Using Technology to enable and transform Business Strategy

IT Strategy

Subscribe to IT Strategy: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get IT Strategy: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations. 10 IoT Predictions for 2017 – IoT was my number 1 in The Top 10, Top 10 Predictions for 2016 and no doubt, IoT will continue to cause havoc. People focus so much on the ‘things’ themselves rather than the risk of an internet connection. This list discusses how IoT will grow up in 2017, how having a service component will be key, the com... (more)

Six Daily Tips for #DevOps | @DevOpsSummit #Docker #APM #Microservices

At its core DevOps is all about collaboration. The lines of communication must be opened and it takes some effort to ensure that they stay that way. It's easy to pay lip service to trends and talk about implementing new methodologies, but without action, real benefits cannot be realized. Success requires planning, advocates empowered to effect change, and, of course, the right tooling. To bring about a cultural shift it's important to share challenges. In simple terms, ensuring that everyone knows what everyone else is doing can create a real team spirit and social cohesion that will drive DevOps forward. Here are six tips that can be implemented to help you get there. 1. Stand-ups A daily team meeting where people get an opportunity to review their progress by addressing three simple questions: What did I do yesterday? What will I do today? What might block me fro... (more)

Vendor Partnerships | @CloudExpo #DevOps #BigData #DigitalTransformation

How Vendor Partnerships Can Maximize the Value from New Technology Modern IT departments have enormous budgets and there's a veritable feast of technology out there to choose from. IT spending worldwide will total $3.5 trillion this year, according to Gartner. The challenge lies in selecting the right technology to drive your business forward and successfully integrating it into your stack. The proliferation of new cloud services, with countless small niche players working to maximize cloud value, has led to a serious management challenge. Thankfully, IT departments do have a way out - they can look for vendor partnerships that do some of the integration legwork for them, or they can consider service orchestration and work with a systems integrator. Vendor partnerships offer a shortcut to value Many major enterprises have been putting their heads together and analyzing... (more)

Big Data and Politics: Influencing Both Sides of the Aisle

Data has always had a place in politics. Politicians have relied on polls, voter interests and demographics for years. In 2008, the Obama campaign was recognized for its data-driven campaign, but it wasn’t until the 2012 election, when the tools became available, that big data was used to target voters and win a presidential election using methods that had never been used before. Much like businesses, political parties have collected a lot of data over the years, but that data has been siloed into various categories: donations, website visits, social media comments. While each of these categories are useful, the ability to combine and analyze all of this data together creates new opportunities to target each individual voter, but until recently it was much too costly to do so. Now with the creation of Hadoop and Hadoop as a Service vendors, big data is being used b... (more)

B2B Integration | #BigData #B2B #IoT #M2M #DigitalTransformation

No modern enterprise stands alone; each is dependent upon a network of trading partners to remain competitive in today's global marketplace.  But in most cases, the lack of business to business (B2B) integration is holding back efforts to evolve into a true digital business. A high-performing supply chain is essentially a dynamic digital network, and every link in the supply chain is vital for business. But, remarkably, "over 50 percent of the information exchanged among business partners is still done so manually - not automatically - via email, phone calls and faxes."1 Many enterprises are stymied by silos of data, complex linear processes and disparate application landscapes. Moreover, each enterprise is reliant on its own unique set of applications, further exacerbating the struggle to exchange key information with partners. B2B integration maturity Advancing B2B... (more)

Integrate New Systems Gracefully with Request Management | @CloudExpo #API #Agile #Cloud

Integrate New Systems Gracefully with Request Management One of the many questions that companies face when introducing new enterprise systems either to provide new functionality or incorporate legacy systems from a merger or acquisition is "How do we identify and manage access rights?" Not only do new access approval processes need to be established, but a common platform to define and execute processes, reliably document approvals and provide users with an acceptable user experience is often not in place to handle the additional workload. Corporate IT is also faced with the challenge responding quickly to changes in access rules or approval chains. To ease the pain of integrating new systems into a unified corporate IT structure, required approval processes not only need to be established but executed through a common system. By adopting technology that can provide... (more)

I Am an Application Delivery Fundamentalist | @CloudExpo #APM #Agile #Cloud

Fun and a little mental. If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chase and I, passed our exams. I gotta tell you, it’s a relief since I didn’t want to title this article, ‘Two Out of Three Ain’t Bad.’ Good song but wanted to avoid that. We started this excursion back in April (me in March) with the team deciding to create a study group. Each week we’d tackle a topic with the guidance of Eric Mitchell’s excellent Study Guide. We worked through the sections and decided to test our luck with the Certification Team’s mobile testing center…with the pressure of passing during an F5 event. Imagine the slight pre-test anxiety going th... (more)

Book Review: iOS Components and Frameworks

When I first started flipping through this book the diverse set of topics threw me for a loop. Then I read the introduction where the authors say, "This publication aims to provide development information on the intermediate-to-advanced topics that are otherwise not worthy of standalone books. It’s not that the topics are uninteresting or lackluster, it’s that they are not large enough topics." This book covers a wide variety of topics, and it covers them in enough detail that you have a good understanding of them by the end of the chapter. Only Game Center and Core Data are covered in more than one chapter. The book is not a cover to cover read, but rather a pure reference. I have listed the chapters below to show you what is covered. 1. UIKit Dynamics 2. Core Location, MapKit, and Geofencing 3. Leaderboards 4. Achievements 5. Getting Started with Address Book 6. Worki... (more)

Continuous Discussions (#c9d9) Podcast: Episode 55

This morning we had our forth in a series of special episodes of our Continuous Discussions (#c9d9) podcast with Gene Kim and the DevOps Enterprise Summit (DOES16) speakers. Our speakers shared a bit about their upcoming talk at DOES and some learnings from their experience implementing DevOps in large enterprises. Each speaker also shared their favorite DevOps pattern that is most effective for ensuring your journey is successful. Watch the replay of the episode:     This episode features: Gene Kim DevOps enthusiast, The Phoenix Project co-author, Tripwire founder, Visible Ops co-author, IT Ops/Security Researcher, Theory of Constraints Jonah, rabid UX fan. @RealGeneKim | www.realgenekim.me Ashish Kuthiala Ashish Kuthiala is Sr. Director at Hewlett Packard Enterprise leading Strategy and Marketing for HPE’s DevOps portfolio offerings. @kuthiala | https://www.hpe.com... (more)

The Anonymous Neighbor Problem | @CloudExpo #IoT #DigitalTransformation

COMED, my power company, sends out a monthly report that shows me my energy consumption relative to my neighbors. Every month I’m considerably higher than all my neighbors. This report also has a list of things I could do to reduce my energy consumption. The problem with this report is that it doesn’t take into account my house size relative to the other houses in my neighborhood. My house is the largest model and accounts for about one-third the local sample size. If I were to attempt to reduce my energy consumption so that I would be in line with the monthly average of my neighbors, I would probably have to adopt a lifestyle akin to the Amish. Hence, I call this the Anonymous Neighbor Problem and, I believe, is responsible for driving decisions that are thrust upon IT leadership from executive business managers. Executive business managers receive reports from an... (more)

The Visible Data of the Invisible User By @PSilvas | @ThingsExpo #IoT

As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automobiles and surveillance cameras has grown into a an industry where shirts, shoes, sleeping bags and even liquor bottles want to gather your info. And most of these devices monitor silently without you even knowing. According to Ryan Matthew Pierson over at Readwrite.com, ‘The strength of IoT is in its ability to be invisible to the user.’ In addition, the mad dash to simply insert a chip, beacon and software into everyday objects is slowly graduating to era where user experience, privacy and security are becoming critically important for mass adoption. In 2014 Gartner released a report saying... (more)