August 31, 2023
AWS, It's Not Just a Pillow
February 7, 2016
Cloud Pleasing
You want cloud?
You got cloud!
Cloud Computing with the virtually infinite promise for flexible, cost-effective, on-demand computing--all centrally managed by the vendor--you can sleep easy at night, oh baby.
CIOs love it.
The only problem as everyone moves to the cloud is the promise of the cloud continues to fall short.
Now how unpopular a thing to say is that?
Take out the guillotine...
Seriously though, it was supposed to be flexible, but it isn't so much as vendors contract with customers for multi-year deals and customers find switching vendors not quite so easy...anyone hear of vendor lock-in?
Also, cloud was supposed to be more cost-effective, but vendors still need to make their margins, so longer commitments, service bundling, minimum fixed costs, and variable month-to-month pricing--sure helps things add BIG DOLLARS for the cloud vendor.
Then you have vendors that simply call everything cloud...ah, "cloud washing" that is. If you think you are getting cloud (even if it ain't so much so), yippee are you happy...you have drunk the cool-aid and it is sweet.
Technology leaders swooping into a new job want to come in with a bang..."Hey, look what I did to modernize, transform, reinvent, revolutionize...and save money too--thank G-d, they hired me."
So cloud, cloud, cloud...it sounds so CLOUD PLEASING, I mean crowd-pleasing.
Whether in the specific situation it's better or not, that's not the point, stupid.
At least, it's out of our hair--let the vendor worry about it!
One, two, three...everyone say "CLOUD!" ;-)
(Source Graphic: Andy Blumenthal)
Cloud Pleasing
March 31, 2012
Which Big Brother
The intent was develop and use technology to capture data (lots of it), decipher it, link it, mine it, and present and use it effectively to protect us from terrorists and other national security threats.
Due to concerns about privacy--i.e. people's fear of "Big Brother"--the program was officially moth-balled, but the projects went forward under other names.
This month Wired (April 2012) reports that the National Security Agency (NSA) has almost achieved the TIA dream--"a massive surveillance center" capable of analyzing yottabytes (10 to the 24th bytes) of data that is being completed in the Utah desert.
According to the article, the new $2 billion Utah Data (Spy) Center is being built by 10,000 construction workers and is expected to be operational in a little over a year (September 2013), and will capture phone calls, emails, and web posts and process them by a "supercomputer of almost unimaginable speed to look for patterns and unscramble codes."
While DOD is most interested in "deepnet"--"data beyond the reach of the public" such as password protected data, governmental communications, and other "high value" information, the article goes on to describe "electronic monitoring rooms in major US telecom facilities" to collect information at the switch level, monitor phone calls, and conduct deep packet inspection of Internet traffic using systems (like Narus).
Despite accusations of massive domestic surveillance at this center, Fox News (28 March 2012) this week reported that those allegations have been dismissed by NSA. The NSA Director himself, General Keith Alexander provided such assurances at congressional hearings the prior week that the center was not for domestic surveillance purposes, but rather "to protect the nation's cyber security," a topic that he is deeply passionate about.
Certainly new technologies (especially potentially invasive ones) can be scary from the perspective of civil liberties and privacy concerns.
However, with the terrorists agenda very clear, there is no alternative, but to use all legitimate innovation and technology to our advantage when it comes to national security--to understand our enemies, their networks, their methods, their plans, to stop them, and take them down before they do us harm.
While, it is true that the same technologies that can be used against our enemies, can also be turned against us, we must through protective laws and ample layers of oversight ensure that this doesn't happen.
Adequate checks and balances in government are essential to ensure that "bad apples" don't take root and potentially abuse the system, even if that is the exception and not the rule.
There is a difference between the big brother who is there to defend his siblings from the schoolyard bully or pulls his wounded brother in arms off the battlefield, and the one who takes advantage of them.
Not every big brother is the Big Brother from George Orwell's "1984" totalitarian state, but if someone is abusing the system, we need to hold them accountable.
Protecting national security and civil liberties is a dual responsibility that we cannot wish away, but which we must deal with with common sense and vigilance.
(Source Photo: here)
Which Big Brother
November 27, 2011
Running IT as an Ecosystem
Running IT as an Ecosystem
December 10, 2010
Federal IT Management Reform
Federal IT Management Reform
February 2, 2008
IT Consolidation adds Up To Cost Savings and Enterprise Architecture
For CIOs, one of the secrets of the trade for building cost efficiency is consolidation of IT assets, such as data centers and help desks. Of course, to accomplish this you need to executive commitment and user buy-in.
The Wall Street Journal, 29 January 2008, reports that “H-P Hits Snag in Quest for Savings through System Consolidation.”
“Since July 2005 [the Compaq merger]…the firm [HP] has been in a project to cut the number of computer program is uses by more than half [from 6000 to 1600], and reduce the number of its data centers…to six from 85.”
Have the benefits of consolidation been documented?
In a survey of 1500 CIOs by Gartner last year, “reducing costs through IT consolidation and other means is one of their top ten priorities.”
Further, according to Forrester Research, “the benefits can be significant” In a survey, last fall, of eight companies that consolidated IT, “nearly all ‘lowered …overall operational costs by at least 20%.’”
What are some of the critical success factors?
- User buy-in—“vice president often aren’t used to taking order from the chief information officer on what computer programs they can use. ‘It’s about politics.’” The way to get around this and develop buy-in is to set the targets with the CEO and CFO, but let the users decide which systems to keep and which to fold into the consolidation.
- Executive commitment— “The solution is to get management support from the top. ‘Getting the CEO lined up is hard, and that’s the key person.’” At HP the CEO “threatened some with termination” that didn’t follow along with his commitment to consolidate.
From a User-centric EA perspective, IT standardization, consolidation, and cost efficiency are important goals. Of course, this needs to be done in the context of developing a sound, secure, reliable, state-of-the-art IT infrastructure. Achieving cost effectiveness must involve building enterprise solutions, merging disparate data centers and help desks, consolidated purchasing, and otherwise standardizing products and streamlining operations. Of course, user buy-is a prerequisite when using a User-centric EA approach.
IT Consolidation adds Up To Cost Savings and Enterprise Architecture