May 11, 2014

Are CIOs Losing Control Over IT?
We call this phenomenon IT without boundaries, and it’s creating a real tension in organizations between IT and business leaders. We recently surveyed 1,000+ C-level executives, business unit and IT leaders globally to explore changing perceptions on IT spending. Our IT Without Boundaries research shows how significant this tension is. Thirty-seven percent of technology spending is now happening outside of the CIO organization. And 79 percent of C-level executives believe they can make better and faster decisions without the involvement of IT.


Wearable Technology: The Coming Revolution in Healthcare
To successfully employ wearable health technologies, the industry must find a way to develop networks that allow information access and provide support on the back end. This is already being done on a small scale: think about users of Fitbit ® and similar health and wellness tracking gear who view their personal data and compare it against data from other users. Having a network or backbone that a much broader population base can seamlessly connect to will fuel more meaningful data comparisons and analysis and distill useful information.


Top five external hard drives: Backup is like insurance
Backup to digital storage is like insurance to driving, you need it even though you hope that you'll never have to resort to it. Unfortunately, backing up is not required by law and I've seen a lot of accidents when folks lose their precious data. You can buy a new car but you just can't buy back your lost memories, no matter how much money you have. In short, I just can't stress enough how important backing up is. The good news is it's very easy, and cheap, to have a backup drive for your computer. Following is the top five external hard drive that I've reviewed recently that will make excellent home backup solutions.


Internet of Things will stump IT until cloud, big data come aboard, EMC says
"If I designed something to be perfect for the federation, where everybody contributes, it would be the Internet of Things," Tucci said. IoT calls for enterprises to collect far more data from many more devices and keep it all in EMC storage, such as the Elastic Cloud Storage Appliance the company announced on Monday. Pivotal's big-data platforms can quickly ingest and analyze that data for the enterprise to act on. In the middle of that can be data-center and cloud infrastructure based on VMware's virtual computing and networking technology, Tucci said.


This Shirt Is (Really) Sensitive
OMsignal’s shirts are compression garments—already popular among some athletes and patients recovering from certain surgeries to help improve circulation—which Marceau says is helpful because it keeps the electrodes that are embedded in the fabric close to the skin. While the shirts are primarily aimed at athletes, the Montreal-based company envisions them being used for monitoring medical conditions and, potentially, in everyday life. For instance, your shirt might eventually be able to automatically adjust your Internet-connected thermostat based on your vital signs.


Integrated PaaS/IaaS Technology Complements Your Enterprise Cloud Strategy
While IaaS is growing quickly, for an enterprise looking to provide its architects and developers with control of their development environment and the ability to build and deploy applications rapidly, Platform-as-a-Service goes a step further. PaaS provides self-management for DevOps and developers, providing the ability to build scalable, load balanced and highly available application environments without worrying about app server configuration, load balancers or tools. PaaS, however, has not grown as quickly as IaaS even though some might argue that PaaS is a key technology for enterprises looking to become more agile and utilize the cloud.


The Emerging Cybersecurity Software Architecture
While the concept of software architecture is somewhat new in the cybersecurity world, we’ve seen this movie before within the broader IT spectrum. In the 1990s departmental applications were supplanted by ERP systems. This introduced an architecture for data exchange, transactional systems, and business intelligence that had a profound impact on business processes. The infosec software architecture train has already left the station. Large enterprises will replace individual piece parts over the next few years and phase in an enterprise security architecture in the process.


Don’t Create A Data Governance Hairball
While the integration hairball and application sprawl have been with us for years, there is a new and growing threat, the data governance hairball. IT staffers, and data management professionals in particular, have long been pushing for data governance programs, but all of a sudden top-level business executives are very interested. Maybe because of regulatory pressures, or maybe because of data security or privacy concerns, or maybe because of clear opportunities to grow revenue by leveraging and consolidating data assets. Regardless of the reason, there is a growing wave of demand for data governance.


Ten Key Take-Aways From the White House Big Data Report
On Thursday, the White House Big Data Working Group, led by senior presidential advisor John Podesta, released a 79-page report that outlines a number of key observations and recommendations for privacy in both the private sector and government. Although the report does not create binding law, it provides insight into the administration’s priorities on a wide range of privacy and data security issues, from government surveillance to data breaches. Below are some of the most important themes to emerge from this report.


SOA vs. APIs to deliver IT services: Is there a difference, and does it matter?
While fundamentally and technically similar, the open nature of APIs is intriguing, precisely since IT relinquishes some control over how its services are used. It would be foolhardy to suggest every company release open APIs to all comers, but creating a suite of basic APIs internal to your company frees developers and savvy business users to concoct new and interesting applications using IT assets you already own. In some ways, this is an evolved and formalized version of what end users have been doing for years, dumping data from enterprise applications into spreadsheet "applications" that perform some niche function.


Three Metrics of Disruptive Innovation
Disruptive innovation, on the other hand, is much more difficult for the corporate machinery. Here, new product categories are created, new markets are addressed and new value chains are established. There is no known baseline to refer to. Disruption implies that someone is losing -- being disrupted. So clearly you won’t find a product roadmap for it in the company catalog. And it’s not even necessarily solving the problems of the current customer base. This is an area where, with the right passion, permissions and charter, a specialized innovation team can take a lead role and create significant growth for the company.



Quote for the day:

"How things look on the outside of us depends on how things are on the inside of us." -- Parks Cousins