38
Strategic Technologies for the CGIAR in 2010 December 2009 Enrica Porcari Chief Information Officer CGIAR

Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Strategic Technologies for the CGIAR in 2010

December 2009

Enrica Porcari

Chief Information Officer

CGIAR

Page 2: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 2

Contents 1. Foreword ..................................................................................................................................... 4

Methodology and Results .................................................................................................................... 6

2. The Top Technologies ................................................................................................................ 10

2.1. Multipoint Conferencing Gateway Service .......................................................................... 10

2.2. Storage Infrastructure ........................................................................................................ 11

2.3. Social Software and Social Networking ............................................................................... 12

2.4. Automated Failover for Critical Network Applications ........................................................ 13

2.5. BlackBerry, iPhone, ActiveSync ........................................................................................... 14

2.6. Business Continuity ............................................................................................................ 15

2.7. NAC – Network Access Control ........................................................................................... 16

2.8. Training Programs .............................................................................................................. 17

2.9. Cloud Computing – Software as a Service ........................................................................... 18

2.10. Metadata Management .................................................................................................. 19

2.11. Periodic Security Scans ................................................................................................... 20

2.12. Virtualization .................................................................................................................. 21

2.13. Web Oriented Architecture ............................................................................................ 22

2.14. High Performance Networking and Computing ............................................................... 23

2.15. Local SharePoint Services ............................................................................................... 24

2.16. Low Cost Desktops – Virtualization of Desktop ............................................................... 25

2.17. Exchange 2007 or 2010................................................................................................... 26

2.18. Secure Local Networks with Intrusion Prevention ........................................................... 27

2.19. Windows Server 2008 ..................................................................................................... 28

2.20. Windows 7 ..................................................................................................................... 29

3. The Top Ten Technologies for 2010 ............................................................................................ 30

3.1. Storage Infrastructure ........................................................................................................ 30

3.2. Virtualization ...................................................................................................................... 30

3.3. Social Software and Social Networking ............................................................................... 30

3.4. Multipoint Video Conferencing Gateway Service ................................................................ 30

Page 3: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 3

3.5. BlackBerry, iPhone, ActiveSync ........................................................................................... 30

3.6. Periodic Security Scans ....................................................................................................... 31

3.7. Training Programs .............................................................................................................. 31

3.8. Cloud Computing ................................................................................................................ 31

3.9. Business Continuity ............................................................................................................ 31

3.10 Metadata Management ..................................................................................................... 31

4. Summary ................................................................................................................................... 32

5. Appendix ................................................................................................................................... 33

Page 4: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 4

1. Foreword

Last year, I initiated a process to inform the annual CGIAR IT meeting by presenting a framework for

deciding how best to improve IT in the system. The result was an analysis of potential technologies,

based primarily on my own assessment of their potential, in response to five questions that I asked

myself. The questions were:

How much does the technology improve the effectiveness of a center’s operation and/or the

CGIAR’s mission?

Will adopting the technology significantly reduce costs over time?

Can the technology be implemented in a reasonable timeframe with available resources?

Will the technology improve end users’ productivity and/or satisfaction?

Can the technology be implemented and sustained on a minimal budget?

The result of the exercise was a paper that stimulated useful discussion at the meeting at ICRISAT-

Hyderabad in 2008.

Later, we have included one more general question:

What is our concrete experience with the technology so far?

Several of the technologies discussed last year have been implemented, to one extent or another, and

several more are “in the pipeline” for implementation. Thus, we have another important measure of a

technology: whether we actually do something with it.

35 technologies and business processes were evaluated in the survey; they comprised the 29 discussed

at Hyderabad, which has been partly informed by Gartner’s list of most important technologies for 2008.

In addition, we added the technologies Gartner added in its 2009 report, as well as two more suggested

by the IT managers. The descriptions of the technologies, as they were distributed in the questionnaire,

are listed in the appendix.

The overall results of the survey are shown in tabular form in Section2, followed by a discussion of how

the number of technologies to be discussed here was narrowed down from 35 to a more manageable

20. Those 20 are then described and discussed in terms of the six questions listed above: effectiveness,

practicality, user satisfaction, cost reduction, overall costs and current degree of implementation and

interest.

Page 5: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 5

It is interesting to compare the findings this year with those in the “Strategic Technologies for the CGIAR

in 2009” paper. When comparing the Top 10 technologies for 2010 selected by the IT Managers, we

noted that 7 out of the 10 technologies are still part of the Top 10 for 2010 (in different orders) and

there are 3 new technologies or processes that appeared in the Top 10 for this year:

Multipoint video conferencing gateway service

Business Continuity

Metadata Management

A quick look at the top 10 technologies for 2010 and a look back at those of 2009

Technology/Process 2009 2010

Top 1 System-wide Software and Service Acquisition

Storage infrastructure (E.g: Email Archive)

Top 2

Email Archive Appliance as part of Storage Infrastructure Virtualization 2.0

Top 3 Virtualization 2.0 Social Software and Social Networking

Top 4 Chargeback

Multipoint video conferencing gateway service

Top 5 Training Programs BlackBerry, iPhone, ActiveSync

Top 6 Hosted Email (as SaaS example) Periodic Security Scans

Top 7 Social Software Training Programs

Top 8 Periodic Security Scans Cloud Computing - Software as a Service (SaaS)

Top 9 BlackBerry, iPhone, ActiveSync

Business Continuity

Top 10 Upgrade to Exchange 2007

Metadata Management

Page 6: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 6

Methodology and Results

The survey sent to the CGIAR IT managers listed 35 technologies and asked for them to be rated

according to:

Effectiveness - Extent to which you believe the technology would improve the effectiveness of the

operation of the centers and/or CGIAR’s mission.

1 = no improvement of CG effectiveness, 2 = not likely, 3 = unknown, 4 = some potential improved

effectiveness, 5 = Major potential for improving effectiveness of CG

Practicality - Extent to which the technology can be done in a reasonable timeframe with available

resources.

1 = not at all practical – hard to do, 2 = probably not practical, 3 = unknown, 4 = somewhat practical, 5 =

very practical easy to implement

User Satisfaction - Extent to which the technology improves the productivity of the end user

1 = not at all a productivity enhancer to end user, 2 = probably not a productivity enhancer, 3 =

unknown 4 = somewhat a productivity enhancer , 5 = high potential for productivity enhancement to

end users

Cost reduction - Extent to which the technology could provide significant cost reduction

1 = not at all likely to produce cost savings, 2 = probably won’t produce cost savings. 3 = unknown 4 =

likely to produce cost saving, 5 = highly likely to produce cost savings

Low Cost - Extent to which the technology can be done on a minimal budget.

1 = very expensive to implement, 2 = somewhat expensive to implement, 3 = unknown, 4 = fairly low

cost, 5 = very low cost to implement

Being Done - Extent to which this item was implemented in the past year or is in the process of being

implemented in your center.

1- Undecided, 2- Would like to implement, 3- Won't implement, 4- Implemented, but would like to do

more, 5- Implemented, don't intend to do more.

For the measures of effectiveness, Practicality (Doable), User Satisfaction and Cost Reduction and Low

Cost, the percentages represent the number of responses in both categories 4 and 5. For example, for

Practicality, figures in the table are the percentage of respondents who answered either “somewhat

practical” or “very practical easy to implement.” The “Being Done” Question percentages include t the

responses to this question into two categories – “implemented” responses into one category, and

Page 7: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 7

putting the response “would like to implement” into a category.. Thus, we have a measure of how many

centers have implemented a technology (Done + More need) and a relative rating of how many of the

centers where the technology has not been implemented would like to implement it (Would like to).

Ranking

In the table, the technologies were ranked in order of the percentages responding to the “Effectiveness”

measure, from largest to smallest. It is interesting to note that high ratings for effectiveness, practicality

and user satisfaction are fairly highly correlated. The highest scores in each category were highlighted,

and the extent to which the colors line up can be seen.

A general notion of how the CGIAR IT managers judge these technologies can be seen from the table. For example, adopting a multipoint video conferencing gateway service is a popular idea, rating high on effectiveness, practicality, user satisfaction, and cost reduction. And most centers report that they would like to do it!

Example Entry

Item Effective Doable

Satisfy User

Cost Reduce

Low Cost Done + More

need Would Like to

Multipoint video conferencing gateway service

100% 86% 100% 93% 29% 43% 57%

Page 8: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 8

Ratings of ICT Technologies by CG IT Managers 2009 (Shaded areas represent highest percentages in corresponding category)

Item Effective Doable

Satisfy User

Cost Reduce

Low Cost Done + More

need Would Like to

Multipoint video conferencing gateway service 100% 86% 100% 93% 29% 43% 57%

Storage infrastructure (E.g: Email Archive) 100% 93% 71% 36% 7% 57% 36%

Chargeback 93% 86% 50% 71% 50% 86% 7%

Social Software and Social Networking 93% 71% 93% 21% 57% 50% 14%

Automated Failover for Critical Network Components 86% 79% 86% 14% 21% 29% 50%

BlackBerry, iPhone, ActiveSync 86% 86% 93% 21% 36% 57% 21%

Business Continuity 86% 79% 71% 29% 7% 57% 36%

Cloud Computing - Software as a Service (SaaS) 86% 64% 57% 71% 43 14% 57%

NAC - Network Access Control 86% 43% 43% 21% 14% 14% 64%

Training Programs 86% 71% 79% 43% 0% 29% 50%

Metadata Management 79% 50% 71% 29% 21% 43% 14%

Open Source for servers and desktops 79% 71% 50% 64% 64% 64% 21%

Periodic Security Scans 79% 71% 29% 21% 7% 29% 71%

Virtualization 2.0 79% 79% 43% 79% 29% 57% 21%

Web Oriented Architecture (WOA) 79% 50% 71% 43% 21% 36% 21%

Business Intelligence 71% 36% 43% 43% 0% 14% 36%

Business Process Management 71% 57% 43% 43% 7% 21% 36%

High Performance networking and computing 71% 57% 79% 21% 21% 36% 21%

Local SharePoint Services 71% 71% 57% 36% 36% 50% 7%

Low cost desktops -- virtualization of desktop 71% 64% 36% 64% 43% 14% 29%

Exchange 2007 or 2010 (local or hosted) 64% 64% 71% 21% 0% 7% 50%

Secure local networks /with intrusion prevention 64% 57% 29% 29% 0% 29% 50%

System-wide Software and Service Acquisition 64% 64% 64% 71% 64% 64% 14%

Windows Server 2008 64% 71% 36% 7% 36% 29% 50%

System-wide Central IP PBX 57% 43% 57% 57% 14% 14% 36%

Unified Communications 57% 36% 57% 50% 14% 7% 43%

Alternatives to Active Directory 50% 36% 36% 29% 36% 0% 43%

Green IT 50% 57% 43% 57% 21% 43% 29%

New Enterprise Architecture 50% 21% 21% 29% 14% 7% 29%

Offline SharePoint 50% 29% 43% 21% 14% 14% 29%

Servers beyond blades 50% 43% 14% 36% 14% 14% 7%

Windows 7 50% 64% 57% 0% 36% 0% 64%

Enterprise Mashups 43% 36% 50% 21% 7% 7% 29%

Computing Fabrics 21% 29% 7% 29% 7% 14% 7%

Real World Web 21% 7% 36% 7% 7%/ 7% 7%

Page 9: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 9

Narrowing the Technology Set

Fifteen of the technologies listed were eliminated to simplify the discussion. There were two criteria for

removal.. Either the ratings for the technologies were low, compared to the others, or, in three cases,

the percentage of centers already implementing the technologies was so high that these technologies

could not be considered strategic future choices. These three technologies were “chargebacks,” “open

source for servers and desktops,” and “system wide software and service acquisition.” These are

currently implemented by 86%, 64% and 64% of centers, respectively. Clearly, these are important

technologies, but it appears that they have already received enough discussion.

What remains, then, are the technologies with relatively high scores on at least one dimension, absent

those that are already significantly implemented.

Top 20 ICT Technologies from CG IT Manager’s Survey (Shaded areas represent highest percentages in corresponding category)

Item Effective Doable

Satisfy User

Cost Reduce

Low Cost Done + More

need Would Like to

Multipoint video conferencing gateway service 100% 86% 100% 93% 29% 43% 57%

Storage infrastructure (E.g: Email Archive) 100% 93% 71% 36% 7% 57% 36%

Social Software and Social Networking 93% 71% 93% 21% 57% 50% 14%

Automated Failover for Critical Network Components 86% 79% 86% 14% 21% 29% 50%

BlackBerry, iPhone, ActiveSync 86% 86% 93% 21% 36% 57% 21%

Business Continuity 86% 79% 71% 29% 7% 57% 36%

Cloud Computing - Software as a Service (SaaS) 86% 64% 57% 71% 43 14% 57%

NAC - Network Access Control 86% 43% 43% 21% 14% 14% 64%

Training Programs 86% 71% 79% 43% 0% 29% 50%

Metadata Management 79% 50% 71% 29% 21% 43% 14%

Periodic Security Scans 79% 71% 29% 21% 7% 29% 71%

Virtualization 2.0 79% 79% 43% 79% 29% 57% 21%

Web Oriented Architecture (WOA) 79% 50% 71% 43% 21% 36% 21%

Business Intelligence 71% 36% 43% 43% 0% 14% 36%

Business Process Management 71% 57% 43% 43% 7% 21% 36%

High Performance networking and computing 71% 57% 79% 21% 21% 36% 21%

Local SharePoint Services 71% 71% 57% 36% 36% 50% 7%

Low cost desktops -- virtualization of desktop 71% 64% 36% 64% 43% 14% 29%

Exchange 2007 or 2010 (local or hosted) 64% 64% 71% 21% 0% 7% 50%

Secure local networks /with intrusion prevention 64% 57% 29% 29% 0% 29% 50%

Windows Server 2008 64% 71% 36% 7% 36% 29% 50%

Windows 7 50% 64% 57% 0% 36% 0% 64%

Page 10: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 10

2. The Top Technologies

2.1. Multipoint Conferencing Gateway Service

Description: Video has become more and more utilized as bandwidth has increased and prices have

come down. The simplest and easiest to use are point-to-point. There is a need to see up meetings with

multiple locations and some options (e.g., Vidyo) make this easier than ever.

Analysis: Over the years, videoconferencing has evolved from a bandwidth-consuming unreliable

technology to one that consumes less bandwidth and is much more stable. This technology is extremely

popular among the CGIAR IT managers. Combining the percentage who have already implemented the

technology with those who would like to implement it yields a figure of 100%, which is also the figure for

effectiveness and user satisfaction. Practicality and cost reduction are also rated high. The only low

figure is for low cost; the technology is perceived as expensive. The most important question to explore,

therefore, may be how to bring down the initial and ongoing costs.

The Bottom Line: Can it be made more affordable?

Page 11: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 11

2.2. Storage Infrastructure

Description: Until recently, Storage Area Networks (SANs) were generally very expensive due in part to

the need for connections via Fiber Channel. Now major vendors (Netapps, EMC, etc.) offer connections

via iSCSI, and NFS. Network attached storage (NAS) prices have also fallen dramatically. The CGIAR may

be in a good position for a group purchase or obtaining group pricing -- and certainly for information

sharing. Also, the move to VMware cannot take place without good coupling with a storage

infrastructure.

Analysis: Clearly, we are all facing the challenge of ever-increasing data that must be stored. Storage

infrastructure technology is seen as an effective and practical way to address this need, and many

centers have moved in this direction. More needs to be done, however, but even with the price drops

the technology is still perceived as expensive and as not likely to generate cost efficiencies when

implemented.

The Bottom Line: Absent any creative innovation, this will ultimately be the path of least resistance for

storage efficiencies, but it will be relatively expensive. For efficient VMware installations, a properly

functioning SAN is required.

Page 12: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 12

2.3. Social Software and Social Networking

Description: Social software includes a broad range of technologies, such as social networking, social

collaboration, social media and social validation. Enterprises should establish a strategy to monitor and

engage in external social networking as it relates to their business because the greatest risk lies in failure

to engage and thereby, being left mute in a dialogue where your voice must be heard. Enterprises

should consider adding a social dimension to conventional Web sites to enhance the customer

experience - an important consideration in a highly competitive slow/no growth economy. Enterprises

should also examine use of social software to extend internal collaboration applications to support

specific and targeted communication and coordination needs.

Analysis: As is often the case with applications that begin in the consumer space and migrate to

organizational uses, social networking is perceived as pleasing users. It is also perceived as effective

reasonably practical and relatively cheap, although significant cost reductions are not expected. So why

do so few want to do it? The answer may be that creating community and content goes way beyond

providing an enabling technology. It requires people who like to communicate this way and who have

content others want to spend time with. How to foster this is still somewhat mysterious to many.

The Bottom Line: Make the technologies available, and grow them as successful use grows.

Page 13: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 13

2.4. Automated Failover for Critical Network Applications

Description: Critical switches and routers can be set for automated failover, and relationships between external providers can be set for Border Gateway Protocol (BGP) routing, so that in the event of an Internet failure, the alternate provider automatically takes over. Analysis: Everybody loves increased reliability, and it’s not that hard to implement. The return on investment is likely to be “soft,” instead of resulting in a quantifiable ROI, however. So far, this looks more like a vitamin than a painkiller, but people at least give lip service to the idea that they should get around to implementing it. The Bottom Line: This may seem a lot more useful after a couple of intolerable network failures…

Page 14: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 14

2.5. BlackBerry, iPhone, ActiveSync

Description: Reading mail while exiting a plane, in a taxi or waiting for food at breakfast is de rigueur for busy staff, and yet still few senior staff in the CGIAR have such devices. They now work in most countries. The BlackBerry Enterprise Service (BES) is straightforward to install. MS ActiveSync works out of the box with Exchange servers and syncs contacts, emails, calendar, etc. Analysis: Users love their smartphones, and they’re not just toys. The organization does benefit from users’ additional access to email, particularly where Wi-Fi isn’t easily available. Given the technology’s dependence on external vendors, however, it’s not seen as a money saver. But for half the centers, its time has already come, and more can be expected to sign on soon, at least for some of their users. The Bottom Line: One day, we will wake up and everybody will have these. The strategic question is how centers, as organizations, will make use of that.

Page 15: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 15

2.6. Business Continuity

Description: Given the universally increased dependence on email, a system can be set up so that in the

event of catastrophic hardware failure, or a software error, end users and management would continue

to be able to send and receive email. Similar systems are available for other technologies, such as

databases.

Analysis: Nobody likes interrupted email, and other applications may deserve similar protection

depending on how long they can be done without and how much data loss can be tolerated. This

technology has been around long enough so that few are concerned about difficulty of implementation.

But while costs have dropped, this technology still isn’t cheap.

The Bottom Line: You have to decide how much this protection is worth. Better yet, you have to get top

management to decide how much it’s worth.

Page 16: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 16

2.7. NAC – Network Access Control

Description: The key value proposition of NAC solutions is the ability to prevent end-stations that lack

antivirus, patches, or host intrusion prevention software from accessing the network and placing other

computers at risk of cross-contamination by network worms. Network Access Control is a computer

networking concept and set of protocols used to define how to secure the network nodes prior to the

nodes accessing the network. (Source: http://en.wikipedia.org/wiki/Network_Access_Control.)

Analysis: As with so many security technologies, users don’t notice access control until it doesn’t work.

In fact, they probably won’t understand what went wrong. This relatively new technology is seen as

promising, but managers aren’t really clear yet on how it will work out in practice, or how much it will

cost.

The Bottom Line: You know the devil is in the details; now you have to discover them.

Page 17: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 17

2.8. Training Programs

Description: These can be of several types: technical for specific software and hardware systems; conceptual/operational for functions such as database design, data sharing and organization; personal productivity enhancement, such as GTD (Getting Things done), including how to support such processes using existing software. The latter extends beyond IT to all parts of the organization. IT group could recommend courses, and venues in different countries based on cost and quality based on local experiences. Also, short-term staff seconding or exchange could be considered where applicable.

Analysis: The moderately high scores for effectiveness, practicality, and user satisfaction indicate that most IT managers consider training a good idea. It’s even given relatively high marks for potential cost reduction. But it’s clearly labor and expertise intensive, so nobody says it’s cheap. Also, frankly, training isn’t in the average IT manager’s skill set.

The Bottom Line: A tried and true approach which has not grown less in need.

Page 18: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 18

2.9. Cloud Computing – Software as a Service

Description: Cloud computing is a style of computing that characterizes a model in which providers

deliver a variety of IT-enabled capabilities to consumers. They key characteristics of cloud computing are

1) delivery of capabilities “as a service,” 2) delivery of services in a highly scalable and elastic fashion, 3)

using Internet technologies and techniques to develop and deliver the services, and 4) designing for

delivery to external customers. Although cost is a potential benefit for small companies, the biggest

benefits are the built-in elasticity and scalability, which not only reduce barriers to entry, but also enable

these companies to grow quickly. As certain IT functions are industrializing and becoming less

customized, there are more possibilities for larger organizations to benefit from cloud computing.

However, caution is advised since significant privacy and security issues exist. Cloud computing is not

appropriate for the full spectrum of enterprise applications.

Analysis: A relatively new kid on the block, cloud computing is already seen as effective, fairly practical,

significantly cost reducing and relatively inexpensive. While few centers have adopted it yet, most would

like to. The offerings in this space are increasing daily, it seems, so the main issue is exactly what

solution provides which benefits. While general concerns about depending on connectivity for access to

key resources have decreased in general, these are still issues in some locations and for some

applications.

The Bottom Line: The question is no longer whether a bear can dance, but how well the bear dances.

Page 19: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 19

2.10. Metadata Management

Description: Metadata is the foundation for information infrastructure and is found throughout your IT systems: in service registries and repositories, Web semantics, configuration management databases (CMDB), business service registries and in application development. Analysis: Over time, this technology has moved from spectacularly daunting to only a little scary. A good number of centers have grappled with the issues by now, although the ones that haven’t don’t seem all that anxious to try. This is one of those issues that will come up in various contexts, however, such as whether to tag documents in SharePoint or how to tweak search technology. Don’t expect it to go away. The Bottom Line: More information science than computer science, employing this technology means acquiring some new expertise, but an increasing number of managers say it’s worth it.

Page 20: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 20

2.11. Periodic Security Scans

Description: One activity which has had significant payoff within the CGIAR is vulnerability scans of

individual centers. Many valuable findings have been given to centers. If scheduled on a regular basis, a

low-cost contract for security assurance may be possible. We are, after all, experiencing a continued

level of threat, including the recent spate of SQL-injection attacks on CGIAR servers.

Analysis: This is another mature security technology that is seen as valuable and do-able, which users

will never notice, which will cost some money, and which will only save you money if you don’t do it and

something goes wrong. Our IT managers, responsible souls all, realize that this should be done, but less

than a third has actually achieved it yet. One solution may be to examine whether newer technologies

allow this to be done more easily and inexpensively.

The Bottom Line: This is an item which has risen in importance and is now within reach.

Page 21: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 21

2.12. Virtualization

Description: Much of the current buzz is focused on server virtualization, but virtualization in storage

and client devices is also moving rapidly. Virtualization to eliminate duplicate copies of data on the real

storage devices while maintaining the illusion to the accessing systems that the files are as originally

stored (data deduplication) can significantly decrease the cost of storage devices and media to hold

information. Hosted virtual images deliver a near-identical result to blade-based PCs. But, instead of the

motherboard function being located in the data center as hardware, it is located there as a virtual

machine bubble. Various virtualization approaches have significant potential to reduce IT costs.

Analysis: Virtualization gets relatively high marks across the board, and more than half the centers have

at least done some of it. This technology is now in the mainstream and the only question is how far we

go with it how fast.

The Bottom Line: The issue is no longer whether to adopt the technology, but how to manage it.

Page 22: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 22

2.13. Web Oriented Architecture

Description: The Internet is arguably the best example of an agile, interoperable and scalable service-

oriented environment in existence. This level of flexibility is achieved because of key design principles

inherent in the Internet/Web approach, as well as the emergence of Web-centric technologies and

standards that promote these principles. The use of Web-centric models to build global-class solutions

cannot address the full breadth of enterprise computing needs.

Analysis: WOA, a potential successor to SOA (service-oriented architecture) addresses the question of

how to locate and integrate resources in a network in a flexible and agile way. This requires both a new

mindset on how to locate network resources and new naming techniques, such as the universal use of

Universal Resource Indicators (URIs) and how to construct them. It is possible to bite off a bit of this

technology for a specific use, and the potential for resource sharing across the Web remains great, but a

thoroughgoing redesign to this new architecture is unlikly to be born at any center soon.

The Bottom Line: This will be happening but the pace is uncertain.

Page 23: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 23

2.14. High Performance Networking and Computing

Description: The current era of supercomputing combines very large numbers of heterogeneous

computers on networks to create a virtual supercomputer. Many academic institutions and private

companies are therefore moving compute-intensive applications from the LAN to the Web. Certain

entities within the CGIAR require substantial computing resources. Investments in this area have been

made. With what results? Should the CGIAR keep up on this trend and take advantage of this new

option when possible?

Analysis: There is no doubt that data analysis projects at centers could benefit from properly applied

computing power. Thus, the promise of high performance networking and computing is clear, and

recognized for its potential effectiveness, practicality and user satisfaction. Whether its adoption rate

grows beyond the approximately one-third of centers that have done something with it so far probably

depends on how the processing power and bandwidth can be assembled as needed. In some cases,

consortia, such as NRENs have been formed to address this, and, for a continuing inquiry, this might be a

good place to start.

The Bottom Line: The IT managers of the centers that have succeeded with this should discuss their

experiences with the IT managers of the centers who haven’t.

Page 24: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 24

2.15. Local SharePoint Services

Description: Some centers currently access hosted SharePoint services, others have in-house services. Pros and cons?

Analysis: It is difficult to know how to interpret these ratings, given the description of the technology (above) that was used in the questionnaire. Does a rating of “effective” mean that local SharePoint services are more useful than hosted ones, for example, or does it simply mean that SharePoint is seen as generally effective?

The Bottom Line: We should spend some face time discussing SharePoint.

Page 25: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 25

2.16. Low Cost Desktops – Virtualization of Desktop

Description: Thin client desktops can reduce IT admin costs, power costs, and perhaps desktop costs.

Analysis: Thin-client computing, which has always promised savings because there are just so many

users’ machines to purchase and support, moves another step forward with client virtualization, which

avoids client/server architecture questions by simply putting the whole client in a virtual machine on a

server. The technology gets moderate to high ratings across the board, but less than a majority of

managers have moved this way or would like to do so. The issue is probably whether the massive

transformation of an organization’s client architecture would really produce gains justifying the change.

The Bottom Line: We need more detailed studies of how this has worked where it has been tried.

Page 26: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 26

2.17. Exchange 2007 or 2010

Description: Many benefits accrue when upgrading from 2003: performance, robustness, separation of

roles, easier management. Few problems have been reported for those who have upgraded.

Analysis: Upgrading Exchange is generally perceived as a good thing, except for the costs. Since the old

system isn’t broken, the burden of proof is on the innovators to show why the move is worth it. That’s

true at least until Microsoft no longer supports your version…

The Bottom Line: Since many would like to upgrade, but few have done so, either considerable

uncertainty exists or everybody’s waiting for the money. A good discussion with people who have

upgraded might make deciding easier.

Page 27: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 27

2.18. Secure Local Networks with Intrusion Prevention

Description: New security threats are constantly emerging. Recently, Chinese hackers were able to

penetrate the World Bank. New technologies mitigate the chances of successful attacks, however. In

particular, the newer Cisco ASA (Adaptive Security Appliance) incorporates some intrusion prevention,

and high-end products like Tipping Point offer advanced capabilities. An interesting VMware-related

product is Catbird.

Analysis: Here is yet another security technology that is generally well regarded but perceived as

expensive and unlikely to generate appreciation from users. All the same, it’s beginning to be adopted

and most who have not done it yet would like to.

The Bottom Line: If the simple desire to improve security isn’t enough, the best approach may be to see

if upgrading the security technology can be combined with other network upgrades to minimize costs.

Page 28: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 28

2.19. Windows Server 2008

Description: Many new features provide cleaner, simpler and more robust services. For example: (1)

the small footprint Server Core; (2) built-in Network Access Protection first quarantines and cleans

remote user machines before allowing them to log onto the network; (3) Active Directory Federation

Services makes it easier to build relationships between trusted partners. This may provide some relief

from the relative isolation of AD.

Analysis: Moderate support exists for all aspects of this technology except cost reduction. About a

quarter of centers have moved ahead, and most of the rest would like to. It’s probably only a matter of

time, which could probably be accelerated if those who have adopted WS 2008 have good stories to tell

those who haven’t.

The Bottom Line: This is a small enough upgrade that it will probably happen for most centers within the

next year.

Page 29: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 29

2.20. Windows 7

Description: With Vista being replaced with Windows 7, there is a general interest in whether to move

to the new client operating system.

Analysis: While appreciation of Windows 7’s specific attributes is only moderate, two-thirds of all

managers already would like to adopt it. Whether this result is the result of Microsoft marketing,

experiences with the Windows 7 beta, or simply a placeholder for an assumed future process of testing

and evaluation, we can’t say.

The Bottom Line: We’ll try it out, but it’s too soon to say how widely centers will adopt it. Do I see it on

your laptop?

Page 30: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 30

3. The Top Ten Technologies for 2010

All of the 20 technologies above merit consideration, as their analyses show. 20 technologies

comprise a long laundry list, however. For simplicity’s sake, let’s reduce the list once more, to 10.

The 10 technologies listed below have been chosen on the basis of what I think of them. Thus, the

purpose of this list is to start a discussion, not end it. For this reason, I’ve explained why I picked

each item, and also why I’ve ranked it among the top 10.

3.1. Storage Infrastructure

As data continues to grow, the need for storage will only increase. The payoff in cost savings and

reliability makes this an important effort. Many centers are already addressing this, and the rest

should do so, as well. We could do well to figure out some creative ways to share resources among

centers.

3.2. Virtualization

As with storage infrastructure, the key value is efficiency. Virtualization provides real improvements

in processing power, power conservation, and reliability and can contribute to business continuity

and backup. It is a huge, strategic technology that affects computing at a fundamental level. Most of

the centers have already acted on this insight, but more remains to be done.

3.3. Social Software and Social Networking

It’s easy to discount the importance of social software because the most publicized examples, such

as Facebook and Twitter, do not immediately present obvious improvements to organizational

collaboration. But when we realize that this category also includes everything from SharePoint and

Google Groups to Skype conferencing, RSS and mailing lists, the importance of the category

becomes clearer. Simply put, we need to use whatever technologies are appropriate to support

more collaboration both within the CGIAR and with our stakeholders.

3.4. Multipoint Video Conferencing Gateway Service

It would seem that video conferencing has reached a tipping point. For years, bandwidth limitations,

the lack of an IP-based infrastructure and issues such as jitter limited its effectiveness. Now that is

mostly past. With the difficulties resolved, we can respond to the basic appeal videoconferencing

has always offered. And those new displays look pretty good, too!

3.5. BlackBerry, iPhone, ActiveSync

Page 31: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 31

The strongest argument supporting these technologies is their pervasive global availability, often

coupled with more reasonable pricing than before. We should even re-examine whether it is more

practical to employ cellular modems for our traveling laptops than relying only on Wi-Fi.

3.6. Periodic Security Scans

Virtually all of us agree that security scans are good, and their price is coming down. At the same

time, new threats, particularly to Websites, make this technology more necessary.

3.7. Training Programs

Increasingly, we find that implementing the hardware and software is easier than getting people to

use it effectively. This is particularly true for online collaboration and Web content creation, but it is

also true for the users’ part of database maintenance and how they get different applications to

work together in actual work routines. The need for training becomes crystal clear when a major

application upgrade happens, and it becomes crucial for change management. There is a lot more

going on here than simply teaching people Word and Excel.

3.8. Cloud Computing

If you think of cloud computing as a general approach where what is outsourced can be made much

more granular and the extent to what is put in the cloud and what is kept is much more flexible, its

potential stands out. The technology goes all the way from familiar old applications like hosted

email to grid computing and virtual storage in the cloud. More applications are rapidly appearing.

While we need to make precise decisions about what goes where and keep our feet on the ground,

in general, it’s time to put our heads in the cloud.

3.9. Business Continuity

All the centers continue to be increasingly dependent on information technology, and the cost of

guaranteeing its availability continues to decline. This being the case, business continuity technology

has a real future with the CGIAR. The only question is when the cost-benefit curves align.

3.10 Metadata Management

The term “metadata management” is somewhat off-putting, because “metadata” has become

associated with some older, cumbersome ways to organize content, such as labor-intensive tagging

schemes and arcane taxonomies. There is no doubt, however, that access to content is becoming

more of an issue, as the amount of content inexorably grows and the demand for its collaborative

use increases. Perhaps we should start the discussion with thoughts on the uses and limits of search

technology…

Page 32: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 32

4. Summary

For the purpose of stimulating discussion, I have presented 35 technologies and business processes

that in the end resulted in 10 ranked choices.

These ratings are certainly not final; my sincere hope is that by presenting them, it begins a specific

discussion about how the CGIAR centers, individually and collectively, can adopt new technologies

and practices to support our critical mission with reasonable cost-effectiveness.

Page 33: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 33

5. Appendix

Multipoint video conferencing gateway service. Video has become more and more utilized as

bandwidth has increased and prices have come down. The simplest and easiest to use are point-to-

point. There is a need to see up meetings with multiple locations and some options (e.g., Vidyo)

make this easier than ever.

Windows 7. With Vista being replaced with Windows 7, there is a general interest in whether to

move to the new Microsoft offering and when.

Green IT. Shifting to more efficient products and approaches can allow for more equipment to fit

within an energy footprint, or to fit into a previously filled center. Regulations are multiplying and

have the potential to seriously constrain companies in building data centers, as the effect of power

grids, carbon emissions from increased use and other environmental impacts are under scrutiny.

Organizations should consider regulations and have alternative plans for data center and capacity

growth. In the near term the environmental benefits will likely take a back seat to the cost savings

from lower energy use

Unified Communications. During the next five years, the number of different communications

vendors with which a typical organization works with will be reduced by at least 50 percent. This

change is driven by increases in the capability of application servers and the general shift of

communications applications to common off-the-shelf server and operating systems. As this occurs,

formerly distinct markets, each with distinct vendors, converge, resulting in massive consolidation in

the communications industry. Organizations must build careful, detailed plans for when each

category of communications function is replaced or converged, coupling this step with the prior

completion of appropriate administrative team convergence. Unified communications can be used

to streamline existing business processes improving operational efficiencies in the near term and

supporting more aggressive transformational efforts longer term.

Business Process Management. BPM is more of a business discipline than a technology, but it is

necessary to make sure the technology of service-oriented architectures (SOA) deliver business

value.

Metadata Management. Metadata is the foundation for information infrastructure and is found

throughout your IT systems: in service registries and repositories, Web semantics, configuration

management databases (CMDB), business service registries and in application development.

Page 34: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 34

Virtualization. Much of the current buzz is focused on server virtualization, but virtualization in

storage and client devices is also moving rapidly. Virtualization to eliminate duplicate copies of data

on the real storage devices while maintaining the illusion to the accessing systems that the files are

as originally stored (data deduplication) can significantly decrease the cost of storage devices and

media to hold information. Hosted virtual images deliver a near-identical result to blade-based PCs.

But, instead of the motherboard function being located in the data center as hardware, it is located

there as a virtual machine bubble. Various virtualization approaches have significant potential to

reduce IT costs.

Enterprise Mashups. Enterprises are now investigating taking mashups from cool Web hobby to

enterprise-class systems to augment their models for delivering and managing applications. Through

2010, the enterprise mashup product environment will experience significant flux and consolidation,

and application architects and IT leaders should investigate this growing space for the significant and

transformational potential it may offer their enterprises. In the near term mashups should be used

to create visualization dashboards and opportunistic end user applications that fill gaps in the

current application portfolio and provide support for existing business process needs.

Web-Oriented Architectures. The Internet is arguably the best example of an agile, interoperable

and scalable service-oriented environment in existence. This level of flexibility is achieved because

of key design principles inherent in the Internet/Web approach, as well as the emergence of Web-

centric technologies and standards that promote these principles. The use of Web-centric models to

build global-class solutions cannot address the full breadth of enterprise computing needs.

Computing Fabrics. Today’s blade server design places memory and processors into a fixed

combination inside a blade, and until recently neither memory or processors from one blade could

be combined with that of other blades.

Real World Web. Increasingly ubiquitous network access with reasonably useful bandwidth is

enabling the beginnings of what analysts are calling the “real world Web.” The goal is to augment

reality with universal access to information specific to locations, objects or people. An example is to

allow a vacationer to snap a picture of a monument or tourist attraction and immediately receive

information about the object, instead of flipping through a travel book.

Social Software and Social Networking. Social software includes a broad range of technologies, such

as social networking, social collaboration, social media and social validation. Enterprises should

establish a strategy to monitor and engage in external social networking as it relates to their

business because the greatest risk lies in failure to engage and thereby, being left mute in a dialogue

where your voice must be heard. Enterprises should consider adding a social dimension to

conventional Web sites to enhance the customer experience - an important consideration in a highly

competitive slow/no growth economy. Enterprises should also examine use of social software to

Page 35: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 35

extend internal collaboration applications to support specific and targeted communication and

coordination needs.

BlackBerry, iPhone, ActiveSync. Reading mail while exiting a plane, in a taxi or waiting for food at

breakfast is de rigueur for busy staff, and yet still few senior staff in the CGIAR have such devices.

They now work in most countries. The BlackBerry Enterprise Service (BES) is straightforward to

install. MS ActiveSync works out of the box with Exchange servers and syncs contacts, emails,

calendar, etc.

Automated failover for critical network components. Critical switches and routers can be set for

automated failover, and relationships between external providers can be set for Border Gateway

Protocol (BGP) routing, so that in the event of an Internet failure, the alternate provider

automatically takes over.

Highly secure local networks with intrusion prevention. New security threats are constantly

emerging. Recently, Chinese hackers were able to penetrate the World Bank. New technologies

mitigate the chances of successful attacks, however. In particular, the newer Cisco ASA (Adaptive

Security Appliance) incorporates some intrusion prevention, and high-end products like Tipping

Point offer advanced capabilities. An interesting VMware-related product is Catbird.

Business Continuity. Given the universally increased dependence on email, a system can be set up

so that in the event of catastrophic hardware failure, or a software error, end users and

management would continue to be able to send and receive email. Similar systems are available for

other technologies, such as databases.

Exchange to 2007 or 2010. Many benefits accrue when upgrading from 2003: performance,

robustness, separation of roles, easier management. Few problems have been reported for those

who have upgraded.

Windows Server 2008. Many new features provide cleaner, simpler and more robust services. For

example: (1) the small footprint Server Core; (2) built-in Network Access Protection first

quarantines and cleans remote user machines before allowing them to log onto the network; (3)

Active Directory Federation Services makes it easier to build relationships between trusted

partners. This may provide some relief from the relative isolation of AD.

Local SharePoint Services. Some centers currently access hosted SharePoint services, others have

in-house services. Pros and cons?

New Enterprise Architecture. This would mean to basically redesign the global CGIAR

telecommunications system. Enterprise Architecture is the formal organization of the components,

structures and processes required or relevant to the attainment of the goals and visions invested or

envisioned in an enterprise. Enterprise Architecture is concerned with all aspects of an enterprise

Page 36: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 36

with information technology as a sub-context. Enterprise architecture involves developing an

architecture framework to describe a series "as-is", "migration plan" and "to-be". Source

(http://en.wikipedia.org/wiki/Enterprise_architecture)

Alternatives to Active Directory. A particular AD design was made several years ago. These original

decisions need to be re-examined on a periodic basis. (For a list of AD alternative see

http://technet.microsoft.com/en-us/library/cc526438.aspx) In addition one might make AD part of

a distributed directory. This could be done in many ways and one option is to use a product such as

Isode’s M-Vault or an X.500-like product. (Source: http://www.isode.com/whitepapers/active-

directory.html)

Chargeback. Historically the IT departments at some centers have charged back to other

departments for their services. These centers tend to have better funded and more sustainable IT

infrastructures. Centers where the IT operation is defined as a cost center have a poorer ability to

maintain sufficient funding for their operations.

System-wide Software and Service Acquisition. Recent acquisition negotiations have brought

Microsoft products to CGIAR centers at an 89% discount. The CGIAR can identify other software,

e.g., VMware, and negotiate similar special deals.

Periodic Security Scans. One activity which has had significant payoff within the CGIAR is

vulnerability scans of individual centers. Many valuable findings have been given to centers. If

scheduled on a regular basis, a low-cost contract for security assurance may be possible. We are,

after all, experiencing a continued level of threat, including the recent spate of SQL-injection attacks

on CGIAR servers.

NAC - Network Access Control. The key value proposition of NAC solutions is the ability to prevent

end-stations that lack antivirus, patches, or host intrusion prevention software from accessing the

network and placing other computers at risk of cross-contamination by network worms. Network

Access Control is a computer networking concept and set of protocols used to define how to secure

the network nodes prior to the nodes accessing the network. (Source:

http://en.wikipedia.org/wiki/Network_Access_Control

Low cost desktops -- virtualization of desktop. Thin client desktops can reduce IT admin costs,

power costs, and perhaps desktop costs.

Training programs: These can be of several types: technical for specific software and hardware

systems; conceptual/operational for functions such as database design, data sharing and

organization; personal productivity enhancement, such as GTD (Getting Things Done), including how

to support such processes using existing software. The latter extends beyond IT to all parts of the

organization. IT group could recommend courses, and venues in different countries based on cost

Page 37: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 37

and quality based on local experiences. Also, short-term staff seconding or exchange could be

considered where applicable.

Offline SharePoint. Use Groove to permit staff in hard-to-reach locations to synchronize certain

workspaces in SharePoint via Groove for offline use and update.

System-wide central IP PBX. Unified Communications mentioned by Gartner could be applied for

the CGIAR as a whole, integrated with the Exchange and IM already in operation.

Open Source for Servers and Desktops. Open source has been around for a long time and is similar

to similar to “open standards. ” Researchers with access to the ARPANET used a process called

Request for Comments to develop telecommunication network protocols. Characterized by

contemporary open source work, this 1960's collaborative process led to the birth of the Internet in

1969. The decision by some people in the free software movement to use the label “open source”

came out of a strategy session held in Palo Alto, California, in reaction to Netscape's January 1998

announcement of a source code release for Navigator. They used the opportunity before the release

of Navigator's source code to free themselves of the ideological and confrontational connotations of

the term free software.Today the term is used in many contexts and the bottom line, is that some

software may be available to the CGIAR at relatively low cost via this route.

(http://en.wikipedia.org/wiki/Open_source)

Storage Infrastructure. Until recently, Storage Area Networks (SANs) were generally very expensive

due in part to the need for connections via Fiber Channel. Now major vendors (Netapps, EMC, etc.)

offer connections via iSCSI, and NFS. Network attached storage (NAS) prices have also fallen

dramatically. The CGIAR is in a good position for a group purchase or obtaining group pricing -- and

certainly for information sharing. Also, the move to VMware cannot take place without good

coupling with a storage infrastructure.

High Performance Networking and Computing. The current era of supercomputing combines very

large numbers of heterogeneous computers on networks to create a virtual supercomputer. Many

academic institutions and private companies are therefore moving compute-intensive applications

from the LAN to the Web. Certain entities within the CGIAR require substantial computing

resources. Investments in this area have been made. With what results? Should the CGIAR keep up

on this trend and take advantage of this new option when possible?

Cloud Computing - Software as a Service (SaaS). Cloud computing is a style of computing that

characterizes a model in which providers deliver a variety of IT-enabled capabilities to consumers.

They key characteristics of cloud computing are 1) delivery of capabilities “as a service,” 2) delivery

of services in a highly scalable and elastic fashion, 3) using Internet technologies and techniques to

develop and deliver the services, and 4) designing for delivery to external customers. Although cost

is a potential benefit for small companies, the biggest benefits are the built-in elasticity and

Page 38: Strategic Technologies for the CGIAR in 2009ictkm.cgiar.org/document_library/program_docs/Strategic Technologi… · Cost reduction - Extent to which the technology could provide

Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 38

scalability, which not only reduce barriers to entry, but also enable these companies to grow quickly.

As certain IT functions are industrializing and becoming less customized, there are more possibilities

for larger organizations to benefit from cloud computing. However, caution is advised since

significant privacy and security issues exist. Cloud computing is not appropriate for the full

spectrum of enterprise applications.

Business Intelligence. Business Intelligence (BI), the top technology priority in Gartner’s 2008 CIO

survey, can have a direct positive impact on a company’s business performance, dramatically

improving its ability to accomplish its mission by making smarter decisions at every level of the

business from corporate strategy to operational processes. BI is particularly strategic because it is

directed toward business managers and knowledge workers who make up the pool of thinkers and

decision makers that are tasked with running, growing and transforming the business. Tools that let

these users make faster, better and more-informed decisions are particularly valuable in a difficult

business environment.

Servers — Beyond Blades. Servers are evolving beyond the blade server stage that exists today. This

evolution will simplify the provisioning of capacity to meet growing needs. The organization tracks

the various resource types, for example, memory, separately and replenishes only the type that is in

short supply. This eliminates the need to pay for all three resource types to upgrade capacity. It also

simplifies the inventory of systems, eliminating the need to track and purchase various sizes and

configurations. The result will be higher utilization because of lessened “waste” of resources that

are in the wrong configuration or that come along with the needed processors and memory in a

fixed bundle. This trend should be factored into longer range strategic planning during 2009