stay away from this change. it’s not just Apple, but other companies and tech-nologies are also driving this change. We now see interesting ads from

Sameer Shelke | [email protected]

Consumerisation of the Enterprise

Consumerisation of the enterprise is foregone conclusion rganizations need to change their risk mitigation

practices to encompass a range of 'consumer' devices. il

lus

tr

at

ion

BY

PC

an

oo

P