Using Technology to enable and transform Business Strategy

IT Strategy

Subscribe to IT Strategy: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get IT Strategy: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

We get it. If your company isn't up on blockchain, your future is doomed. At least, that's the general vibe industry leaders are putting out - scrambling to understand and utilize a framework that is more frequently associated with cryptocurrencies like bitcoin. In other words, block chain is, generally, poorly understood. So, should your company stand back and let it mature, or wade into the fray and hope for the best? The answer, as it usually does, falls somewhere in the middle. Recently, a Gartner blog highlighted the mad dash of companies trying to capitalize on blockchain, and the main takeaway is that companies should pursue the technology, but be wary of diving into a "pointless" project: There are multiple causes for disappointing project outcomes, including rapid rate of technology evolution," said Ray Valdes, vice president and Gartner Fellow. "However, a... (more)

Have You Started Your Infrastructure as Code (IaC) Journey? | @CloudExpo #IaaS #Cloud #Analytics

A recent survey done across top Fortune 500 companies shows almost 70% of the CIOs have either heard about IaC from their infrastructure head or they are on their way to implementing IaC. Yet if you look under the hood, while some level of automation has been done, most of the infrastructure is still managed in a traditional / legacy way. What is Infrastructure as Code? How do you determine if your IT infrastructure is truly automated? "IaC is an approach and mind-set to automate infrastructure provisioning and management based on best practices from the world of software development. It underscores consistent, repeatable procedures for provisioning and changing systems configuration". The two key words here are ‘approach' and ‘mind-set'. While ‘approach' signifies that the deploying and managing infrastructure should not be any different from the deploying and man... (more)

Six Daily Tips for #DevOps | @DevOpsSummit #AI #CloudNative #Serverless

At its core DevOps is all about collaboration. The lines of communication must be opened and it takes some effort to ensure that they stay that way. It's easy to pay lip service to trends and talk about implementing new methodologies, but without action, real benefits cannot be realized. Success requires planning, advocates empowered to effect change, and, of course, the right tooling. To bring about a cultural shift it's important to share challenges. In simple terms, ensuring that everyone knows what everyone else is doing can create a real team spirit and social cohesion that will drive DevOps forward. Here are six tips that can be implemented to help you get there. 1. Stand-ups A daily team meeting where people get an opportunity to review their progress by addressing three simple questions: What did I do yesterday? What will I do today? What might block me fro... (more)

The i-Technology Right Stuff

Related Links: Wanted: 19 More of the Top Software People in the World Sung and Unsung i-Technology Heroes Who's Missing from SYS-CON's i-Technology Top Twenty?" Our search for the Twenty Top Software People in the World is nearing completion. In the SYS-CON tradition of empowering readers, we are leaving the final "cut" to you, so here are the top 40 nominations in alphabetical order. Our aim this time round is to whittle this 40 down to our final twenty, not (yet) to arrange those twenty in any order of preference. All you need to do to vote is to go to the Further Details page of any nominee you'd like to see end up in the top half of the poll when we close voting on Christmas Eve, December 24, and cast your vote or votes. To access the Further Details of each nominee just click on their name. Happy voting!   In alphabetical order the nominees are:   Tim Berner... (more)

Deputy CIO of the CIA to Keynote 1st Annual GovIT Expo

SYS-CON Events announces that Jill Tummler Singer, Deputy Chief Information Officer at the Central Intelligence Agency (CIA), will be delivering the opening keynote at the 1st Annual Government Conference & Expo (www.GovITExpo.com) on October 6th in Washington DC. Sponsor & Exhibit at 1st Annual Government IT Expo! Register Today and Save! Ms Singer was appointed in November 2006 and is responsible for ensuring CIA has the information, technology, and infrastructure necessary to effectively execute its missions. Prior to her appointment as Deputy CIO, Ms. Singer served as the Director of the Diplomatic Telecommunications Service (DTS), United States Department of State, and was responsible for global network services to US foreign missions. GovITExpo builds on the success of SYS-CON's Cloud Computing Expo, the fastest-growing conference anywhere in the world devoted to... (more)

Consider the Human Side of IT | @CloudExpo #AI #ML #DX #Cloud

Consider the Human Side of IT By Jennifer Streck Artificial intelligence, virtual reality, software-defined networking, Hyperconverged Infrastructure, the cloud. These are all technological advancements intended to improve how IT systems and operations work, to give the business better agility and reduced costs, and ultimately to give end-users a new and better experience. Quite often, however, IT’s creators and consumers alike lose sight of the impact that these technologies have on the human element of IT. The human element should be a key consideration in every technological development. Technology developers cannot afford to forget the human element of the product equation. For example, many organizations ideally want to focus on business innovation, as opposed to IT infrastructure management and troubleshooting — directly building their top-line rather than re... (more)

F5 Application Connector Overview

Today, let’s take a look at Application Connector. Application Connector connects public clouds to your application service infrastructure within cloud interconnects or data centers. This enables the use of public cloud resources as part of your compute infrastructure while also performing workload discovery and deploying consistent app services across your multi-cloud environments. The idea behind Application Connector is to have your applications in the cloud but have them considered local to BIG-IP so they don’t have any internet access. BIG-IP gets traffic from the nodes via secure web sockets connection. You can use Application Connector across multiple clouds and you can keep the same virtual server address that you use now. If you’ve been hesitant about moving your applications to the cloud due to worries about security, this is a way to move to the cloud w... (more)

In-Stream Processing | @CloudExpo @robinAKAroblimo #BigData #AI #BI #DX

Most of us have moved our web and e-commerce operations to the cloud, but we are still getting sales reports and other information we need to run our business long after the fact. We sell a hamburger on Tuesday, you might say, but don't know if we made money selling it until Friday. That's because we still rely on Batch processing, where we generate orders, reports, and other management-useful pieces of data when it's most convenient for the IT department to process them, rather than in real time. That was fine when horse-drawn wagons made our deliveries, but it is far too slow for today's world, where stock prices and other bits of information circle the world (literally) at the speed of light. It's time to move to In-Stream Processing. You can't - and shouldn't - keep putting it off. [Figure 1, courtesy of the Grid Dynamics Blog] This diagram may look complicate... (more)

The Top 10, Top 10 Predictions for 2018 | @ThingsExpo #DX #AI #ML #IoT

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Copying off since 2012, rather than thinking up my own, I figured I’d regurgitate what many others expect to happen. Top 10 Cyber Security Predictions for 2018 – Infosec Institute kicks off this year’s Top 10, Top 10 list with a look back at their 2017 predictions (AI, IoT, etc.) and dives head first into 2018 noting that Ransomware will be the most dangerous threat to organizations worldwide; cryptocurrency will attract fraudsters looking to mine; cloud security will (again) be a top priority; cyber insurance will explode and cyber-bullying, especially for teenagers, is at the emergency stage. Cyber security predictions for 2018 – Information Age taps Mike McKee, CEO of insider threat management company ObserveIT, to offer his insight. Lack of ... (more)

The Top 250 Players in the Cloud Computing Ecosystem

In the run-up to the next Cloud Expo, 7th Cloud Expo (November 1–4, 2010) being held at the Santa Clara Convention Center in Silicon Valley, it's time to give my earlier list a complete overhaul. Here, accordingly, is an expanded list of the most active players in the Cloud Ecosystem. I have increased it from the 'mere' 150 I identified back in January of this year, to 250, testimony – as if any were needed! – to the fierce and continuing growth of the "Elastic IT" paradigm throughout the world of enterprise computing. Editorial note: The words in quotation marks used to describe the various services and solutions in this round-up are in every case taken from the Web sites of the companies themselves. Omissions to this Top 250 list should be sent to me via Twitter (twitter.com/jg21) and I will endeavor to include them in any future revision of this newly expanded rou... (more)

Predictive Analytics Product Strategy Echoed by Monitoring Expert

As Netuitive's director of product management, I was fortunate to attend the O'Reilly Velocity Conference this year in San Francisco where one presentation in particular  stood out. The presentation, "Monitoring & Observability - Getting Off the Starting Blocks" was by technology visionary Theo Schlossnagle.  It examined several interesting concepts on high metric volume performance monitoring, visualization, anomaly detection, and alerting.  In his summary (see slides 69 to 73) he mentions several interesting monitoring tenets (my editorial comments in parentheses): While monitoring all things seems like a good approach, alerting on things that do not have specific remediation requirements is horribly damaging (i.e. don't cry "wolf"). Use the same datasets for alerting and visualization (i.e., your visiualization has to enhance your understanding of your alarms, ... (more)