Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Strategic Technologies for the CGIAR in 2010
December 2009
Enrica Porcari
Chief Information Officer
CGIAR
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 2
Contents 1. Foreword ..................................................................................................................................... 4
Methodology and Results .................................................................................................................... 6
2. The Top Technologies ................................................................................................................ 10
2.1. Multipoint Conferencing Gateway Service .......................................................................... 10
2.2. Storage Infrastructure ........................................................................................................ 11
2.3. Social Software and Social Networking ............................................................................... 12
2.4. Automated Failover for Critical Network Applications ........................................................ 13
2.5. BlackBerry, iPhone, ActiveSync ........................................................................................... 14
2.6. Business Continuity ............................................................................................................ 15
2.7. NAC – Network Access Control ........................................................................................... 16
2.8. Training Programs .............................................................................................................. 17
2.9. Cloud Computing – Software as a Service ........................................................................... 18
2.10. Metadata Management .................................................................................................. 19
2.11. Periodic Security Scans ................................................................................................... 20
2.12. Virtualization .................................................................................................................. 21
2.13. Web Oriented Architecture ............................................................................................ 22
2.14. High Performance Networking and Computing ............................................................... 23
2.15. Local SharePoint Services ............................................................................................... 24
2.16. Low Cost Desktops – Virtualization of Desktop ............................................................... 25
2.17. Exchange 2007 or 2010................................................................................................... 26
2.18. Secure Local Networks with Intrusion Prevention ........................................................... 27
2.19. Windows Server 2008 ..................................................................................................... 28
2.20. Windows 7 ..................................................................................................................... 29
3. The Top Ten Technologies for 2010 ............................................................................................ 30
3.1. Storage Infrastructure ........................................................................................................ 30
3.2. Virtualization ...................................................................................................................... 30
3.3. Social Software and Social Networking ............................................................................... 30
3.4. Multipoint Video Conferencing Gateway Service ................................................................ 30
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 3
3.5. BlackBerry, iPhone, ActiveSync ........................................................................................... 30
3.6. Periodic Security Scans ....................................................................................................... 31
3.7. Training Programs .............................................................................................................. 31
3.8. Cloud Computing ................................................................................................................ 31
3.9. Business Continuity ............................................................................................................ 31
3.10 Metadata Management ..................................................................................................... 31
4. Summary ................................................................................................................................... 32
5. Appendix ................................................................................................................................... 33
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 4
1. Foreword
Last year, I initiated a process to inform the annual CGIAR IT meeting by presenting a framework for
deciding how best to improve IT in the system. The result was an analysis of potential technologies,
based primarily on my own assessment of their potential, in response to five questions that I asked
myself. The questions were:
How much does the technology improve the effectiveness of a center’s operation and/or the
CGIAR’s mission?
Will adopting the technology significantly reduce costs over time?
Can the technology be implemented in a reasonable timeframe with available resources?
Will the technology improve end users’ productivity and/or satisfaction?
Can the technology be implemented and sustained on a minimal budget?
The result of the exercise was a paper that stimulated useful discussion at the meeting at ICRISAT-
Hyderabad in 2008.
Later, we have included one more general question:
What is our concrete experience with the technology so far?
Several of the technologies discussed last year have been implemented, to one extent or another, and
several more are “in the pipeline” for implementation. Thus, we have another important measure of a
technology: whether we actually do something with it.
35 technologies and business processes were evaluated in the survey; they comprised the 29 discussed
at Hyderabad, which has been partly informed by Gartner’s list of most important technologies for 2008.
In addition, we added the technologies Gartner added in its 2009 report, as well as two more suggested
by the IT managers. The descriptions of the technologies, as they were distributed in the questionnaire,
are listed in the appendix.
The overall results of the survey are shown in tabular form in Section2, followed by a discussion of how
the number of technologies to be discussed here was narrowed down from 35 to a more manageable
20. Those 20 are then described and discussed in terms of the six questions listed above: effectiveness,
practicality, user satisfaction, cost reduction, overall costs and current degree of implementation and
interest.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 5
It is interesting to compare the findings this year with those in the “Strategic Technologies for the CGIAR
in 2009” paper. When comparing the Top 10 technologies for 2010 selected by the IT Managers, we
noted that 7 out of the 10 technologies are still part of the Top 10 for 2010 (in different orders) and
there are 3 new technologies or processes that appeared in the Top 10 for this year:
Multipoint video conferencing gateway service
Business Continuity
Metadata Management
A quick look at the top 10 technologies for 2010 and a look back at those of 2009
Technology/Process 2009 2010
Top 1 System-wide Software and Service Acquisition
Storage infrastructure (E.g: Email Archive)
Top 2
Email Archive Appliance as part of Storage Infrastructure Virtualization 2.0
Top 3 Virtualization 2.0 Social Software and Social Networking
Top 4 Chargeback
Multipoint video conferencing gateway service
Top 5 Training Programs BlackBerry, iPhone, ActiveSync
Top 6 Hosted Email (as SaaS example) Periodic Security Scans
Top 7 Social Software Training Programs
Top 8 Periodic Security Scans Cloud Computing - Software as a Service (SaaS)
Top 9 BlackBerry, iPhone, ActiveSync
Business Continuity
Top 10 Upgrade to Exchange 2007
Metadata Management
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 6
Methodology and Results
The survey sent to the CGIAR IT managers listed 35 technologies and asked for them to be rated
according to:
Effectiveness - Extent to which you believe the technology would improve the effectiveness of the
operation of the centers and/or CGIAR’s mission.
1 = no improvement of CG effectiveness, 2 = not likely, 3 = unknown, 4 = some potential improved
effectiveness, 5 = Major potential for improving effectiveness of CG
Practicality - Extent to which the technology can be done in a reasonable timeframe with available
resources.
1 = not at all practical – hard to do, 2 = probably not practical, 3 = unknown, 4 = somewhat practical, 5 =
very practical easy to implement
User Satisfaction - Extent to which the technology improves the productivity of the end user
1 = not at all a productivity enhancer to end user, 2 = probably not a productivity enhancer, 3 =
unknown 4 = somewhat a productivity enhancer , 5 = high potential for productivity enhancement to
end users
Cost reduction - Extent to which the technology could provide significant cost reduction
1 = not at all likely to produce cost savings, 2 = probably won’t produce cost savings. 3 = unknown 4 =
likely to produce cost saving, 5 = highly likely to produce cost savings
Low Cost - Extent to which the technology can be done on a minimal budget.
1 = very expensive to implement, 2 = somewhat expensive to implement, 3 = unknown, 4 = fairly low
cost, 5 = very low cost to implement
Being Done - Extent to which this item was implemented in the past year or is in the process of being
implemented in your center.
1- Undecided, 2- Would like to implement, 3- Won't implement, 4- Implemented, but would like to do
more, 5- Implemented, don't intend to do more.
For the measures of effectiveness, Practicality (Doable), User Satisfaction and Cost Reduction and Low
Cost, the percentages represent the number of responses in both categories 4 and 5. For example, for
Practicality, figures in the table are the percentage of respondents who answered either “somewhat
practical” or “very practical easy to implement.” The “Being Done” Question percentages include t the
responses to this question into two categories – “implemented” responses into one category, and
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 7
putting the response “would like to implement” into a category.. Thus, we have a measure of how many
centers have implemented a technology (Done + More need) and a relative rating of how many of the
centers where the technology has not been implemented would like to implement it (Would like to).
Ranking
In the table, the technologies were ranked in order of the percentages responding to the “Effectiveness”
measure, from largest to smallest. It is interesting to note that high ratings for effectiveness, practicality
and user satisfaction are fairly highly correlated. The highest scores in each category were highlighted,
and the extent to which the colors line up can be seen.
A general notion of how the CGIAR IT managers judge these technologies can be seen from the table. For example, adopting a multipoint video conferencing gateway service is a popular idea, rating high on effectiveness, practicality, user satisfaction, and cost reduction. And most centers report that they would like to do it!
Example Entry
Item Effective Doable
Satisfy User
Cost Reduce
Low Cost Done + More
need Would Like to
Multipoint video conferencing gateway service
100% 86% 100% 93% 29% 43% 57%
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 8
Ratings of ICT Technologies by CG IT Managers 2009 (Shaded areas represent highest percentages in corresponding category)
Item Effective Doable
Satisfy User
Cost Reduce
Low Cost Done + More
need Would Like to
Multipoint video conferencing gateway service 100% 86% 100% 93% 29% 43% 57%
Storage infrastructure (E.g: Email Archive) 100% 93% 71% 36% 7% 57% 36%
Chargeback 93% 86% 50% 71% 50% 86% 7%
Social Software and Social Networking 93% 71% 93% 21% 57% 50% 14%
Automated Failover for Critical Network Components 86% 79% 86% 14% 21% 29% 50%
BlackBerry, iPhone, ActiveSync 86% 86% 93% 21% 36% 57% 21%
Business Continuity 86% 79% 71% 29% 7% 57% 36%
Cloud Computing - Software as a Service (SaaS) 86% 64% 57% 71% 43 14% 57%
NAC - Network Access Control 86% 43% 43% 21% 14% 14% 64%
Training Programs 86% 71% 79% 43% 0% 29% 50%
Metadata Management 79% 50% 71% 29% 21% 43% 14%
Open Source for servers and desktops 79% 71% 50% 64% 64% 64% 21%
Periodic Security Scans 79% 71% 29% 21% 7% 29% 71%
Virtualization 2.0 79% 79% 43% 79% 29% 57% 21%
Web Oriented Architecture (WOA) 79% 50% 71% 43% 21% 36% 21%
Business Intelligence 71% 36% 43% 43% 0% 14% 36%
Business Process Management 71% 57% 43% 43% 7% 21% 36%
High Performance networking and computing 71% 57% 79% 21% 21% 36% 21%
Local SharePoint Services 71% 71% 57% 36% 36% 50% 7%
Low cost desktops -- virtualization of desktop 71% 64% 36% 64% 43% 14% 29%
Exchange 2007 or 2010 (local or hosted) 64% 64% 71% 21% 0% 7% 50%
Secure local networks /with intrusion prevention 64% 57% 29% 29% 0% 29% 50%
System-wide Software and Service Acquisition 64% 64% 64% 71% 64% 64% 14%
Windows Server 2008 64% 71% 36% 7% 36% 29% 50%
System-wide Central IP PBX 57% 43% 57% 57% 14% 14% 36%
Unified Communications 57% 36% 57% 50% 14% 7% 43%
Alternatives to Active Directory 50% 36% 36% 29% 36% 0% 43%
Green IT 50% 57% 43% 57% 21% 43% 29%
New Enterprise Architecture 50% 21% 21% 29% 14% 7% 29%
Offline SharePoint 50% 29% 43% 21% 14% 14% 29%
Servers beyond blades 50% 43% 14% 36% 14% 14% 7%
Windows 7 50% 64% 57% 0% 36% 0% 64%
Enterprise Mashups 43% 36% 50% 21% 7% 7% 29%
Computing Fabrics 21% 29% 7% 29% 7% 14% 7%
Real World Web 21% 7% 36% 7% 7%/ 7% 7%
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 9
Narrowing the Technology Set
Fifteen of the technologies listed were eliminated to simplify the discussion. There were two criteria for
removal.. Either the ratings for the technologies were low, compared to the others, or, in three cases,
the percentage of centers already implementing the technologies was so high that these technologies
could not be considered strategic future choices. These three technologies were “chargebacks,” “open
source for servers and desktops,” and “system wide software and service acquisition.” These are
currently implemented by 86%, 64% and 64% of centers, respectively. Clearly, these are important
technologies, but it appears that they have already received enough discussion.
What remains, then, are the technologies with relatively high scores on at least one dimension, absent
those that are already significantly implemented.
Top 20 ICT Technologies from CG IT Manager’s Survey (Shaded areas represent highest percentages in corresponding category)
Item Effective Doable
Satisfy User
Cost Reduce
Low Cost Done + More
need Would Like to
Multipoint video conferencing gateway service 100% 86% 100% 93% 29% 43% 57%
Storage infrastructure (E.g: Email Archive) 100% 93% 71% 36% 7% 57% 36%
Social Software and Social Networking 93% 71% 93% 21% 57% 50% 14%
Automated Failover for Critical Network Components 86% 79% 86% 14% 21% 29% 50%
BlackBerry, iPhone, ActiveSync 86% 86% 93% 21% 36% 57% 21%
Business Continuity 86% 79% 71% 29% 7% 57% 36%
Cloud Computing - Software as a Service (SaaS) 86% 64% 57% 71% 43 14% 57%
NAC - Network Access Control 86% 43% 43% 21% 14% 14% 64%
Training Programs 86% 71% 79% 43% 0% 29% 50%
Metadata Management 79% 50% 71% 29% 21% 43% 14%
Periodic Security Scans 79% 71% 29% 21% 7% 29% 71%
Virtualization 2.0 79% 79% 43% 79% 29% 57% 21%
Web Oriented Architecture (WOA) 79% 50% 71% 43% 21% 36% 21%
Business Intelligence 71% 36% 43% 43% 0% 14% 36%
Business Process Management 71% 57% 43% 43% 7% 21% 36%
High Performance networking and computing 71% 57% 79% 21% 21% 36% 21%
Local SharePoint Services 71% 71% 57% 36% 36% 50% 7%
Low cost desktops -- virtualization of desktop 71% 64% 36% 64% 43% 14% 29%
Exchange 2007 or 2010 (local or hosted) 64% 64% 71% 21% 0% 7% 50%
Secure local networks /with intrusion prevention 64% 57% 29% 29% 0% 29% 50%
Windows Server 2008 64% 71% 36% 7% 36% 29% 50%
Windows 7 50% 64% 57% 0% 36% 0% 64%
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 10
2. The Top Technologies
2.1. Multipoint Conferencing Gateway Service
Description: Video has become more and more utilized as bandwidth has increased and prices have
come down. The simplest and easiest to use are point-to-point. There is a need to see up meetings with
multiple locations and some options (e.g., Vidyo) make this easier than ever.
Analysis: Over the years, videoconferencing has evolved from a bandwidth-consuming unreliable
technology to one that consumes less bandwidth and is much more stable. This technology is extremely
popular among the CGIAR IT managers. Combining the percentage who have already implemented the
technology with those who would like to implement it yields a figure of 100%, which is also the figure for
effectiveness and user satisfaction. Practicality and cost reduction are also rated high. The only low
figure is for low cost; the technology is perceived as expensive. The most important question to explore,
therefore, may be how to bring down the initial and ongoing costs.
The Bottom Line: Can it be made more affordable?
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 11
2.2. Storage Infrastructure
Description: Until recently, Storage Area Networks (SANs) were generally very expensive due in part to
the need for connections via Fiber Channel. Now major vendors (Netapps, EMC, etc.) offer connections
via iSCSI, and NFS. Network attached storage (NAS) prices have also fallen dramatically. The CGIAR may
be in a good position for a group purchase or obtaining group pricing -- and certainly for information
sharing. Also, the move to VMware cannot take place without good coupling with a storage
infrastructure.
Analysis: Clearly, we are all facing the challenge of ever-increasing data that must be stored. Storage
infrastructure technology is seen as an effective and practical way to address this need, and many
centers have moved in this direction. More needs to be done, however, but even with the price drops
the technology is still perceived as expensive and as not likely to generate cost efficiencies when
implemented.
The Bottom Line: Absent any creative innovation, this will ultimately be the path of least resistance for
storage efficiencies, but it will be relatively expensive. For efficient VMware installations, a properly
functioning SAN is required.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 12
2.3. Social Software and Social Networking
Description: Social software includes a broad range of technologies, such as social networking, social
collaboration, social media and social validation. Enterprises should establish a strategy to monitor and
engage in external social networking as it relates to their business because the greatest risk lies in failure
to engage and thereby, being left mute in a dialogue where your voice must be heard. Enterprises
should consider adding a social dimension to conventional Web sites to enhance the customer
experience - an important consideration in a highly competitive slow/no growth economy. Enterprises
should also examine use of social software to extend internal collaboration applications to support
specific and targeted communication and coordination needs.
Analysis: As is often the case with applications that begin in the consumer space and migrate to
organizational uses, social networking is perceived as pleasing users. It is also perceived as effective
reasonably practical and relatively cheap, although significant cost reductions are not expected. So why
do so few want to do it? The answer may be that creating community and content goes way beyond
providing an enabling technology. It requires people who like to communicate this way and who have
content others want to spend time with. How to foster this is still somewhat mysterious to many.
The Bottom Line: Make the technologies available, and grow them as successful use grows.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 13
2.4. Automated Failover for Critical Network Applications
Description: Critical switches and routers can be set for automated failover, and relationships between external providers can be set for Border Gateway Protocol (BGP) routing, so that in the event of an Internet failure, the alternate provider automatically takes over. Analysis: Everybody loves increased reliability, and it’s not that hard to implement. The return on investment is likely to be “soft,” instead of resulting in a quantifiable ROI, however. So far, this looks more like a vitamin than a painkiller, but people at least give lip service to the idea that they should get around to implementing it. The Bottom Line: This may seem a lot more useful after a couple of intolerable network failures…
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 14
2.5. BlackBerry, iPhone, ActiveSync
Description: Reading mail while exiting a plane, in a taxi or waiting for food at breakfast is de rigueur for busy staff, and yet still few senior staff in the CGIAR have such devices. They now work in most countries. The BlackBerry Enterprise Service (BES) is straightforward to install. MS ActiveSync works out of the box with Exchange servers and syncs contacts, emails, calendar, etc. Analysis: Users love their smartphones, and they’re not just toys. The organization does benefit from users’ additional access to email, particularly where Wi-Fi isn’t easily available. Given the technology’s dependence on external vendors, however, it’s not seen as a money saver. But for half the centers, its time has already come, and more can be expected to sign on soon, at least for some of their users. The Bottom Line: One day, we will wake up and everybody will have these. The strategic question is how centers, as organizations, will make use of that.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 15
2.6. Business Continuity
Description: Given the universally increased dependence on email, a system can be set up so that in the
event of catastrophic hardware failure, or a software error, end users and management would continue
to be able to send and receive email. Similar systems are available for other technologies, such as
databases.
Analysis: Nobody likes interrupted email, and other applications may deserve similar protection
depending on how long they can be done without and how much data loss can be tolerated. This
technology has been around long enough so that few are concerned about difficulty of implementation.
But while costs have dropped, this technology still isn’t cheap.
The Bottom Line: You have to decide how much this protection is worth. Better yet, you have to get top
management to decide how much it’s worth.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 16
2.7. NAC – Network Access Control
Description: The key value proposition of NAC solutions is the ability to prevent end-stations that lack
antivirus, patches, or host intrusion prevention software from accessing the network and placing other
computers at risk of cross-contamination by network worms. Network Access Control is a computer
networking concept and set of protocols used to define how to secure the network nodes prior to the
nodes accessing the network. (Source: http://en.wikipedia.org/wiki/Network_Access_Control.)
Analysis: As with so many security technologies, users don’t notice access control until it doesn’t work.
In fact, they probably won’t understand what went wrong. This relatively new technology is seen as
promising, but managers aren’t really clear yet on how it will work out in practice, or how much it will
cost.
The Bottom Line: You know the devil is in the details; now you have to discover them.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 17
2.8. Training Programs
Description: These can be of several types: technical for specific software and hardware systems; conceptual/operational for functions such as database design, data sharing and organization; personal productivity enhancement, such as GTD (Getting Things done), including how to support such processes using existing software. The latter extends beyond IT to all parts of the organization. IT group could recommend courses, and venues in different countries based on cost and quality based on local experiences. Also, short-term staff seconding or exchange could be considered where applicable.
Analysis: The moderately high scores for effectiveness, practicality, and user satisfaction indicate that most IT managers consider training a good idea. It’s even given relatively high marks for potential cost reduction. But it’s clearly labor and expertise intensive, so nobody says it’s cheap. Also, frankly, training isn’t in the average IT manager’s skill set.
The Bottom Line: A tried and true approach which has not grown less in need.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 18
2.9. Cloud Computing – Software as a Service
Description: Cloud computing is a style of computing that characterizes a model in which providers
deliver a variety of IT-enabled capabilities to consumers. They key characteristics of cloud computing are
1) delivery of capabilities “as a service,” 2) delivery of services in a highly scalable and elastic fashion, 3)
using Internet technologies and techniques to develop and deliver the services, and 4) designing for
delivery to external customers. Although cost is a potential benefit for small companies, the biggest
benefits are the built-in elasticity and scalability, which not only reduce barriers to entry, but also enable
these companies to grow quickly. As certain IT functions are industrializing and becoming less
customized, there are more possibilities for larger organizations to benefit from cloud computing.
However, caution is advised since significant privacy and security issues exist. Cloud computing is not
appropriate for the full spectrum of enterprise applications.
Analysis: A relatively new kid on the block, cloud computing is already seen as effective, fairly practical,
significantly cost reducing and relatively inexpensive. While few centers have adopted it yet, most would
like to. The offerings in this space are increasing daily, it seems, so the main issue is exactly what
solution provides which benefits. While general concerns about depending on connectivity for access to
key resources have decreased in general, these are still issues in some locations and for some
applications.
The Bottom Line: The question is no longer whether a bear can dance, but how well the bear dances.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 19
2.10. Metadata Management
Description: Metadata is the foundation for information infrastructure and is found throughout your IT systems: in service registries and repositories, Web semantics, configuration management databases (CMDB), business service registries and in application development. Analysis: Over time, this technology has moved from spectacularly daunting to only a little scary. A good number of centers have grappled with the issues by now, although the ones that haven’t don’t seem all that anxious to try. This is one of those issues that will come up in various contexts, however, such as whether to tag documents in SharePoint or how to tweak search technology. Don’t expect it to go away. The Bottom Line: More information science than computer science, employing this technology means acquiring some new expertise, but an increasing number of managers say it’s worth it.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 20
2.11. Periodic Security Scans
Description: One activity which has had significant payoff within the CGIAR is vulnerability scans of
individual centers. Many valuable findings have been given to centers. If scheduled on a regular basis, a
low-cost contract for security assurance may be possible. We are, after all, experiencing a continued
level of threat, including the recent spate of SQL-injection attacks on CGIAR servers.
Analysis: This is another mature security technology that is seen as valuable and do-able, which users
will never notice, which will cost some money, and which will only save you money if you don’t do it and
something goes wrong. Our IT managers, responsible souls all, realize that this should be done, but less
than a third has actually achieved it yet. One solution may be to examine whether newer technologies
allow this to be done more easily and inexpensively.
The Bottom Line: This is an item which has risen in importance and is now within reach.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 21
2.12. Virtualization
Description: Much of the current buzz is focused on server virtualization, but virtualization in storage
and client devices is also moving rapidly. Virtualization to eliminate duplicate copies of data on the real
storage devices while maintaining the illusion to the accessing systems that the files are as originally
stored (data deduplication) can significantly decrease the cost of storage devices and media to hold
information. Hosted virtual images deliver a near-identical result to blade-based PCs. But, instead of the
motherboard function being located in the data center as hardware, it is located there as a virtual
machine bubble. Various virtualization approaches have significant potential to reduce IT costs.
Analysis: Virtualization gets relatively high marks across the board, and more than half the centers have
at least done some of it. This technology is now in the mainstream and the only question is how far we
go with it how fast.
The Bottom Line: The issue is no longer whether to adopt the technology, but how to manage it.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 22
2.13. Web Oriented Architecture
Description: The Internet is arguably the best example of an agile, interoperable and scalable service-
oriented environment in existence. This level of flexibility is achieved because of key design principles
inherent in the Internet/Web approach, as well as the emergence of Web-centric technologies and
standards that promote these principles. The use of Web-centric models to build global-class solutions
cannot address the full breadth of enterprise computing needs.
Analysis: WOA, a potential successor to SOA (service-oriented architecture) addresses the question of
how to locate and integrate resources in a network in a flexible and agile way. This requires both a new
mindset on how to locate network resources and new naming techniques, such as the universal use of
Universal Resource Indicators (URIs) and how to construct them. It is possible to bite off a bit of this
technology for a specific use, and the potential for resource sharing across the Web remains great, but a
thoroughgoing redesign to this new architecture is unlikly to be born at any center soon.
The Bottom Line: This will be happening but the pace is uncertain.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 23
2.14. High Performance Networking and Computing
Description: The current era of supercomputing combines very large numbers of heterogeneous
computers on networks to create a virtual supercomputer. Many academic institutions and private
companies are therefore moving compute-intensive applications from the LAN to the Web. Certain
entities within the CGIAR require substantial computing resources. Investments in this area have been
made. With what results? Should the CGIAR keep up on this trend and take advantage of this new
option when possible?
Analysis: There is no doubt that data analysis projects at centers could benefit from properly applied
computing power. Thus, the promise of high performance networking and computing is clear, and
recognized for its potential effectiveness, practicality and user satisfaction. Whether its adoption rate
grows beyond the approximately one-third of centers that have done something with it so far probably
depends on how the processing power and bandwidth can be assembled as needed. In some cases,
consortia, such as NRENs have been formed to address this, and, for a continuing inquiry, this might be a
good place to start.
The Bottom Line: The IT managers of the centers that have succeeded with this should discuss their
experiences with the IT managers of the centers who haven’t.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 24
2.15. Local SharePoint Services
Description: Some centers currently access hosted SharePoint services, others have in-house services. Pros and cons?
Analysis: It is difficult to know how to interpret these ratings, given the description of the technology (above) that was used in the questionnaire. Does a rating of “effective” mean that local SharePoint services are more useful than hosted ones, for example, or does it simply mean that SharePoint is seen as generally effective?
The Bottom Line: We should spend some face time discussing SharePoint.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 25
2.16. Low Cost Desktops – Virtualization of Desktop
Description: Thin client desktops can reduce IT admin costs, power costs, and perhaps desktop costs.
Analysis: Thin-client computing, which has always promised savings because there are just so many
users’ machines to purchase and support, moves another step forward with client virtualization, which
avoids client/server architecture questions by simply putting the whole client in a virtual machine on a
server. The technology gets moderate to high ratings across the board, but less than a majority of
managers have moved this way or would like to do so. The issue is probably whether the massive
transformation of an organization’s client architecture would really produce gains justifying the change.
The Bottom Line: We need more detailed studies of how this has worked where it has been tried.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 26
2.17. Exchange 2007 or 2010
Description: Many benefits accrue when upgrading from 2003: performance, robustness, separation of
roles, easier management. Few problems have been reported for those who have upgraded.
Analysis: Upgrading Exchange is generally perceived as a good thing, except for the costs. Since the old
system isn’t broken, the burden of proof is on the innovators to show why the move is worth it. That’s
true at least until Microsoft no longer supports your version…
The Bottom Line: Since many would like to upgrade, but few have done so, either considerable
uncertainty exists or everybody’s waiting for the money. A good discussion with people who have
upgraded might make deciding easier.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 27
2.18. Secure Local Networks with Intrusion Prevention
Description: New security threats are constantly emerging. Recently, Chinese hackers were able to
penetrate the World Bank. New technologies mitigate the chances of successful attacks, however. In
particular, the newer Cisco ASA (Adaptive Security Appliance) incorporates some intrusion prevention,
and high-end products like Tipping Point offer advanced capabilities. An interesting VMware-related
product is Catbird.
Analysis: Here is yet another security technology that is generally well regarded but perceived as
expensive and unlikely to generate appreciation from users. All the same, it’s beginning to be adopted
and most who have not done it yet would like to.
The Bottom Line: If the simple desire to improve security isn’t enough, the best approach may be to see
if upgrading the security technology can be combined with other network upgrades to minimize costs.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 28
2.19. Windows Server 2008
Description: Many new features provide cleaner, simpler and more robust services. For example: (1)
the small footprint Server Core; (2) built-in Network Access Protection first quarantines and cleans
remote user machines before allowing them to log onto the network; (3) Active Directory Federation
Services makes it easier to build relationships between trusted partners. This may provide some relief
from the relative isolation of AD.
Analysis: Moderate support exists for all aspects of this technology except cost reduction. About a
quarter of centers have moved ahead, and most of the rest would like to. It’s probably only a matter of
time, which could probably be accelerated if those who have adopted WS 2008 have good stories to tell
those who haven’t.
The Bottom Line: This is a small enough upgrade that it will probably happen for most centers within the
next year.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 29
2.20. Windows 7
Description: With Vista being replaced with Windows 7, there is a general interest in whether to move
to the new client operating system.
Analysis: While appreciation of Windows 7’s specific attributes is only moderate, two-thirds of all
managers already would like to adopt it. Whether this result is the result of Microsoft marketing,
experiences with the Windows 7 beta, or simply a placeholder for an assumed future process of testing
and evaluation, we can’t say.
The Bottom Line: We’ll try it out, but it’s too soon to say how widely centers will adopt it. Do I see it on
your laptop?
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 30
3. The Top Ten Technologies for 2010
All of the 20 technologies above merit consideration, as their analyses show. 20 technologies
comprise a long laundry list, however. For simplicity’s sake, let’s reduce the list once more, to 10.
The 10 technologies listed below have been chosen on the basis of what I think of them. Thus, the
purpose of this list is to start a discussion, not end it. For this reason, I’ve explained why I picked
each item, and also why I’ve ranked it among the top 10.
3.1. Storage Infrastructure
As data continues to grow, the need for storage will only increase. The payoff in cost savings and
reliability makes this an important effort. Many centers are already addressing this, and the rest
should do so, as well. We could do well to figure out some creative ways to share resources among
centers.
3.2. Virtualization
As with storage infrastructure, the key value is efficiency. Virtualization provides real improvements
in processing power, power conservation, and reliability and can contribute to business continuity
and backup. It is a huge, strategic technology that affects computing at a fundamental level. Most of
the centers have already acted on this insight, but more remains to be done.
3.3. Social Software and Social Networking
It’s easy to discount the importance of social software because the most publicized examples, such
as Facebook and Twitter, do not immediately present obvious improvements to organizational
collaboration. But when we realize that this category also includes everything from SharePoint and
Google Groups to Skype conferencing, RSS and mailing lists, the importance of the category
becomes clearer. Simply put, we need to use whatever technologies are appropriate to support
more collaboration both within the CGIAR and with our stakeholders.
3.4. Multipoint Video Conferencing Gateway Service
It would seem that video conferencing has reached a tipping point. For years, bandwidth limitations,
the lack of an IP-based infrastructure and issues such as jitter limited its effectiveness. Now that is
mostly past. With the difficulties resolved, we can respond to the basic appeal videoconferencing
has always offered. And those new displays look pretty good, too!
3.5. BlackBerry, iPhone, ActiveSync
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 31
The strongest argument supporting these technologies is their pervasive global availability, often
coupled with more reasonable pricing than before. We should even re-examine whether it is more
practical to employ cellular modems for our traveling laptops than relying only on Wi-Fi.
3.6. Periodic Security Scans
Virtually all of us agree that security scans are good, and their price is coming down. At the same
time, new threats, particularly to Websites, make this technology more necessary.
3.7. Training Programs
Increasingly, we find that implementing the hardware and software is easier than getting people to
use it effectively. This is particularly true for online collaboration and Web content creation, but it is
also true for the users’ part of database maintenance and how they get different applications to
work together in actual work routines. The need for training becomes crystal clear when a major
application upgrade happens, and it becomes crucial for change management. There is a lot more
going on here than simply teaching people Word and Excel.
3.8. Cloud Computing
If you think of cloud computing as a general approach where what is outsourced can be made much
more granular and the extent to what is put in the cloud and what is kept is much more flexible, its
potential stands out. The technology goes all the way from familiar old applications like hosted
email to grid computing and virtual storage in the cloud. More applications are rapidly appearing.
While we need to make precise decisions about what goes where and keep our feet on the ground,
in general, it’s time to put our heads in the cloud.
3.9. Business Continuity
All the centers continue to be increasingly dependent on information technology, and the cost of
guaranteeing its availability continues to decline. This being the case, business continuity technology
has a real future with the CGIAR. The only question is when the cost-benefit curves align.
3.10 Metadata Management
The term “metadata management” is somewhat off-putting, because “metadata” has become
associated with some older, cumbersome ways to organize content, such as labor-intensive tagging
schemes and arcane taxonomies. There is no doubt, however, that access to content is becoming
more of an issue, as the amount of content inexorably grows and the demand for its collaborative
use increases. Perhaps we should start the discussion with thoughts on the uses and limits of search
technology…
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 32
4. Summary
For the purpose of stimulating discussion, I have presented 35 technologies and business processes
that in the end resulted in 10 ranked choices.
These ratings are certainly not final; my sincere hope is that by presenting them, it begins a specific
discussion about how the CGIAR centers, individually and collectively, can adopt new technologies
and practices to support our critical mission with reasonable cost-effectiveness.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 33
5. Appendix
Multipoint video conferencing gateway service. Video has become more and more utilized as
bandwidth has increased and prices have come down. The simplest and easiest to use are point-to-
point. There is a need to see up meetings with multiple locations and some options (e.g., Vidyo)
make this easier than ever.
Windows 7. With Vista being replaced with Windows 7, there is a general interest in whether to
move to the new Microsoft offering and when.
Green IT. Shifting to more efficient products and approaches can allow for more equipment to fit
within an energy footprint, or to fit into a previously filled center. Regulations are multiplying and
have the potential to seriously constrain companies in building data centers, as the effect of power
grids, carbon emissions from increased use and other environmental impacts are under scrutiny.
Organizations should consider regulations and have alternative plans for data center and capacity
growth. In the near term the environmental benefits will likely take a back seat to the cost savings
from lower energy use
Unified Communications. During the next five years, the number of different communications
vendors with which a typical organization works with will be reduced by at least 50 percent. This
change is driven by increases in the capability of application servers and the general shift of
communications applications to common off-the-shelf server and operating systems. As this occurs,
formerly distinct markets, each with distinct vendors, converge, resulting in massive consolidation in
the communications industry. Organizations must build careful, detailed plans for when each
category of communications function is replaced or converged, coupling this step with the prior
completion of appropriate administrative team convergence. Unified communications can be used
to streamline existing business processes improving operational efficiencies in the near term and
supporting more aggressive transformational efforts longer term.
Business Process Management. BPM is more of a business discipline than a technology, but it is
necessary to make sure the technology of service-oriented architectures (SOA) deliver business
value.
Metadata Management. Metadata is the foundation for information infrastructure and is found
throughout your IT systems: in service registries and repositories, Web semantics, configuration
management databases (CMDB), business service registries and in application development.
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 34
Virtualization. Much of the current buzz is focused on server virtualization, but virtualization in
storage and client devices is also moving rapidly. Virtualization to eliminate duplicate copies of data
on the real storage devices while maintaining the illusion to the accessing systems that the files are
as originally stored (data deduplication) can significantly decrease the cost of storage devices and
media to hold information. Hosted virtual images deliver a near-identical result to blade-based PCs.
But, instead of the motherboard function being located in the data center as hardware, it is located
there as a virtual machine bubble. Various virtualization approaches have significant potential to
reduce IT costs.
Enterprise Mashups. Enterprises are now investigating taking mashups from cool Web hobby to
enterprise-class systems to augment their models for delivering and managing applications. Through
2010, the enterprise mashup product environment will experience significant flux and consolidation,
and application architects and IT leaders should investigate this growing space for the significant and
transformational potential it may offer their enterprises. In the near term mashups should be used
to create visualization dashboards and opportunistic end user applications that fill gaps in the
current application portfolio and provide support for existing business process needs.
Web-Oriented Architectures. The Internet is arguably the best example of an agile, interoperable
and scalable service-oriented environment in existence. This level of flexibility is achieved because
of key design principles inherent in the Internet/Web approach, as well as the emergence of Web-
centric technologies and standards that promote these principles. The use of Web-centric models to
build global-class solutions cannot address the full breadth of enterprise computing needs.
Computing Fabrics. Today’s blade server design places memory and processors into a fixed
combination inside a blade, and until recently neither memory or processors from one blade could
be combined with that of other blades.
Real World Web. Increasingly ubiquitous network access with reasonably useful bandwidth is
enabling the beginnings of what analysts are calling the “real world Web.” The goal is to augment
reality with universal access to information specific to locations, objects or people. An example is to
allow a vacationer to snap a picture of a monument or tourist attraction and immediately receive
information about the object, instead of flipping through a travel book.
Social Software and Social Networking. Social software includes a broad range of technologies, such
as social networking, social collaboration, social media and social validation. Enterprises should
establish a strategy to monitor and engage in external social networking as it relates to their
business because the greatest risk lies in failure to engage and thereby, being left mute in a dialogue
where your voice must be heard. Enterprises should consider adding a social dimension to
conventional Web sites to enhance the customer experience - an important consideration in a highly
competitive slow/no growth economy. Enterprises should also examine use of social software to
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 35
extend internal collaboration applications to support specific and targeted communication and
coordination needs.
BlackBerry, iPhone, ActiveSync. Reading mail while exiting a plane, in a taxi or waiting for food at
breakfast is de rigueur for busy staff, and yet still few senior staff in the CGIAR have such devices.
They now work in most countries. The BlackBerry Enterprise Service (BES) is straightforward to
install. MS ActiveSync works out of the box with Exchange servers and syncs contacts, emails,
calendar, etc.
Automated failover for critical network components. Critical switches and routers can be set for
automated failover, and relationships between external providers can be set for Border Gateway
Protocol (BGP) routing, so that in the event of an Internet failure, the alternate provider
automatically takes over.
Highly secure local networks with intrusion prevention. New security threats are constantly
emerging. Recently, Chinese hackers were able to penetrate the World Bank. New technologies
mitigate the chances of successful attacks, however. In particular, the newer Cisco ASA (Adaptive
Security Appliance) incorporates some intrusion prevention, and high-end products like Tipping
Point offer advanced capabilities. An interesting VMware-related product is Catbird.
Business Continuity. Given the universally increased dependence on email, a system can be set up
so that in the event of catastrophic hardware failure, or a software error, end users and
management would continue to be able to send and receive email. Similar systems are available for
other technologies, such as databases.
Exchange to 2007 or 2010. Many benefits accrue when upgrading from 2003: performance,
robustness, separation of roles, easier management. Few problems have been reported for those
who have upgraded.
Windows Server 2008. Many new features provide cleaner, simpler and more robust services. For
example: (1) the small footprint Server Core; (2) built-in Network Access Protection first
quarantines and cleans remote user machines before allowing them to log onto the network; (3)
Active Directory Federation Services makes it easier to build relationships between trusted
partners. This may provide some relief from the relative isolation of AD.
Local SharePoint Services. Some centers currently access hosted SharePoint services, others have
in-house services. Pros and cons?
New Enterprise Architecture. This would mean to basically redesign the global CGIAR
telecommunications system. Enterprise Architecture is the formal organization of the components,
structures and processes required or relevant to the attainment of the goals and visions invested or
envisioned in an enterprise. Enterprise Architecture is concerned with all aspects of an enterprise
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 36
with information technology as a sub-context. Enterprise architecture involves developing an
architecture framework to describe a series "as-is", "migration plan" and "to-be". Source
(http://en.wikipedia.org/wiki/Enterprise_architecture)
Alternatives to Active Directory. A particular AD design was made several years ago. These original
decisions need to be re-examined on a periodic basis. (For a list of AD alternative see
http://technet.microsoft.com/en-us/library/cc526438.aspx) In addition one might make AD part of
a distributed directory. This could be done in many ways and one option is to use a product such as
Isode’s M-Vault or an X.500-like product. (Source: http://www.isode.com/whitepapers/active-
directory.html)
Chargeback. Historically the IT departments at some centers have charged back to other
departments for their services. These centers tend to have better funded and more sustainable IT
infrastructures. Centers where the IT operation is defined as a cost center have a poorer ability to
maintain sufficient funding for their operations.
System-wide Software and Service Acquisition. Recent acquisition negotiations have brought
Microsoft products to CGIAR centers at an 89% discount. The CGIAR can identify other software,
e.g., VMware, and negotiate similar special deals.
Periodic Security Scans. One activity which has had significant payoff within the CGIAR is
vulnerability scans of individual centers. Many valuable findings have been given to centers. If
scheduled on a regular basis, a low-cost contract for security assurance may be possible. We are,
after all, experiencing a continued level of threat, including the recent spate of SQL-injection attacks
on CGIAR servers.
NAC - Network Access Control. The key value proposition of NAC solutions is the ability to prevent
end-stations that lack antivirus, patches, or host intrusion prevention software from accessing the
network and placing other computers at risk of cross-contamination by network worms. Network
Access Control is a computer networking concept and set of protocols used to define how to secure
the network nodes prior to the nodes accessing the network. (Source:
http://en.wikipedia.org/wiki/Network_Access_Control
Low cost desktops -- virtualization of desktop. Thin client desktops can reduce IT admin costs,
power costs, and perhaps desktop costs.
Training programs: These can be of several types: technical for specific software and hardware
systems; conceptual/operational for functions such as database design, data sharing and
organization; personal productivity enhancement, such as GTD (Getting Things Done), including how
to support such processes using existing software. The latter extends beyond IT to all parts of the
organization. IT group could recommend courses, and venues in different countries based on cost
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 37
and quality based on local experiences. Also, short-term staff seconding or exchange could be
considered where applicable.
Offline SharePoint. Use Groove to permit staff in hard-to-reach locations to synchronize certain
workspaces in SharePoint via Groove for offline use and update.
System-wide central IP PBX. Unified Communications mentioned by Gartner could be applied for
the CGIAR as a whole, integrated with the Exchange and IM already in operation.
Open Source for Servers and Desktops. Open source has been around for a long time and is similar
to similar to “open standards. ” Researchers with access to the ARPANET used a process called
Request for Comments to develop telecommunication network protocols. Characterized by
contemporary open source work, this 1960's collaborative process led to the birth of the Internet in
1969. The decision by some people in the free software movement to use the label “open source”
came out of a strategy session held in Palo Alto, California, in reaction to Netscape's January 1998
announcement of a source code release for Navigator. They used the opportunity before the release
of Navigator's source code to free themselves of the ideological and confrontational connotations of
the term free software.Today the term is used in many contexts and the bottom line, is that some
software may be available to the CGIAR at relatively low cost via this route.
(http://en.wikipedia.org/wiki/Open_source)
Storage Infrastructure. Until recently, Storage Area Networks (SANs) were generally very expensive
due in part to the need for connections via Fiber Channel. Now major vendors (Netapps, EMC, etc.)
offer connections via iSCSI, and NFS. Network attached storage (NAS) prices have also fallen
dramatically. The CGIAR is in a good position for a group purchase or obtaining group pricing -- and
certainly for information sharing. Also, the move to VMware cannot take place without good
coupling with a storage infrastructure.
High Performance Networking and Computing. The current era of supercomputing combines very
large numbers of heterogeneous computers on networks to create a virtual supercomputer. Many
academic institutions and private companies are therefore moving compute-intensive applications
from the LAN to the Web. Certain entities within the CGIAR require substantial computing
resources. Investments in this area have been made. With what results? Should the CGIAR keep up
on this trend and take advantage of this new option when possible?
Cloud Computing - Software as a Service (SaaS). Cloud computing is a style of computing that
characterizes a model in which providers deliver a variety of IT-enabled capabilities to consumers.
They key characteristics of cloud computing are 1) delivery of capabilities “as a service,” 2) delivery
of services in a highly scalable and elastic fashion, 3) using Internet technologies and techniques to
develop and deliver the services, and 4) designing for delivery to external customers. Although cost
is a potential benefit for small companies, the biggest benefits are the built-in elasticity and
Enrica Porcari – December 2009 Strategic Technologies in 2010 Page 38
scalability, which not only reduce barriers to entry, but also enable these companies to grow quickly.
As certain IT functions are industrializing and becoming less customized, there are more possibilities
for larger organizations to benefit from cloud computing. However, caution is advised since
significant privacy and security issues exist. Cloud computing is not appropriate for the full
spectrum of enterprise applications.
Business Intelligence. Business Intelligence (BI), the top technology priority in Gartner’s 2008 CIO
survey, can have a direct positive impact on a company’s business performance, dramatically
improving its ability to accomplish its mission by making smarter decisions at every level of the
business from corporate strategy to operational processes. BI is particularly strategic because it is
directed toward business managers and knowledge workers who make up the pool of thinkers and
decision makers that are tasked with running, growing and transforming the business. Tools that let
these users make faster, better and more-informed decisions are particularly valuable in a difficult
business environment.
Servers — Beyond Blades. Servers are evolving beyond the blade server stage that exists today. This
evolution will simplify the provisioning of capacity to meet growing needs. The organization tracks
the various resource types, for example, memory, separately and replenishes only the type that is in
short supply. This eliminates the need to pay for all three resource types to upgrade capacity. It also
simplifies the inventory of systems, eliminating the need to track and purchase various sizes and
configurations. The result will be higher utilization because of lessened “waste” of resources that
are in the wrong configuration or that come along with the needed processors and memory in a
fixed bundle. This trend should be factored into longer range strategic planning during 2009