26
Dec 13

ZDNet – CIO / CMO impact: Three disruptions that demand your attention

Summary: Venture capitalist, Fred Wilson, presents important business model innovations in enterprise technology. Corporate leadership should listen and learn.

Venture capital investor, Fred Wilson, is a keen and deep-thinking observer of enterprise software trends. During a talk at the LeWeb conference, in Paris, Wilson presented his framework for evaluating startup investments.

His ideas offer an interesting view for CIOs and CMOs who want to drive beneficial organizational change by innovating with technology.

Hierarchies vs. networks. Wilson presents the idea that “technology-driven networks of individuals” can replace bureaucratic hierarchies in some situations. Management in traditional organizations use a pyramid style, command and control communication structure to execute directives and receive feedback. However, when communication and transaction costs are sufficiently low, technology can enable information to flow without hierarchical intermediaries, creating a more rapid and efficient exchange of information than would otherwise be possible. This shift, from command-oriented to peer-oriented information flows, is having a profound impact in certain industries.

For example, Twitter has replaced the newspaper as source of news for many people. Instead of editors specifying stories and dispatching armies of reporters and photographers into the field, Twitter users gather and share news spontaneously, creating a broader network of sources than would be possible for any newspaper. In a refinement of this concept, Timeline Labs, founded by entrepreneur Malcolm CasSelle, analyzes social media data to surface real-time stories for television news; Timeline relies on peer sharing and data analytics to disrupt the traditional news room. Other examples can be found in industries as diverse as hotels (Airbnb) and music distribution (SoundCloud).

By replacing centralized hierarchies with distributed networks of individuals, technology can lower costs and dramatically increase operational efficiencies, compared to what is possible with top-down information flows.

More of the ZDNet article by Michael Krigsman


24
Dec 13

Continuity Central – Managing complexity in your business continuity planning

Ray Abide looks at the concepts of detail complexity and dynamic complexity in the context of business continuity planning.

Over an extended period of time, I believe that a conventional instinct is to add more specifics and detail to our business continuity plans. This may be guided by increasing complexity in the subject business or by our improved understanding and planning maturity brought about by plan exercises or experience gained by plan activation during a crisis.

While this increasing detail and texture in the plan may seem to be an improvement or an enhancement, it is only true if the incremental planning addresses the type of complexity that can be reduced or eliminated, in advance.

In Peter Senge’s 1990 book, The Fifth Discipline, an excellent text on the topic of organizational learning, Senge distinguishes between two types of complexity (pages 70-71): detail complexity and dynamic complexity. He defines detail complexity as the sort of complexity with many variables, which is what we typically think of when we think of complex issues. The second type, dynamic complexity, refers to situations where cause and effect are subtle, and where the effects over time of interventions are not obvious. Traditional planning methods are not effective in dealing with dynamic complexity as dynamic complexity is much more qualitative in nature than is detail complexity. The variables and their interrelationships do not readily lend themselves to a solution provided by a comprehensive task list or documented instruction set.

Before I read Senge’s book, I referred to the business continuity method of addressing dynamic complexity by developing a plan that was more of a roadmap than a recipe. The idea is that the roadmap would guide a recovery team allowing their expertise and experience to navigate ambiguity whereas a recipe infers that this is unnecessary if the team strictly adheres to an all-inclusive recovery plan or recipe.

More of the Continuity Central article by Ray Abide


23
Dec 13

Continuity Central – Key information protection and governance trends

Espion predicts some key information protection, governance and ediscovery trends which will affect organizations over the coming 12 months:

1. Social discovery – a new frontier for the legal profession
The acceleration in the number of cases involving evidence from social media and the Internet (such as Facebook, Twitter, webmail, website data and YouTube videos), will put greater emphasis on the importance of employing best practices to collect, preserve and produce such online datasets.

Internet investigations and in particular social media, represent a new frontier for the legal fraternity. The scope for finding digital evidence such as photographs, status updates, a person’s location at a certain time, as well as content from social media accounts, will be an enormous burden on organizations.

2. Data breaches: anger will turn to action
High profile data breaches continued to make headlines throughout 2013. With each breach came greater awareness and understanding of often complex issues with the management of data becoming not just an IT issue but a business one.

Espion predicts that consumers will be increasingly savvy around personal data privacy issues and will lose patience with organizations that fail to act responsibly. 2014 will see those affected by breaches take even greater action – sharing their experience on social media and increasingly reporting to relevant bodies such as the Information Commissioners Office (UK) or the Data Commissioner (IRE).

More of the Continuity Central article


18
Dec 13

CIO Journal – Client Data Trial Illustrates Ambiguity in Cloud

A Manhattan judge said that an accounting firm misappropriated a wealth manager’s cloud-based client list, in a case that illustrates the ambiguity that can surround how companies control third party storage.

Manhattan Federal Judge Robert Sweet said Weiser Capital Management LLC improperly took data from its former employee Debra Schatzki when it cut off her access to a database that contained her client business, after she was fired in 2010. But the judge stopped short of issuing a summary judgment in the case, which was first reported by the New York Daily News. The case goes to trial next month. An attorney for Weiser declined to comment on the case. “We don’t want to litigate through the media,” he said.

While centuries old law on information ownership still applies to new technologies, the cloud can sometimes muddy the distinctions of who has control the data, say legal observers.

More of the WSJ blog post by Joel Schectman


13
Dec 13

CIO Insight – The CIO’s Secret Weapon: Stakeholder Pressure

The roles of the CIO, and Chief Information Security Officer (CISO), have changed considerably over the past decade. Chief amongst these changes are that the security-based demands from company stakeholders have increased substantially as a result of major technological and cyber advancements.

Cyberspace is constantly evolving; its potential and real threats, vulnerabilities, complexity, and interconnectivity are always changing. The threat is asymmetric as activists, cybercriminals and nation-states disproportionately increase traditional information risks. In many organizations, cyber-security opportunities and risks have become a board-level issue, so the CIO, like the CISO, must engage at the boardroom level, where information strategy and risk should sit comfortably with other types of strategy and risk that the board oversees.

Information Security Under Pressure
Highly publicized breaches, and more stringent regulations, have put the spotlight on information security in most organizations around the world.

In a recent report, “Estimating the Cost of Cybercrime and Cyber Espionage,” conducted by the Center for Strategic and International Studies (CSIS) and sponsored by McAfee, it is estimated that cybercrime and cyber-spying are costing the U.S. economy $100 billion each year and the global economy perhaps $300 billion annually. Malicious cybercrimes are estimated to cost as many as 508,000 jobs in the U.S. alone. This has put unprecedented pressure on C-level executives to assure stakeholders that sensitive information is secure. And as information security moves up senior management and the board’s agenda, pressure will continue to mount. Like CISOs, CIOs must be able to shape the message and relay their successes to the board to sustain high-level support for security initiatives. A recent CEO survey, conducted by PwC in its Annual Global CEO Survey 2013, cited cyber-security as having the third highest possible impact on organizations—even ahead of a natural disaster disrupting a major trading and manufacturing hub or military tensions affecting access to natural resources.

More of the CIO Insight article


12
Dec 13

ZDNet – 8 habits of high-performing IT teams

Summary: Accenture says higher-performing IT teams are more open to new projects, cloud and virtualization.

What separates the high performers in IT from the average blokes? They are more open to new ideas and approaches, as well as working closer with customers.

Those are two conclusions coming out of Accenture’s latest research report on the habits and tendencies of high-performing IT teams. The consultancy says it interviewed IT executives in more than 200 global companies across a range of industries.

Here are some of the key areas that Accenture identified as separating “high performers” against average IT teams:

1. High performers invest more in new initiatives, versus maintenance projects. Accenture finds high performers allocate seven percent more of their IT budget to new projects than do other organizations. Although their day-to-day IT operating expenses are expected to stay flat this year, 54% of high performers will spend significantly more on new projects.

2. High performers are further along in their transition to private and public clouds. Regarding current and future initiatives for cloud computing, more advanced IT teams report greater proportions of their infrastructure, application development, and applications will be transitioning to cloud. High performers are transitioning 43% of their infrastructure to cloud, versus 20% of average IT teams. High performers also are moving 27% of application development to cloud, versus 14% of average IT departments.

More of the ZDNet article by Joe McKendrick


04
Dec 13

ZDNet – 8 habits of high-performing IT teams

What separates the high performers in IT from the average blokes? They are more open to new ideas and approaches, as well as working closer with customers.

Those are two conclusions coming out of Accenture’s latest research report on the habits and tendencies of high-performing IT teams. The consultancy says it interviewed IT executives in more than 200 global companies across a range of industries.

Here are some of the key areas that Accenture identified as separating “high performers” against average IT teams:

1. High performers invest more in new initiatives, versus maintenance projects. Accenture finds high performers allocate seven percent more of their IT budget to new projects than do other organizations. Although their day-to-day IT operating expenses are expected to stay flat this year, 54% of high performers will spend significantly more on new projects.

2. High performers are further along in their transition to private and public clouds. Regarding current and future initiatives for cloud computing, more advanced IT teams report greater proportions of their infrastructure, application development, and applications will be transitioning to cloud. High performers are transitioning 43% of their infrastructure to cloud, versus 20% of average IT teams. High performers also are moving 27% of application development to cloud, versus 14% of average IT departments.

More of the ZDNet article by Joe McKendrick


02
Dec 13

CIOInsight Slideshow – Data Governance Efforts Continue to Lag

While there’s always been a lot of concern about how data is governed, a new survey suggests a significant gap exists between the level of concern and organizations’ actual plans to implement data governance as part of a larger compliance strategy. A new survey of 454 IT executives conducted by Rand Secure Archive finds that while organizations are facing more compliance regulations, their investments in backup, archiving and e-Discovery technologies continues to lag behind. One reason for this, of course, is the popularity of applications, which are also competing for a slice of the IT budget.

More of the CIO Insight article and slideshow


14
Nov 13

Data Center Knowledge – Five Steps to Preparing Your Data Center for VDI

Virtualization, at least at the server level, has been in use for some time. Since, the concept has expanded to user, application, network, security, storage, and, of course, desktop virtualization (VDI). This new approach took the market by storm, and many thought it was the direct answer to many of their enterprise’s desktop problems. Initially, there were some challenges – serious challenges. Data centers never really understood the requirements that initial VDI technologies really required. So, during the onset of the VDI push, there were some very flawed VDI deployments.

Now, the maturity is certainly here. Many companies understand the direct fit for VDI. Labs, kiosks, call centers, educational institutions and healthcare are all finding powerful users for VDI. Of course, as with any technological deployment – each organization is unique and will have its own set of business requirements. The requirements can depend on the type of organization, vertical, how the user interacts with his or her desktop, and much more. Still there are five key steps that should always be followed when creating a truly powerful VDI solution.

More of the Data Center Knowledge article


13
Nov 13

CIOInsight: 10 Ways to Build Allies, Not Adversaries

A very basic but essential rule of management breaks down as so: Allies are assets. Adversaries are liabilities. That said, ensuring you have the former and not the latter is easier said than done. Yes, you need to demonstrate a great degree of technical knowledge and overall professional capabilities. But there are also a number of “soft skills” that can turn the tide in your favor too. The recent book, Adversaries into Allies: Win People Over Without Manipulation or Coercion (Portfolio), demonstrates how to pursue this while falling short of, say, physical threats or blackmail. (Such techniques never work in the movies, anyway …) Author Bob Burg takes a far higher-minded approach, one that will pay longer-lasting dividends. Through the following best practices, CIOs can establish advocates who should remain loyal to their vision indefinitely, establishing mutually beneficial partnerships which can extend throughout an entire career. – See more at: http://www.cioinsight.com/it-management/leadership/slideshows/10-ways-to-build-allies-not-adversaries.html/#sthash.HxQ5Ok6E.dpuf.

More of the CIO Insight article and slideshow