That’s how many enterprise applications are residing on Domino and Notes servers and desktops around the world. The problem is, many of those Domino applications were written more than a dozen years ago and haven’t been updated since. Why? Well, they still work, for starters.
But IBM has — ignored may be too strong a word — overlooked the modern world creeping in on Domino applications for many years. And as the number of Domino applications mounted, customers put off the daunting task of moving them to new platforms. Now, IBM and users can no longer avoid the need to access those apps outside the Notes client, like the browser and mobile devices.
Enter IBM software developer partner GBS, which last week unveiled Transformer, a new framework for “transforming” Domino apps to new XPages-based applications, which can be run virtually anywhere.
What is encouraging for Domino and Notes users is the commitment behind the transformation effort. GBS Chief Technology Officer Jennifer Meade pointed this out at the launch event last week at the MIT Museum.
“IBM has been incredibly supportive of our activities,” she said. “We needed some stuff delivered from IBM in order to make this happen, and they made it happen tout de suite. They actually open-sourced some stuff so we didn’t have to wait for releases to come out. We open-sourced projects together.”
This isn’t just good news for Domino users, it’s great news. And about time.]]>
Usually, best meant biggest or most complex, as more features were added. Thankfully, Windows 7 took a step back along those lines and in doing so, Microsoft took a step forward.
Now we can look forward to the Windows 8 operating system, according to CEO Steve Ballmer, CNET reports. But really, do we need another version of Windows? Windows 7 should be the foundation on which modular upgrades can advance the platform for a long time to come. A whole new version seems like overkill at this point.
Windows 7, which is just starting to be deployed in earnest in enterprises now that the first service pack has been shipped, should be considered the “last” PC operating system. With mobile phones and tablets fast becoming the preferred computing interface, why should Microsoft, developers, PC and component makers — and, most of all, users — waste the time and money embracing another generation?
Ballmer went on to say that Windows 8 will run on “slates, tablets, PCs, a variety of different form factors.” OK, but this will not be as easy as it sounds. Unlike the desktop market, Microsoft does not own the mobile operating system market: Apple and Google do. And they will continue to do so because they have the one thing that Microsoft always had in their pocket for Windows: developers, developers, developers, developers.
Did I mention that Ballmer said Windows 8 will debut in 2012? Gulp.]]>
Wrong. As the consumers logged on and purchased en masse, Amazon’s servers were slammed, causing download delays and eventual download failures. Amazon issued apologies over its Twitter feed but as of bedtime last night, my MP3 files still hadn’t started downloading. This morning, I woke to only half the transfer completed and had to open a customer service help ticket to have the other half pushed again. The album itself received dozens of poor reviews on its Amazon page, primarily based on the technical failures in delivering the files rather than the artistic merit of the music (Amazon has since redacted those reviews, rightfully so). Similarly, users who were banking on Amazon cloud storage are reporting that the link-up doesn’t even work and are warning other users not to even try it.
Obviously, lesson No. 1 here is, “Don’t bite off more than you can chew.” Did Amazon triple check to make sure that its infrastructure could withstand the worst-case scenario in traffic spikes — and then some? Every one of us could be (and has been) caught off guard, but with the embarrassing Amazon Web Services outage not even a month ago, Amazon is killing the credibility in its technical services with this very public fiasco. What could have been a public relations coup for Amazon ended up being a public relations nightmare. Some analysts are predicting that consumers will move elsewhere for their music, reducing Amazon’s already tiny percentage of digital music purchases.
Of course, if someone would have told me 10 years ago that we’d trust a bookstore to run our servers, I would have laughed and laughed, but Amazon was able to get past that mental leap and become a viable name in cloud services. Hopefully, they’ll be able to come out swinging in the next few months and figure out how to really shine as I don’t think consumer confidence in Amazon’s cloud storage techfu will stand another one of these truly embarrassing blunders.]]>
It’s not the only overused term on the IT landscape. I am absolutely certain that vendors can come up with something more colorful to describe the special something inside your new gadget than secret sauce. First of all, everyone knows what’s in the secret sauce at most restaurants, right? It’s a mixture of mayonnaise, ketchup and pickle relish: three of the most banal food condiments in existence. Do you really want your super-cool, exciting new technology compared with something that drips on your shirt and leaves a stain that the dry cleaner can’t get out? Put a fork in it, it’s done! I’m calling it: Secret sauce is officially an endangered IT phrase. Similarly, how can there still be all that low-hanging fruit on the proverbial tree?
Let’s agree to put the term cloud on the endangered clichés list too, along with next generation, bleeding edge and paradigm shift. If I have to be convinced that something is a win-win scenario, is it really? How many more times can we hit the ground running? It’s time to smash that single pane of glass. Build a bridge over the value stream and throw away the key for the turnkey solutions. Silence the bells and whistles. How can we still be closing the loop after so many years?
What phrases are you sick of hearing and reading? Are you looking for the one throat to choke? What should be banned from the product releases, marketing spiels and our own SearchCIO-Midmarket.com headlines?
The comments are waiting for your perfect storm of pet peeves.]]>
At the time, many people thought virtual conferences would replace the in-person conference. Virtual has done well — SearchCompliance.com will offer three virtual seminars this year — but it has not taken over. And, we’ll always have Vegas.
Tech shows are definitely slowing down. The resident giant, CES, saw two years of dwindling attendance before going back up this year. But traveling these days, you’d never know that there is still high unemployment and pockets of a sluggish economy all around the country. And there are still plenty of technology conferences out there for IT professionals to find out more about the latest products and get training and certifications.
So check out the new list of technology conferences on SearchCIO-Midmarket.com. Site Editor Wendy Schuchart will provide updates as new ones get scheduled. We hope you find it useful.]]>
It’s been 16 years since the Multipurpose Internet Mail Extensions — or MIME — standard gave us the ability to attach documents within an email. It seemed like such a little life convenience back then — no more long lines at the fax machine!
But what we didn’t know then is that the email attachment changed everything. Email systems were never designed to handle binary attachments, and now a single file could be replicated internally hundreds of times just by the simple inclusion of another person on a copy of an email, forcing IT to invest in deduplication technology.
Every one of us knows the pain of a 10K limit on our inbox when we’re getting files that are half that size in a single email blast. We also had to start worrying about malware making its way on emails posing as “investment opportunities,” or even humorous videos from your maiden aunt, not to mention the concern about industrial espionage or proprietary information leaving your company without anyone ever realizing it. And of course, there’s the obvious annoyance of document version control that usually ends up with someone handing a mess of a document to an intern, along with 16 different versions of changes and hoping that the intern can make sense of the madness, which I only wish wasn’t a true experience that I’ve had or witnessed more times than I can count.
When it comes to your network’s health, the innocent little email attachments are death by a thousand cuts.
This month we’re looking at content management and project and portfolio management tools, and one thing that strikes me is that many midmarket companies consider collaboration tools “nice to have.” OK, everyone’s got shared drives, but how many people are actively using them for frequently changing documents? Just like water always runs downhill, teams are almost always going to go with the easiest solution when no one’s looking — they’re getting by with sharing documents in email and a few rogue project managers have admitted to me that they are turning to Google Docs in defiance of their company policies.
While benefits from collaboration tools are difficult to measure in bottom-line dollars, a reduction in email attachments is plucking low-hanging fruit. Innovation can be borne from constraint: Whether it is by using a widely adapted collaboration tool like SharePoint, Google Docs or Cisco Quad, or by inventing your own solution, as Vitek did with Kerio’s Workspace, I challenge you to make a serious procedural reduction in corporate email attachments or risk drowning your network in your own duplicated memos, PowerPoint decks and PDF files.]]>
Now it’s “cloud-enabled,” and as much as I am already a little tired of hearing it, the fact is new cloud-enabled applications are rolling out every day, and pretty soon, we’ll take the cloud for granted. Microsoft bought Skype this week. Why? Because Facebook was bidding on it? Yes, but also because it’s all about the cloud.
For instance, this month we have written about cloud-enabled applications for content management and project management. Next week, it will be business intelligence in the cloud.
These are all natural extensions to existing applications. Making them cloud-like is a matter of virtualizing the resources they use and creating on-demand functionality.
What’s next? How about the cloud-enabled automobile? Sure. The cloud-enabled bicycle computer. The cloud-enabled refrigerator. The cloud-enabled fill-in-the-blank. The sky is the limit.]]>
We didn’t know it for sure at the time, but even before confirmation, the hive mind of social media had certainly reached a huge landmark in information technology. Contrast that with Sept. 11, 2001, when most of us heard about the attacks in New York and Washington the old-fashioned way: over the cubicle wall or via breaking news on the television. But what is really striking is this — way before Urbahn’s tweet that launched a thousand retweets, evidence of the military action was being revealed by Twitter user Sohaib Athar in Abbottabad, who commented on the explosions and helicopters in a series of status updates and then tweeted later “Uh oh, now I’m the guy who liveblogged the Osama raid without knowing it.”
While I doubt that Athar’s tweeting had much affect on the outcome of Sunday’s raid, it should serve as an important lesson when it comes to social media risks and matters of your own information security. What might seem like innocent observations to your staff might actually tip off your competitors to new projects or a vulnerability in your system. When it comes to the almighty dollar, if knowing exactly what your employees are blasting on their Facebook pages and blogs can have competitive advantage, a prudent capitalist would be foolish to ignore the feeds. Who needs corporate espionage if people are just giving it away for free?
Of course we can’t reasonably prevent our teams from participating in Facebook and Twitter in their personal time, but it’s prudent to make everyone aware that our immediate access to the periphery of daily life has turned the global village into a very nosy little neighborhood, and there are certain topics that need to be kept off the social networks.
Last month, our experts Nelson and Danielle Ruest wrote about social media risks and and had great advice for the midmarket CIO: “Assigning active personnel with the responsibility of updating and maintaining a presence on the social network and ensuring that this personnel is aware of information that is ’‘ — or verboten for the masses — is the only way to make sure your organization will take advantage of the benefits of these networks without risking its own internal secrets. Be careful how you use them, but use them to your advantage.”
While Athar is making jokes about staying alive, no one wants to be the guy who fed insider information to the other team. Just another reason why a rock-solid social media policy protects both you and your team.]]>