Who else would be the best person to talk about Cyber Security Best Practices than Carl Manion? Carl is a Managing Principal at Raytheon Foreground Security. He is responsible to provide advice and guidance to enterprises of all sizes. He guides the organizations to tangibly realize their corporate security visions and thus bring out the best practices. Carl is, in fact, a cyber security professional and veteran U.S. Army officer. He has more than 23 years of experience in cyber security services, cyber threat intelligence operations, and respective IT management fields. He masters in threat hunting and security information and event management (SIEM). As a matter of fact, Carl has extensive expertise in various fields of enterprise security technologies, incident response mechanism, and security operations managment.
In fact, the success story of Carl’s leadership experience does not stop here. Besides displaying his expertise in the U.S. Army, he has been working as cyber defense strategist with many Fortune 500 companies. Like, USAA, Texas Instruments, IBM, and Locheed Martin to name a few. He leads and manages security operations, programs, and projects at these enterprises. His organization, Raytheon, educates students from Khalifa University on cyber security best practices. Carl delivers a lecture to around 30 students from Computer Engineering department of Khalifa University of Science and Technology. This is under the banner of Cyber Acedemy. Raytheon launched this academy globally in the UAE last year.
Cyber Security Best Practices
Carl says, “When it comes to cybersecurity, skilled individuals are your greatest asset, and developing local cyber capacity is key for effective and long term cyber defense. Technology alone is not enough to defend against the highly advanced, well-resourced groups and individuals behind many of today’s cyber threats. It takes talented cyber threat analysts, security engineers and malware researchers who can think like your organization’s adversaries, understand the tools, techniques, and practices they use and develop the necessary counter measures.” That opens a new horizon for Cyber Security Best Practices.
Data archiving is a topic gaining increasing importance in the enterprise due to the critical business and IT implications it carries. Not long ago, it was a topic pushed to the back burner, and/or confused with backup. Today, savvy IT and business professionals know that the consequences of not understanding and employing the right archiving strategy can have disastrous consequences for an organization – today and into the future.
Today, I am speaking with Bill Gallagher, Director of Worldwide Sales, Alliance Storage Technologies on this important topic.
A: Due to the exponential growth of content and the increase in regulatory compliance and mandates across many industries, organizations are becoming increasingly concerned that certain types of information assets need to be properly retained and secured in an appropriate manner.
Worldwide data growth will continue to explode. According to a Northeastern University blog and infographic, “The total amount of data in the world was 4.4 zettabytes in 2013. That is set to rise steeply to 44 zettabytes by 2020.” This data growth explosion is driving the need for faster, smarter and more cost-effective data storage solutions. Moreover, when combined with increasing stringent and complicated internal governance, and external legal and regulatory compliance mandates, the need for long-term data preservation solutions has never been more critical.
Whether from increased regulatory oversight, corporate governance mandates, escalating storage costs or malicious acts such as hacking or ransomware, there is a growing trend to archive content to ensure it is stored on durable media that provides security and protection in an unaltered state for decades while reducing the long-term cost of ownership.
Q: Are there any specific industries that are feeling the pain more than others?
A: There a many industries that must strictly follow regulation which stipulate how certain types of content must be retained and secured for a specific period of time in an unaltered state. Some of the more obvious industries are Health Care, Government, Financial, Legal and Pharmaceutical. More specifically, in the United States the Healthcare industry’s HIPAA HITECH mandates require the protection of personal healthcare information, with stiff penalties for breaches, while Financial industry mandates such as the Security and Exchange Commission’s 17a-4 and 17a-3 rules specify the record types and the manner in which they must be retained. In Europe, the new GDPR mandates are being implemented with wide reaching implications on the long-term preservation and protection of data. In addition the corporate world is also highly regulated and requires that certain content be archived in accordance to the mandates.
Q: Many business organizations still view data backup and archiving synonymously, how do you separate the two?
A: Many firms think they are archiving their data, but they are actually performing backups. Backup is a way of taking an image of your data for the purpose of restoring data, preventing its loss in the event of a disaster. But backups are in general repetitively taking an image of the same data over and over and not taking into account versioning of files or the associated metadata related to the file at a point in time. Backups fall significantly short of meeting the requirements for permanence, authenticity and longevity. Finding and retrieving older documents is nearly impossible with just a backup solution.
Digital archiving is the long-term retention and management of historical, fixed-content digital assets. These assets contain data that is specifically retained to satisfy industry compliance regulations and corporate governance, in addition to providing litigation support and records management. Often used for legal discovery requests, an effective archive solution can mitigate risks and enable business success.
One of the fundamental principals separating backup from archiving is the requirement to store specific content unaltered for extended periods of time. If an organization is required to archiving content, it is most likely driven by a number of government regulations mandating varying lengths of record retention, ranging from 7 years to 100 years or even to “forever.” These records and images must be authentic and readily accessible.
An estimated 70–80% of all corporate data is static content. Just think of all of the backups you do on a systematic basis, and how much of the data in those backups never changes. Then think of the time and money you could save if you had a solution that let you back up only the data that requires short-term protection. You could then permanently archive your remaining fixed-content data to safe, secure media that is easily and readily accessed.
Q: Data is one of a business organization’s greatest assets, are you finding that IT is still wanting to keep all data onsite – even archived data – or are they moving it to a public cloud environment? What are the scenarios for it making sense to keep data onsite vs. moving it to the cloud?
A: In general, there is no one distinct answer to this question. Depending on Industry and regulatory mandates, customers are in different stages of cloud adoption. A driving factor is their view and requirements on maintaining control of their corporate data. Based on this, they are making decisions to embrace cloud storage, maintain on-premise control, or remain undecided.
For those organizations choosing to embrace cloud storage, they are increasingly realizing the value and benefits of leveraging low cost Cloud storage; however, when archiving to the cloud, there appears to be a preference to use a multi-tiered storage architecture which leverages a hybrid model allowing for permanent-unalterable onsite copies of last resort that are also simultaneously archived to the Cloud. This type of architecture can reduce cost and complexity while being secured using AES-256 bit Data Encryption with on-premise encryption key management to ensure sensitive content is not compromised. This architecture ensures user maintain control of their data assets on-premises and in the cloud.
Hybrid Storage, or more specifically Cloud Integrated Storage (CIS) solutions, combines the strengths of multiple technologies to provide a data archiving infrastructure that drives competitive and financial business advantages. Businesses and enterprises can now realize an archiving system specific to the needs of the organization according to capacity, scalability, performance, features, and budget.
Blending compliant archive storage technologies with the reliability, availability, and utility of the Cloud also requires a software management layer to transparently and seamlessly integrate all storage tiers into a single footprint that provides users with affordable choices for archiving data locally and on the Cloud with full access and management capability across the archiving ecosystem.
In order to leverage a Cloud or Hybrid Cloud archive architecture, any solution will need to provide a multi-facet set of features that address the contemporary requirements of data storage infrastructures such as compliance with industry regulations, disaster recovery, high-availability and the benefits of the Cloud.
Q: The data archive debate seems to be centered around disk and tape vs. cloud, but you are seeing resurgence in interest around optical technology – can you talk a bit about that?
A: Long term data retention, security and durability are major considerations when securing critical content in an unaltered state. For years organizations archived content to disk, tape and optical. Disk and tape offered an initial lower cost, higher capacity and IT familiarity which resulted in a higher degree of comfort and adoption. Optical technologies have been trusted by thousands of organizations for many years, and have had a large following, but its initial overall capacities, performance and cost in the past did not keep pace with these other technologies. Today optical has now taken a ‘quantum’ leap forward in terms of the capacity, performance and cost, now offering a 100 year life expectancy at $.04 per GB. With optical roadmaps leading to significantly improved capacity and performance at an even lower cost per GB, the economics plus incredible durability of Optical make it a superior solution for long-term data archiving.
For archiving, record authenticity is a key attribute of Optical storage media as organization are required to retain and secure content in a permanent-unaltered state. Tape and Disk are both magnetic-based solutions and are natively rewritable media types that employ a software/firmware WORM (Write-Once, Read-Many) lock to prevent the drive from erasing and rewriting. This technique only emulates the native attributes of Optical WORM which uses physical phase-change technology that cannot be altered or rewritten, making it physically impossible to alter.
Media life of spinning disk and tape is much shorter than Optical and requires ongoing maintenance and generational upgrades. The newest generation of optical has a life expectancy of 100 years and provides data durability that is unprecedented in the storage marketplace. Optical is a non-magnetic media that much less sensitive to environmental conditions (temperature and humidity) and requires no proactive maintenance like tape. Records can sit untouched on Optical for decades without the need for any maintenance or power required and without fear of media deterioration.
Optical complies with industry regulations for record authenticity in a way that cannot be matched by either magnetic disk or tape technology. This is critical for many organizations and is one of the principle reasons Optical is chosen over tape and spinning disk for archival storage. This is why Optical has always been referred to as the “gold standard” for data archiving and is often noted as “the copy of last resort” by organizations that cannot afford to lose mission critical content.
Q: What advice would you give to an IT, business or channel partner working to set an archiving strategy?
When exploring archiving alternatives, it is imperative to consider all requirements for the retention of your critical business assets as well as the overall long term cost of such. Items to consider include:
- What industry, government or corporate mandates will impact what data must be retained and the cost/impact of non-compliance?
- Determine your risk tolerance over loss of control of your data. Do you wish to maintain a copy of last resort at all times under your control? Is this data critical to the continued success of your business?
- How will the data be secured to ensure protection from unauthorized access, exposure, or in the event of a disaster? What are my business continuity objectives for this data?
- With Archive data being retained for decades rather than years, what is the long-term cost of the solution? You must factor in decades of re-occurring cloud storage subscription cost, technology refreshes required with Disk and Tape, and the pain of frequent data migrations and related cost.
In selecting an archiving solution recognize they are not all created equal. For example, an archive solution that offers a multi-tier (disk, cloud, optical) storage archive will offer unprecedented long-term retention, security and data durability that will preserve content for 100+ years at a cost that competes with tape.
A recent survey of Ireland chapter of Project Management Institute (PMI) brings out stunning results. It says a majority of Ireland project managers fear a Brexit skills shortage. There is a serious shortfall in availability of skilled project managers according to industry leaders. Probably this is one of the major risks that is resulting out of Brexit. 60 percent of project management leaders participating in this survey say that there is a lack of enough experience in Irish project and program managers. And hence, the existing lot will not be able to fulfill the current need of project management professionals for the nation. In addition, more than 70 percent of the respondents in the survey say that the scenario is going to be further complex. The gap is increasing at a considerable pace and hence increase the risk in the shortage of Ireland project managers.
The concern is definitely serious when it comes from the horses’ mouth. As a matter of fact, there are certain more serious revelations in the survey regarding Ireland project managers. Because two in three respondents feel a rise in the need of the level of resources to complete projects in the coming year. There are more than 50,000 project management employees in Ireland as per latest estimation. These include sectors like finance, construction, pharmaceutical, manufacturing, IT, and public sector.
Ireland Project Managers
Niall Murphy, President, Ireland Chapter of PMI expresses grave concern regarding this wide gap in skills. Regarding Ireland Project Managers, he says, “Project management will be instrumental in navigating this uncharted territory that is Brexit, from managing a company’s future trading relationships with the British market to working with major financial institutions who are expected to relocate here.” He further adds, “Without a sufficient supply of skilled project managers nationwide, there is a concern that projects will not be effectively delivered. This shortage needs to be tackled, as it will ultimately affect the Irish economy as a whole,”
Definitely, the current scenario of Ireland Project Managers is taking a serious turn. It needs immediate attend to stop damage to projects.
There are ample benefits when you migrate to the cloud. Imagine a huge data center consuming a lot of power and engaging a lot of manpower. On the other hand, a one-time cloud migration would take away all these hassles away from you. But before you plan to migrate to the cloud, there are a lot of considerations to be taken care of. So far all your critical enterprise data was on-premise. The same is now going to reside on a server that is not under your control. You might have a service level agreement but you never know who all have access to that server where your business data resides now on the cloud. In that manner, cloud migration is a serious activity and your cloud partner must address to certain critical concerns.
Though till now all your enterprise data was in your own data center, but still there were many security concerns. And of course, you were taking care of that via firewalls, routers, switches, virtual private networks, AD server etc. Still, you can never claim to be 100% risk-free. But the moment you go for cloud migration, I feel, your risks increase. Or so it seems to be. In reality, it might be different. Cybersecurity protection is a major concern on the cloud. You might have to redefine business continuity plans. In the same manner, IT disaster recovery also will have a different paradigm now. How about taking Disaster Recovery-as-a-Service to protect against security threats and incidents? After all, business continuity is always a top priority irrespective of whether your business-critical data is on-premise, on the cloud, or undergoing cloud migration.
After all, IT disaster recovery and a strong cyber security mechanism need to complement each other in order to protect sensitive data. Hence, whenever you decide for cloud migration, your cloud partner must be able to address these issues first. Otherwise, it might be too late, later.
Automation in workplace. Is it a point of worry if it is happening in your organization? A recent report from PwC in this regard says around 40% of U.S. jobs would become obsolete by the early 2030s. And it is because of a high risk of automation. Downsizing is a favorite action point of any top person of a business enterprise. Because this is the best way to show your performance. Secondly, it also helps you to get your books from red to orange, if not green. I am sure, a lof of people are there who lost their job because of this reason in their organization. I know an organization in India, a leading education company, where a new CEO joins with a big bang three years back. He comes with a promise of bringing a revolution in the business. And obviously, the first thing he performs is downsizing.
But even after three years, the company is still in red. Because the CEO has not been able to do anything other than his first and world’s most favorite action. On the other hand, advances in technology, computer modeling, robotics, etc. are all becoming a threat to blue and white-collar jobs. Even if you are not a victim this time, you might be in the list next time. Is there a growing threat among an organization’s white-collar and blue-collar segments? Does automation in workplace create a fear factor in any employee’s mind that his/her job would get a severe impact in the future because of this?
Automation in Workplace
Is it important to remove an employee from his job for the sake of automation? Yes, I think. As far as removing from the job and not from the organization, it is fine. Obviously, you didn’t recruit donkeys in your organization. And if this is the way of paying for the loyalty of a good employee, in my opinion, it is wrong. Automation in workplace should not come with a fear to your organization.
Podcasting is a Business or Bust? This is an important point of discussion. Especially, in today’s scenario when the whole world is going digital. Whatever business you are into, it depends on how you leverage it to your benefit. Why has podcast an edge over a videocast? There are many reasons. Firstly, the size of data. A video is manifold in size in comparison to a podcast. Secondly, you need a simple platform for streaming. Thirdly, you need lesser preparation because it is only about voice. And finally, it is easier to stream at the user end and hence less cumbrersome. If you are not using podcasting as a business platform currently, sooner you will need to. But you have to ensure to create a profitable business approach to it.
I think, these days, every industry need to podcast. Because every industry has a set of audience and prospects. It might become a strong weapon for your business to attract new leads. And obviously, new leads are always welcome in any business in order to significantly grow your business. But you have to be careful about investment of time. If you are podcasting spending a lot of hours and are not able to reap any benefits out of it, then there is something seriously wrong in your methodology or approach. Most important part is to reach your audience, prospects, and listeners. If, despite your al good efforts, you are not able to, you need to reinvent or realign your process of podcasting.
Podcasting is a very important tool, in my opinion for all industries. Especially if you are into music, movies, education, automobile, health, hospitality, F&B, or for that sake, any other business. In fact, you just need to sit and think, who all would benefit if you pass on a little piece of information about your business, product, or service via podcasting. And then define process for it to implement it fast.
CIO roles are changing globally. It is expanding vertically and horizontally. A CIO is not to constrain himself merely within the four walls of Information and Technology Department. In fact, one who limits himself within that sees the exit from the organization sooner or later. A decade back a CIO having higher visibility outside these walls would be taken up as wasting time according to the top management perspective. But not now. In fact, in today’s scenario, the management assumes a CIO to be more interactive with the business head and department leaders. And those who don’t are having less interest in the business. That is how the top management and HR takes it. And obviously, why it should not be? How information technology is a different island than the business. Both have to exist on the same ground. That brings new CIO roles.
So various CIO roles that come to my mind in today’s changing paradigms are as below:
CAO: Chief Automation Officer. Automation is the key. Business can’t afford it technology ignores any mainstream process and doesn’t focus on automating it. In fact, unless all key business processes undergo automation, you can’t move towards sensible and meaningful analytics. Hence, Automation is the key role that a CIO has to carry along.
CDO: Chief Digital Officer. This, in my opinion, is the most demanding CIO role in the current scenario. If an organization is not digital, it is like a dead fish in the sea.
CKO: Chief Knowledge Officer. This is another CIO role that one has to take care of.
CDO: Chief Data Officer. When we talk about big data, Internet of Things, and Cloud, it indicates that data is flowing from various streams. A CIO has to own all these data streams to provide his organization a meaningful bouquet of information and analytical reports.
And if you notice any other important CIO role coming to your mind, please do participate via the comments section without fails.
Choosing a right business process management software for your enterprise is a very important decision to make but not before this. Before everything else, you must be very much clear that whether your organization needs one or not at this stage. It all depends on the maturity level of an organization to adopt a right kind of BPM software. A small mismatch might create a big fight between adoptability and adaptability. Firstly, let us understand what is a business process. A business process is nothing but a logical design of activities that regulates a provision of a product or service for an end user. This end user could be an external or an internal entity. For this, you create workflows. And to adhere to workflows there come project management and task management into the picture. A lot of things connect back and forth to streamline this.
Business Process is not that difficult to manage. You can do it even without a Business Process Management Software. But as the business expands, you strive for higher efficiency and productivity. For this, you need to perform certain important tasks. Firstly, you need to focus on automation of workflow. Secondly, you need to find out the bottlenecks. Thirdly, you need to regularly review your business processes. And finally, you need to remove these bottlenecks and renovate redundant procedures. To organize it all in an efficient manner, it is advisable to go for a good Business Process Management Software.
Business Process Management Software
Remember to evaluate exhaustively these software before purchasing one. You have to ensure that the final product is able to address the direct concerns and issues of your organization. In fact, your ultimate goal is to go for a business process management software that has certain capabilities. Firstly, it should optimize your business. Secondly, it should remove the complexities and anomalies in the business. Thirdly, it should focus on timely automation. And finally, it should have a dashboard to provide you relevant metrics and reports in order to ensure regular improvement.
Finteract is a platform to engage startups with finest of minds. Technology is changing fast. Commerce is changing its dimensions and meaning when it comes to the digital world. IT services are transforming to IT entrepreneurship. A lot more was happening during Spring Conference 2017 at Novotel, Vizag. Fintech Valley is a revolution in Andhra Pradesh. Fintech Valley launches Finteract. It aims to promote multi-disciplinary thinking in order to create greater expressiveness and meaning to the fintech culture. They call it as ‘Fintectonic’. There were two founders and a UI-UX strategist to inaugurate this series of conversation. The founders include Nitin Saluja, Founder, Chaayos and Dharmil Sheth, Founder PharmEasy. In addition, it was Priyanka Agrawal, famous design thinking UI-UX specialist from Fractal Ink.
The overall purpose of Finteract is to organize a specialist talk to share experience and learning. On the same lines, Fintech Valley aims to dynamically catalyze this thriving spirit to inculcate innovation. These things do not happen merely by raising funds or building infrastructure. It needs to build a culture and atmosphere that curates an environment for these ideas to grow.
During his Finteract session, Dharmil Sheth says, “People struggle to accept change. Resistance and opposition are a part of disruption. I foresee technology leading this disruption and changing policy in the industry.” Priyanka Agrawal recommends, “To
innovate, you must have a beginners mind. It is through only small insights and lateral thinking those innovative solutions can be born.” On similar thoughts, Nitin Saluja believes in simplicity. If you need operations to do wonders, then the think tank has to do their job with perfection.
Overall, Finteract was quite a meaningful interaction with entrepreneurs and experts. Probably, it is important for industry leaders to find right kind of experts that can become a catalyst for their business. After all, it is just a question of right kind of energy and synergy to create wonders.
Spring Conference 2017 at Fintech Valley Vizag witnesses overwhelming participation. There were many global companies participating in the event. In fact, it is Andhra Pradesh government’s project to develop Vizag as a national and global giant for fintech initiatives. Most of the participating companies came up with quite innovative projects. In all, there were 30 international delegations attending the event. And overall, there were not less than 150 startups competing in four Fintech challenges. Out of this around 40% participation was from across 15 countries. These global companies include those from Singapore, Switzerland, and Japan. March 9 was a historical day for Andhra Pradesh. It was the inauguration of Spring Conference 2017 at Novotel, Visakhapatnam. This marks the beginning of a new era in shape of Fintech Valley. In fact, this is just a start of a flagship initiative.
This initiative aims to bring together industry, academia, and investors to work together in an innovative manner to co-create and build the fintech ecosystem. As a matter of fact, this would be a unique platform where the financial experts and startup community will get a chance to share mind-space with a wide range of experts from various streams of the profession. In fact, anyone having disruptive ideas is most welcome to be a part of Fintech Valley. Though Chief Minister Nara Chandrababu Naidu was not able to attend the Spring Conference 2017 in person but he was there for an hour over video conference to talk about the vision and mission of Fintech Valley.
Spring Conference 2017
In addition, he will chair the Fintech Valley Forum. In fact, during his address, he was quite enthused. He says, “The Fintech Valley Spring Conference is our step in joining the Fourth Industrial Revolution which is a spectacular combination of technology and Internet of Things (IoT). In recent times, technology has started influencing our lives in a comprehensive manner. The demand for Fintech is growing each day. To meet this demand, we would need the support from Fintech and Cybersecurity companies. We also need the academic institutions to adapt curriculum that trains individuals to contribute to fintech sector. I extend my best wishes for the success of the initiative and hope it provides multiple opportunities to meet the futuristic requirements of our country and the global economy at large.”
Special Chief Secretary and IT Advisor to the AP Chief Minister, J. A. Chowdary states during his keynote address, “Indian IT 1.0 is facing difficulties. The next flight towards IT 2.0 will be backed by fintech. The tectonic shifts this will cause and entail is captured by the expression ‘fintectonics’. It is a fintech culture we are creating here – a culture of doing something for the betterment of the common man, a culture of creating an ecosystem by getting the right industry linkages and finding the right formula for the critical manpower.” In addition, other prominent personalities present on the dais at Spring Valley 2017 were Roy Teo, Director, Fintech & Innovation Group, Monetary Authority of Singapore (MAS); Utkarsh Palnitkar, Partner KPMG; George Inasu – COO, Fidelity Financial Services; Puneet Pushkarna, Chairman, TIE – Singapore and Joe Seunghyun Cho – Co-founder and Chairman, Marvelstone Group.
A Discussion with Bill Tolson, Vice President of Marketing, Archive360 (www.archive360.com)
In speaking with IT professionals, I constantly hear about the same dilemma – how can IT support its corporate client base in providing what feels like an endless supply of share drive capacity? In fact, I would challenge anyone to find an IT professional that isn’t faced with the continuous pleas from their corporate end users for more and yet more, storage. Today, I am talking with Bill Tolson of Archive360 regarding this topic.
J.K.: In speaking with Archive360’s client base, are you hearing that data storage continues to top IT professionals’ priority lists?
B.T.: Absolutely. Today’s end user – whether they are in a profit/non-profit business or government agency have become accustomed to saving everything – from documents to presentations, to emails and so on. And, I know I am guilty of it myself, I never delete a thing. I think almost anyone you speak with will admit that they have become a packrat of sorts, holding on to everything “just in case.”
Add to this, corporate, legal and regulations compliance professionals are facing and imposing increasingly stringent guidelines and policies regarding the retention of current, as well as aging low-touch inactive or “grey” files. These low-touch files could hold potential relevance in current or future legal proceedings, or are necessary to meet compliance regulations.
J.K.: So, IT professionals are finding themselves responsible for low-touch inactive files that are clogging file shares. And, it is the convergence of these problems that are forcing IT to purchase additional file share capacity, along with adding the management resources necessary to keep it running smoothly and backed-up.
B.T.: Agreed. The cost of purchasing enterprise storage can be very steep, with the cost to keep it operational just as expensive or even more so.
J.K.: I believe you have similar statistics, however in my experience and based on prevailing industry research, the yearly management cost of enterprise storage is about $3,200 per terabyte (TB), or about $.27/GB per month. For a medium sized organization, with 100 TBs of share drive capacity, that is a spend of $320,000 alone in overhead (including management, backups annual support agreements, etc…). That is on top of the cost of the storage itself which typically represents a thousands if not hundred of thousands of dollars investment. So, what do you view as the solution?
B.T.: What if, instead of purchasing new share drive capacity each year, you could automatically move low-touch and inactive files to a cloud-based file share drive extension, while still maintaining total and ultimate control? What if you could do this while still maintaining the ability to search for and access the files at anytime? What if you could ensure that same — or in some cases even increased — levels of protection, security and performance? What I am suggesting is that more and more savvy IT professionals are turning to the public cloud to support their HSM (hierarchal storage management) share drive strategy, as their lowest cost storage tier.
Extend Your Share Drive Capacity
J.K.: What do you view as the benefits of this combined on-premises and cloud HSM strategy?
B.T.: What we are seeing consistently in customer’s that have deployed this strategy is that it has enabled them to avoid being forced into purchasing high priced share drive storage for inactive data. IT still maintains high touch business critical files locally, while low touch files are moved automatically to inexpensive cloud storage. This represents huge savings and allows IT to redirect these resources to activities and technology investments that support revenue generation, and other core organizational goals. All, while keeping all share drive content available, secure and protected for business, legal and compliance purposes – at the absolute lowest price possible.
Extend Your Share Drive Capacity
J.K.: Is there a particular cloud platform that view as an ideal solution for this scenario? And, what advice would you offer to those exploring it?
B.T.: We would recommend Microsoft Azure should be among the top contenders. As IT professionals explore leveraging the Microsoft cloud as their share drive capacity extension, we also highly recommend that they pair it with a migration and management solution that will enable them to create tailored policies, such as age and access based policies, for on-premises share drives that will automatically move files that meet their specific requirements, while still maintaining access to the files via their local departmental share drive. This capability offloads low-touch inactive files from the on-premises share drives, freeing up space for more active files – and putting an end to the annual share drive purchase.
J.K.: Virtually limitless elastic scalability, teamed with high performance, data protection, and security, and high availability, as well as many other enterprise-class capabilities – all at a dramatically lower cost – seems like a no-brainer to me.
Fintech Valley must be a dream project of the Andhra Pradesh Chief Minister personally. Whatever you say about this project in words is less than what is actually happening. The project has an amazing response not only from Indian companies but across the globe. Fintech, in fact, is the new buzzword in the state. And why state, the same should happen across the country. The project is in right hands. Chief Minister, Nara Chandra Babu Naidu is an agile and dynamic personality. Witnessing Fintech event in Vizag during 9-10 March was really amazing in all aspects. Not only in terms of the learning but the amazing work happening in this regard. The head of this project is none other than the chief minister himself. That itself says the seriousness and gravity behind the project. The two-day event was full of a high level of enthusiasm and collaborative effort.
With so much of disruption happening across the globe in business and technology, Fintech Valley in Vizag is the right answer to everything with one powerful shot. It aims to target great outcomes from the digital disruption in Fintech and innovation. It brings together the two with the right proportion of amalgamation thereby creating a solid bond. There is a right mix of public and private players. Not only this, there are many other remarkable factors. Firstly, it has the state of the art incubators and accelerators. Secondly, there are innovation labs. Thirdly, it includes mentorship and angel investors. And finally, it is the right place for anyone willing to break free from traditional processes. The self-sustaining global Fintech Ecosystem has higher goals than just access to Fintech and its innovators.
Fintech Valley Vizag
Right from the initiation Fintech Valley nurtures an oasis to take care of cyber security, block chain, digital awareness, and research. Nothing less than international standards. On one hand, it equips individuals and businesses with a unique set of opportunities. These opportunities will help to grow through enabling market access for startups to angel investors. While, on the other hand, it promises to provide world-class infrastructure, funding, human capital, research, and innovation. The vision statement by Chief Minister N Chandrababu Naidu promises to create 5 lakh jobs in Andhra Pradesh by 2020. And all this will drive through technology-enabled services. In fact, The Fintech Valley is like a playground for start-ups and innovators looking to disrupt traditional business processes.
Andhra Pradesh ranks number one for ease of doing business. It imbibes a strong IT industry with a turnover of over INR 2,000 crore. On top of it, there is a strong support of a robust industrial base along with educational infrastructure which is constantly expanding. Fintech Valley in Vizag is the perfect destination in India for an unmatched global level business opportunities and goal setting.
The Digital Platform is the best way to reach masses in case of governance and administration. This is what the latest move by the governing party in the center signals. There are many things that BJP is doing in India which no other party could do so far. Definitely, if you have good intentions for the masses, you need to take serious steps towards that. And those steps need to be big in shape. Because smaller steps lead to smaller achievements for a smaller group. But when the group size reaches to billions, there have to be bigger moves. Obviously, digital is the key in today’s world. The people reading physical newspapers is shrinking. And the volume of online communities is increasing exponentially. Even in the remotest of locations, people have plasmas, smartphones, and they do online shopping too. The world is changing fast.
The Kerala state BJP unit comes out with a master plan. This plan focuses on citizen welfare schemes by means of digital media. It also intends to take up environmental issues on digital platforms so as to have larger participation and contribution. The digital platform helps you to connect faster and to much larger audiences. Evidently, BJP’s hold in southern cities is weaker. This might help them to strengthen their position in upcoming central elections in 2019. As per the master plan, there will be 1000 digital service centres across the state. The focus will be helping people in removing their doubts and sharing more knowledge about various welfare schemes like pension and insurance.
Kummanam Rajasekharan, BJP Kerala President says, “The mechanism will be implemented at the booth level. The state-level programme has already started and the plan is to implement the digital help-desk, titled Deendayal Helpline, across the state in the next one month.”
In addition, the digital centres will also provide a number of useful e-services to people. Of course, the digital platform has a great potential.
Information security frameworks questions are quite common across the globe. Technology and business keep raising concerns about the information security. The information security framework comes into picture for that purpose. It is entirely dependent on the business framework and security needs. Hence a common framework will never suffice all businesses in general. It has to have precisely as per the needs. For instance, the information security framework in banking would be quite different from any other business as far as transactions and customer information are concerned.
Here is a recent question on ITKE regarding the same. Would you give me guidelines on development steps and initial requirements of information security framework? The answer as per my knowledge goes like this. Information not only talks about digital information but the physical information too. Hence the three spectra that you need to take care of while creating your policies must include – all critical data in devices (databases, emails etc.), all information on paper/files/physical, and all key personnel in the organization having critical business information. Logically, there are two kinds of risks as far as information security is concerned. Firstly, there is an internal security risk that you need to mitigate. Secondly, there is an external set of risks.
Information Security Framework
Though the security needs might be same in both the cases on a broader level. But there has to be a different set of processes and procedures to tackle both. It is apparently true that the risks from the people inside are higher than outside. The reason for this is that there is a high level of data and information exposure to employees. Therefore, you have to handle rights and access quite wisely. In fact, there is another prominent concern in this regard. That is about sharing of passwords. There are many cases where a manager shares his or her password with subordinates just to shred off some of the responsibilities. Information Security Framework is definitely a serious concern. Also, there has to be a constant review policy for the same.
External auditing happen almost in all organization. It is probably a legal requirement under company act. But then is it possible to audit an external company auditing your organization. Obviously external auditors are the kings. They can ask and demand any information, data, and user rights. In case of physical information too, they can seek files and documents to any extent. Logically, when such audits happen, it is an audit of your practices, proedures, and policies. Basically, it is a check of what you say and what you do. These ideas came into my mind when i came across this question on ITKE. The title of the question is External IT company auditing security and policies.
The question is – We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors? In the nutshell, is it possible to audit an external company auditing your organization? I think, in an organized scenario, it is very much possible. There is a written agreement between the two parties – auditor and auditee. Everything is being taken care in that agreement. There is no need to audit the auditors. But you just need to ensure that you record every requirement from them in black and white along with the reason for which it is required. In any case, when you give them admin user/password you always have audit trail for all your critical data and actions.
Is it possible to audit an external company
Moreover, as the maturity level increase, the auditors inform you the key areas they would be looking into. Also, in most of the cases, they list down the information they would be seeking. This information might include an access to your key business application. They might like to access the application with differnt role level to check if the authorizations and alerts are working correctly of there are any gaps.
Just now came across a question on ITKE seeking clarity on Cyber Security and its connection with Business Continuity. There is definitely a strong connection between the two. The question title was Aligning cyber security incident plans with BCM. The question is – How can I integrate cybersecurity practices into a BCM program? In my opinion Cybersecurity or for that sake any security in terms of data, transactions and critical manpower come under Business Continuity. No enterprise can afford to ignore it while creating policies in that regard.
In today’s era where most of the business transactions happen from multiple locations, the internet plays a major role. The moment your data is exposed to the external world, that is the moment it is out of your local area network and floats on wide area network, it is exposed to risk. You might be using encryption and secure connection but then there is always a chance of hacking the data by miscreants. You never know who are your enemies in this world of masks. Though even if you have an on-premise server and transactions are happening within the LAN but still there would be some ports talking to the external world for various reasons. Cyber Security is of prime concern and a small breach can impact business heavily.
As a matter of fact, a fraction of leakage can create a big risk for a business. For instance, it can be an email, a document about a business deal, a travel itinerary of a key position holder etc. Therefore you need to create a risk assessment charter. Segregate risks on the basis of their severity. the severity comes from the loss or damages a risk can cause to an organization. Higher the loss of damage, higher would be the severity. In fact, this loss or damage need not necessarily be in the form of money. It can be a bigger damage in terms of reputation. Hence, taking cyber security in your business continuity charter is essential.
Samsung in Spain announces I&G or Infill and Growth Project. The innovative projects collaborate two communication giants in India. The project by Samsung is for Reliance Jio Infocomm, India. The project aims to upgrade existing LTE mobile communication services across India with a stupendous increase in capacity as well as network coverage. As the need for this is increasing at a fast pace in the country, some strong steps need to be taken in this regard. In fact, the project aims to set a new benchmark for LTE services in India. This is to happen via wider coverage, deeper penetration of signals, and high speeds. The uniformity in experience is very important in telecom services. You can’t provide an excellent experience at one place and then it worsening at other locations.
The spectrum in 850, 1800, and 2300 MHz bands targets to enable flawless indoor and outdoor coverage even in highly populated areas. The Infill and Growth project, as its name suggests, will help Jio to expand in rural areas by extending its reach to more than 90 percent of the population. As a matter of fact, this is not the first time Samsung is working with Reliance on a large project. Earlier it provided the LTE core, base station, and various solutions for Reliance’s VoLTE services. They also provide huge deployment services for establishing the large network for Jio. In fact, the two companies earlier deployed the world’s largest greenfield LTE network in India.
Infill and Growth Project
Regarding Infill and Growth Project, Youngky Kim, President and Head of Networks Business at Samsung Electronics says, “As Jio’s end-to-end LTE solutions partner, it is a great pleasure for Samsung to contribute to Jio’s tremendous success.” He further adds, “The massive deployment of over a million cells across India is especially remarkable. We will strive to create new paradigms for LTE-Advanced Pro and 5G by closely cooperating with Jio as a unified workforce.”
Jyotindra Thacker, President of Reliance Jio Infocomm, while talking about Infill and Growth Project says, “I am excited to announce our new project with Samsung. We successfully achieved 100 million subscribers in 170 days, making us the fastest-growing company in the world, and the numbers continue to rapidly grow. It was possible because we introduced a truly effective LTE service, Pan-India. We are committed to bringing game-changing digital experiences to India with superior ecosystems, mobile content, all-IP networks and ongoing process innovations.”
We are talking about smart cities, smart nations, smart buildings, smart homes, smart transportation, and so on. With so much of connectivity increasing, we must also think about how to secure data in the world of IoT. Firstly, users have to come out of their habit of using default passwords. The phenomenon is so common that very less percent of users follow the rule. The rule is simple and the risk is high. Keeping your data safe, especially now in the era of IoT, is very important. The IoT age is wonderful but is equally unsafe in terms of data and security. These days, when devices and household equipment are having passwords, we must be highly alert in assigning the passwords. For hackers, it has become a simple challenge to crack a router and other devices in a fraction of seconds.
Leave aside the non-IT people but even the IT professionals at senior positions use default passwords. The same applies to IoT vendors whether they are device sellers or service providers. A password must be as complex as possible. Mostly the habit of using names, common nouns, and a small set of numbers prevails as a habit. These kind of passwords are quite easy to crack in no time. In fact, a password must be long and complex having a combination of numbers, symbols, and different letter case multiple times. This can definitely help you in keeping your data safe to a large extent. Learning how to secure data is important but more important is to understand the risk of not doing it.
How to Secure Data
IoT device manufacturers should follow this practice. In fact, forcing a user to set a password before using the device is a good practice. Also, while resetting a password there must be guidelines to ensure a strong and complex password. Such policies make it difficult for hackers to crack a device though if not impossible. With so many devices getting interconnected a strong password for each device is more important. A single device in the network with a weak password can call for a big trouble. How to secure data is not merely important for the device owner but for the complete ecosystem of large networks, they become part of.
Internet of Things is not merely a buzzword. In fact, a lot is happening in this area worldwide. But at the same time, there is another issue. The rising security concerns with the rise in IoT projects is creating a different set of threats for industry. As a matter of fact, there are many unanticipated risks that are yet not perceived by the technologists and risk experts. A recent article talks about this at length and it is important to understand it properly. Though Internet of Things is a revolution, it is causing certain safety concerns. Of course, any convenience comes with a pain. And we, importantly, need to address to it. There are certain alarming issues that consumers and manufacturers need to take care of in this regard.
Over a 50 billion IoT devices will be talking to each other by the year 2020. This figure comes from a whitepaper by Cisco. In fact, consumers and industries are already feeling the necessity of connecting devices. This necessity arises to bring a big amount of comfort factor in our daily lives. Smart homes, smart cities, smart transport, and smart buildings bring in a lot of devices sharing information with each other in a fraction of a second. This information thus enables you to take timely decisions and actions. Smartphone companies are already releasing new generation devices having inbuilt IoT applications.
Rising Security Concerns
But while these devices tend to increase convenience, they also imbibe with some serious security risks. The uptrend in rising security concerns is alarming, in fact. More devices on the internet mean more liberty to hackers to put their hands on. It is the sensitive data lying on or traveling through IoT devices that are at stake. As a matter of fact, weak infrastructure and insufficient security in these devices is an open invitation to hackers. As we all know that hacking an IoT device is easier than a computer or phone. That is why there is a tremendous increase in IoT botnets. In fact, a vast level of connectivity of these devices invites for more lucrative hacking tasks. Because it opens a plethora of systems inviting them for this challenge. In fact, rising security concerns demands an immediate focus from security experts.
IDC’s report FutureScape: Dawn of the DX Economy and the Digital Native Enterprise talks majorly about few things that are going to change the world in a big way. These are IoT, Digital Transformation, AI, Big Data, Analytics, and Cognitive technologies. In fact, most of these create the base of the IT Industry Predictions from IDC. The evolution of the third platform is on the rise. It comprises of the cloud, mobility, big data/analytics, AI, and social technologies. As a matter of fact, any enterprise committing for digital transformation will have to adopt the third platform. The size and velocity of adoption will depend on the size and urge of the enterprise respectively.
Following are the IT industry predictions from IDC:
Information-based products and services will control more than half of the Global 2000 businesses by 2020. Such companies will have to bank on their ability to build a digitally-enhanced product, services, and experiences.
Third Platform technologies and services will involve more than 75 percent of IT spending by 2019.
67 percent of enterprise spending in IT infrastructure and software will focus on the cloud.
The extent of experimenting by consumer-facing global companies with Artificial Reality (AR) or Virtual Reality (VR) will increase to 30 percent by 2017.
The AR/VR is bound to reach mass adoption levels by 2021. Over a billion users will be accessing apps, content, and data via AR/VR.
Industry Collaborative Clouds (ICCs) will reach to a phenomenal figure of 450 by 2018. In fact, by 2020, more than 80 percent of the Global 500 companies will be supplying digital services using ICCs.
More than 70 percent of the Global 500 companies will build organized digital transformation teams by the end of 2017.
The performance of any enterprise will have an additional factor i.e. its digital transformation initiatives.
One-third of health, life sciences, and consumer product businesses will start developing products and services integrating third platform technologies with the human body.
IT Industry Predictions
These IT Industry Predictions are going to be true looking at the current trends and expectations on the global front. In fact, the time is not that far.
IDC says IoT and AI together can deliver wonders to IoT and IIoT projects that IoT alone can’t. Probably it seems to be a fact that IoT needs AI capabilities. The conclusion arrives on the basis of research by them in this area. It predicts that by 2019, all initiatives pertaining to IoT (Internet of Things) and 40 percent of efforts in the field of digital transformation will require the support of cognitive and artificial intelligence (AI) capabilities. The market intelligence and advisory enterprise International Data Corporation (IDC) reports it in their IT industry predictions for 2017 and beyond. What it means is that IoT and AI will have to work together in all IoT initiatives to be effective in this spectrum of innovation.
Big Data is a major contributor to the flood of data. In addition, IDC believes, IoT devices and digital transformation projects will add a plethora of data to it. Therefore, it is advisable to AI technologies to filter valuable data. This itself proves IoT needs AI capabilities to a large extent in order to deliver better results. Even the developer communities are favoring to include cognitive or AI in their applications. In fact, by 2018, this will increase to 75 percent. As a matter of fact, the time is not far when prominent cloud players like Amazon, Google, and IBM start providing standard AI platforms to their customers.
IoT Needs AI Capabilities
The comprehensive report from IDC FutureScape: Dawn of the DX Economy and the Digital Native Enterprise carries all such conclusions. Frank Gens, senior vice president and chief analyst at IDC says, “We are at an inflection point as digital transformation efforts shift from ’project’ or ’initiative’ status to strategic business imperative.” He further adds, “Every (growing) enterprise, regardless of age or industry, must become ’digital native’ in the way its executives and employees think, what they produce, and how they operate. At the same time, 3rd Platform technology adoption and digital transformation are happening much faster than most expected and early competitive advantages will go to those enterprises that can keep pace with the emerging DX economy.”
There are many other factors to provide ample number of evidence that prove IoT needs AI capabilities to deliver the best.
IIoT Initiatives or Industrial Internet of Things infrastructure initiatives can happen in various areas. The spending and initiatives will vary from industry to industry. In fact, it will be different even within the same industry segment. For instance, a car manufacturing company will have a larger set of needs in comparison to its vendor supplying components. As a matter of fact, most of the enterprises have already been taking ample IIoT initiatives and provisions in their budgets for such spendings. A survey in this regard shows some remarkable results. The findings from the survey suggest that Telecom, manufacturing, construction, high-tech and similar enterprises must actively deploy IoT solutions at a faster pace.
When we talk about IIoT initiatives, we must align them well with the IT infrastructure budget. As a matter of fact, every industry segment has to keep its customers and end users in mind while taking such initiatives. For instance, existing networking elements have already started losing their sanctity in this regard. There is a high demand for newer networking devices that must address the needs of IoT projects. Secondly, Bluetooth Low Energy (BLE) and Wi-Fi would be fitting almost in all IIoT or IoT projects. These two will be the most economical and highly effective connecting tools.
But the requirement changes for long-range wide-area networks (LoRaWAN) and narrowband IoT (NB-IoT). Probably in these cases, vendors will have to think beyond BLE and wi-fi. The vendor selection will depend on their capabilities in providing solutions for data analytics and pattern recognition. The Demand for edge servers and cloud-based services will increase tremendously. Security will remain a concern, as usual. But then it has to be taken care of in a significant manner.
Sathya Atreyam, research manager, mobile and IoT infrastructure, IDC says, “Given the strong uptake in IoT-based technology solutions, enterprise IT buyers are looking for vendors who can add IoT capabilities to the current networking and edge IT infrastructure.” He adds further, “Further, the success of IoT initiatives will also depend on how IT buyers can effectively leverage newer frameworks of low power connectivity mechanisms, network virtualization, data analytics at the edge, and cloud-based platforms.”
I think a lot of IoT initiatives will become an integral part of various IIoT Initiatives subsequently to provide benefit to enterprise and consumers in a single shot.
Internet of Things or IoT Infrastructure Spending is increasing. And the speed at which it is increasing is tremendous, we must admit. IT infrastructure spending that does not align with this will not suffice meaningful purposes for businesses. In fact, Enterprise IT heads have to start thinking in this direction sooner or else they will fall apart from the mainstream of business. And soon they will become an obsolete entity for their organization. And, as a matter of fact, the same will happen to the IT infrastructure spendings having no capacity for IoT alignments.
This means, your IT infrastructure budget must have a provision for IoT Infrastructure spending. Whether it is a service organization or a manufacturing business, all need such provisions. This emphasis comes from a recent research from International Data Corporation (IDC).
On the same lines, an IoT IT Infrastructure survey shows similar trends. It concludes that IoT data management, improved business offerings, and IoT networking components are the key focus areas to embark your IoT initiatives. These will, in turn, lead to the success of an enterprise. The study considers existing and future IT plans including IoT infrastructure spending. It says end users engagement and knowledge of IoT needs will play a major role in deploying IoT strategy. In fact, vendors also need to play a crucial role in educating and influencing enterprises for IoT initiatives.
IoT Infrastructure Spending
Natalya Yezhkova, research director, storage, at the market intelligence and advisory firm says, “The survey revealed that IoT will have a significant impact on end-users’ decisions and strategies related to IT infrastructure across all three major technology domains: networking, software, and storage.” She further adds, “Increase in budgets, broader adoption of public cloud, and open source solutions are the most anticipated results of IoT initiatives.”
Overall, it is a crucial phase of the end user industries and IoT firms. They need to collaborate in a significant manner to gain fruitful results from IoT Infrastructure spending.
Is NFC IoT. Somebody asks this question on Quora and the question lands in my mailbox because of my subscription on few keywords. I have done few pilots on NFC and hence feel confident in answering queries on NFC. IoT is again my favorite topic. A lot is happening in discussions and perhaps in actions when we talk about IoT. But as of now, this all seems to be superficial. If it is not able to solve existing issues then it can’t talk about the solutions of future. NFC i.e. Near Field Technology is not IoT i.e. Internet of Things. NFC can help in creating IoT. And when we say IoT it is nothing but smart cities, smart homes, smart buildings, smart nation, and so on. IoT is all about real-time communication between various devices. Though it is much beyond merely enabling devices to talk to each other.
Is NFC IoT?
As a matter of fact, the question Is NFC IoT is good for clarity point of view. One is technology, and the other is the solution. NFC is a technology that makes an active device, say a smartphone, talk to a passive device, say a tag. Now, IoT is all about connected devices. So if you are able to make your home devices as active or passive devices so that they can communicate to each other, you can achieve IoT to a larger extent. It is useless if devices talk to each other and do nothing beyond that. It is useful only if they are able to pass useful information and create alerts in case of any deviation. Can NFC make it happen? Then the answer is ‘Yes’. So can NFC help in building IoT? The answer is again ‘Yes’.
Is NFC IoT? The answer is ‘No’. NFC is a technology using which we can build IoT. In fact, NFC can make IoT happen with the help of devices.
How can I start to learn BI? This question is quite vague in many aspects. Firstly, it doesn’t tell if the person is from technology field or some other field. Secondly, it doesn’t reflect the age and experience of the person asking this question. Because, it will make a lot of difference if the person is having technology background or not. It also makes a big difference if the person is totally a fresher or having some experience. In fact, this question itself leads to a tree structure having multiple branches and sub-branches. And unless you get to know the answer to those queries properly you can’t answer to this question How can I start to Learn BI?
Still, I feel, if the person has this query, it is important to answer it. And if I have to answer to this question, I would go this way. I think it is better to understand where you stand in technology right now before answering this question. There are two scenarios. Firstly, if you belong to technology, start at home. Understand your business needs and discuss with what kind of dashboards would they like to have in place to make quicker and better business decisions. In case, a BI tool is already in place in your organization, study it properly and how it is benefiting your business.
How can I start to learn BI?
Secondly, if you are not from technology, then get into technology first and see what all technology does for business. Because, when you understand how a core business application like an ERP functions only then you can understand the gravity of any BI tool or BI outcomes for a business. There could be many more scenarios, in fact. If you are having the same query How can I start to learn BI? And your scenario is different, you can directly post your scenario in the comments section. I would be more than happy to reply to your any such kind of queries.
– Name and title of person(s) answering questions
Bob Spurzem, Director of Product Marketing, Archive360
– Archive360 recently announced your Archive2Anywhere Digital Safe edition. Could you tell me a bit about the solution? And, are you finding there are a lot of customers on this platform looking to move away from it, and if so, why?
Digital Safe is a hosted email archiving platform that successfully targets the financial services market that is regulated by the SEC and FINRA. Beginning in the 2000 era, the SEC issues new rules that required all of its Broker-Dealers members to keep a copy of all electronic communication, including email and instant messaging. Digital Safe (under the Autonomy Zantaz company name) was one of the first companies in this new market. The other was Iron Mountain. Remember, that in 2010, Autonomy acquired the Iron Mountain electronic archiving assets, so in effect Autonomy possessed both Digital Safe and Iron Mountain hosted email archiving assets, totaling 100’s of PBs of email compliance records.
Fast forward to 2016/2017, the email compliance records comprised of Digital Safe and Iron Mountain are under the ownership of HPE and are being sold under the single Digital Safe brand name.
The technology used in the solution dates back to 2000 and is aging. Customer report frustration with discovery performance, support, and overall cost. And in general terms, customers are looking for new options for storing the email records that the SEC requires them to preserve.
It is this customer demand that we (Archive360) are starting to see. Starting in late 2016, financial service companies approached us about migrating the email archive data currently in Digital Safe to a new hosted email archive platform.
– In addition to Digital Safe, what other platforms are customers looking at to leverage for their legacy email archives?
The market for financial services email compliance archiving is a highly specialized market that is served by HPE Digital Safe. Other platforms that also address this market are Mimecast, Proofpoint, and Smarsh.
– What role are regulatory compliance and eDiscovery playing in the increase of enterprises seeking to migrate their email out of legacy archives?
As a factor causing customers to migrate legacy archives, performance dominates. Legacy email archiving platforms such as Digital Safe were designed over 17 years ago, and generally, lack the performance and functionality customer expect from new platforms. Digital Safe is further challenged by multiple changes in ownership in recent years, which complicates product development and support.
– Other factors in play?
Cost is a major factor. Recent advances in storage technology have greatly reduced the potential cost of hosted email archiving. New “cold” storage solutions from AWS and MS Azure, for example, cost as little as $0.01 – 0.02 per GB per month – 10x-20x cheaper that current solutions.
– Cloud vs. on-premises?
Cloud archiving is preferred over on-premises archiving for email compliance archiving and this is true for Digital Safe, which has always been a hosted solution.
– What advice would you offer to an IT, compliance or legal professional evaluating potential long-term solutions?
If you are currently a Digital Safe customer, new migration technology makes it possible to migrate legacy email archives currently hosted in Digital Safe to new archiving platforms. New archiving platforms benefit from advanced technology that offers improved discovery and reduced total cost. As always we recommend you evaluate any new platform carefully.
Though there are a number of project management methodologies, not all fit into Agile Project Management Methodologies. While you adopt the Agile approach, it is important to understand how to start, conduct and finish a project in that prospect. The top most priority, as per first principle is to satisfy the customer through an early and continuous delivery of valuabe software. As I always recommend, a software is useless if it does not cater to business needs. The sole purpose of a software is to enhance business process thereby saving time, money, and manpower. It should always aim to add value to business.
When we discuss Agile Project Management, let us look at Principle number two. It says we should welcome changing requirements howsoever late they come during ddevelopment. Remember that if a change is adding a big value to customer, go for it. It talks about a non-rigid approach. Principle number three mentions about delivery. It says you must deliver working software frequently. This iteration can vay between a fortnight to a month. The shorter the timescal, the better it is. But remember, there has to be substantial value in the piece you are delivering. It should not be just for the sake of it.
Agile Project Management Methodologies
The next principle in agile project management talks about collaboration. It says business key users and developers have to go hand in hand throughout the project development phase. In fact, I would add quality to this from the latter end and management from the former end. The next principle talks about space. You need to provide space to your team members. Only then you will get what you intend to.
This is a beautifully curated article. I would recommend every one who has interest in project management must read it. In fact, it will provide great insights for agile project management methodologies. In fact, the article is quite simple to read and adopt.
PMO Advisory is a PMI (Project Management Institute) global education provider i.e. PMI® R.E.P. It provides training in various streams. These include Project Management in Portfolio (PfMP®), Program (PgMP®), Project (PMP® and CAPM®), Risk (PMI-RMP®), Agile (PMI-ACP®, SCRUM®), Project Management Office (PMO) and Organizational Change Management (OCM). The new on-site training and coaching program aims to enhance an enterprise’s capabilities through a unique combination. This unique combination training includes best practice frameworks of Portfolio, Program, and Project Management. This way, PMO Advisory will be able to empower these organizations to overcome those challenges.
PMO Advisory names it as Triple Play Professional Training. In fact, this unique combination of Portfolio, Program, and Project Management is a wonderful fusion of management frameworks. There was no single platform so far offering this unique combination. This, in fact, will overcome many gaps in project management training. The fusion of management frameworks from three different streams couples with a custom training program. Furthermore, this will transform and accelerate organizations in an optimal and efficient manner.
Prof. Te Wu, Founder and CEO of PMO Advisory says, “We are able to bring executives and governance to Project Management and Projects into alignment with organizational strategies.” Te Wu continues, “we can align and bridge the gaps between an organization’s Strategy, Projects, and Operations, alleviate dysfunctional team dynamics like poor communication, team in-fighting, and misdirection – all onsite through a blending of high-powered training and coaching with consulting insights.”
Te Wu adds further, “We can help organizations confronting these issues: too many projects and programs, poorly aligned projects with strategy, project inefficiencies and cost overrun, inadequate methodology, mismatched organization culture versus project culture, taking on disproportionate amount of risk, and poor discipline with project, program, and portfolio management. Through a combination of training, facilitated workshop, coaching, and providing common and best practices from consulting, we are in a unique position make significant improvements quickly.”
You can get further details of this unique training from PMO Advisory here.
It will be interesting to understand the functioning of Intellicta Platform. This is a new platform from TechDemocracy. Before that you may like to read the previous post on Intellicta release. Ken Pfeil who is a former CISO and currently Chief Architect, TechDemocracy says, “Even in large organizations, I found it particularly challenging to obtain a holistic view of the risk posture, because I was limited to piecemeal assessments coming from the tools I was using to protect the enterprise. That approach not only lacks objectivity, it fails to show the gaps that exist in protection. We’ve created a platform that breaks down those limitations and puts companies on a path to intelligent risk assurance.”
Therefore, it becomes important to learn how Intellicta Platform works. As we know, it is an open platform. In fact, it is easily customizable to align with an enterprise’s specific business requirements. It integrates whatever leading enterprise-class IT security technologies in use. The integration, in fact, is quite simple And thereafter, it immediately starts assessing the realistic effectiveness of these technologies. As a matter of fact, the emphasis is also on finding out the gaps and the quantification of risks. As and when an enterprise adds new security and risk tools in the organization to cater to their needs, they need to add it in Intellicta Platform. The platform will immediately assess and confirm if the new tools are capable delivering the outcomes to mitigate the cyber risks. In fact, it gives a comprehensive dashboard to see an overall cyber risk posture.
Intellicta Platform Is a Universal Framework
Intellicta Platform is a universal framework that takes care of your complete regulatory needs and security standards. These include NIST, ISO, HIPAA, IRA, SOX, and so on. In turn, it creares a comprehensive risk assurance progam. In addition, it keeps mapping and monitoring industry best practices. As a result, it finds out the gaps, if any, in regard to cyber risk and compliance.
Intellicta Platform, being an open architecture, is easy to integrate and support. The Risk Assurance Center that resides in the platform continuously monitors an enterprise’s unique technology ecosystem. The center keeps aggregating this data from the hardware and security tools. It then coorelates and analyzes this data to measure across regulatory requirements. It also keeps measuring enterprise’s own security and governance rules.
In the context of Intellicta Platfrom, Martin Kuppinger, founder and principal analyst, KuppingerCole says, “The cybersecurity risks organizations face are forcing them to invest significantly in cybersecurity technology, but what is missing is a platform to evaluate their overall preparedness and governed situational awareness.” KuppingerCole is an international and independent analyst organization headquartered in Europe. Marting further adds, “TechDemocracy is creating a highly ambitious and innovative software category. Its underlying conceptual framework will be a welcome addition to the marketplace, especially for larger enterprises with the need to correlate existing compliance and risk information into a flexible, unified and powerful risk assurance model.”
TechDemocracy launches Intellicta that is the first ever platform offering businesses a new paradigm in the assessment of Compliance, Security, Risk, and Governance Tools. In fact, it is first ever tool that provides this four-dimensional assessment in a complete manner. TechDemocracy LLC is a global frontrunner in providing cyber risk assurance solutions. Intellicta platform will help enterprises’ board of directions and C-suite teams fill the knowledge gaps across the four important functions. These four pillars are compliance, security, risk, and governance. The platform complies with all standards to create a framework of a globally universal level. In fact, it builds a risk assurance center that analyzes comprehensively the gray areas of existing cyber risk. Not only this, it also provides respective compliance solutions thereby offering a complete dashboard of enterprise risk spectrum.
Enterprises, in the current scenario, are facing a number of hiccups implementing a complete risk assurance program. This is because of the limitations of such platforms available in the market. In addition, another significant reason is the complexities in their cyber security and compliance assessment solutions. In fact, none of the tools available so far comply to a universal set of industry standards. This, in turn, causes limitations to create uniformity and objectivity in regard to situational awareness. It also becomes unable to consider all current and future business needs. Intellicta, as a matter of fact, will cover all such gaps thereby providing a holistic solution.
Srikiran Patibandla, CEO, TechDemocracy says, “Our DNA is rooted in cyber advisory and managed services, and particularly in identity and access management. Building on that core, we made an investment to fill a gap that we see worldwide—the need for a management platform that enables senior executives to evaluate, measure and governs the overall risk and compliance situation of the enterprise.”
Intellicta Platform Cyber Security Solution
Intellicta provides a real-time situational awareness information in a single dashboard. This dashboard covers all possible cyber risks across the business. In fact, it also quantifies risk score and financial exposure. Hence, it is capable enough to provide not only the risks but also their value in terms of money, time, and reputation to the business.
Gautam Dev, global managing principal, TechDemocracy says, “CISOs have been working hand in hand with other business functions to implement cybersecurity solutions, but for those accountable to boards of directors for governance — CROs, CIOs, CEOs and CFOs — what has been missing until now is a way to evaluate their performances collectively against the business objectives and to create one common picture of their risk situation.” He further adds, “Intellicta enables senior decision makers to assess and clearly communicate where the enterprise stands versus industry best practices and standards, pinpoint inefficiencies, prioritize risk investments and continually track progress.”
If I think of 5 great IoT initiatives of 2016, the top ones that come to my mind are below. There would, definitely, be more to mention. The IoT initiatives, logically, fall into two categories, in my opinion. Firstly, there are end consumer or home segment IoT drives. The second category belongs to Industrial IoT initiatives. Both are equally important in our life. In fact, both intend to make smart cities. And as we all know, smart cities comprise of smart homes, smart industries, smart offices, smart hospitals, smart roads, smart infrastructure, and so on. All this leads to smart governance and hence smart cities. A collection of smart cities builds a smart nation.
5 Great IoT initiatives
Let us list below the 5 great IoT initiatives of 2016:
- Google Home: With its release in November 2016, probably Google has come out with one of the most wonderful innovations. If you remember Amazon Echo, Google Home is simliar to this. But in a way it is much beyond what Amazon Echo does. This tool will empower you to easily use your IoT smart home devices.
- Xively ProductLauncher: Xively ProductLauncher evolves in September 2016 by LogMeIn. In fact, it is an IoT interactive design tool. It creates a new horizom of IoT projects modelling. As a matter of fact, it is a tool that is going to help many upcoming ioT projects and launches. There is a huge cost saving for industries while using Xively ProductLauncher.
- Android Things: This is a new IoT operating system from Google. Though it is a makeover of Brillo, but it has a lot of innovative capabilities.
- Amazon Dash: Amazon Dash came into existence in May 2016. This is a smart button that is completely and easily programmable. It will help developer communities to easily control connected devices.
- Cisco Industrial Network Director: As the name suggests it is an IIoT product. In fact, it provides a full visibility of any industrial network howsoever large it may be.
Hope these 5 great IoT initiatives of 2016 help in transforming the world in a meaningful manner. I feel they will in one way or the other. Would like to know reader’s views on the same in comments section.
A project manager is nothing but a facilitator to his teams. Agree? If a project manager doesn’t care for his teams, the same will apply vice versa. The teams also wouldn’t care about the project and project manager. Let us look at 5 Project Management Lessons from Luxe Amenities that you get aboard Emirates. Remember that what you give, you get in return. Interestingly, if you treat each project as an overseas flight, you need to treat your teams as passengers aboard. You, as a project manager, has to ensure that passengers aboard don’t carry a jet lag, lack of space, and improper teammates. All this may cause traveler a great amount of discomfort. And the straight impact will fall on project thereby causing disruptions and risks. Let your teams not worry about any of such issues while working on a project. Make your project as enjoyable as possible.
One of the important 5 project management lessons is to Personalize every teammate’s project journey. You let them know your demands and guidelines and then don’t restrict them to drive the project in their own way. The deliverables have to come in time. Which way, let it be their call.
5 Project Management Lessons from Emirates
5 project management lessons that you can adopt from Emirates are:
- Privacy: Retain every team member’s privacy. In fact, don’t barge into their privacy zones. Interestingly, the more you let them fly free, the more heights you attain in your project collaboratively.
- Sleep: Give them some rest time while calling them for long work hours. Definitely, no project works 9 to 5. There are moments and instances that call for extended hours. Provide them a comfort and space where they can have a nap to work afresh.
- Warmth: Keep your project alive with warmth. Don’t let it go cold and unresponsive. Let each person’s energy work in the same direction to achieve your results faster.
- Entertainment: If you are creating moments of anxiety and unrest for them, you are also responsible for creating moments of entertainment.
- Stress: Keep them stress-free throughout. In fact, bring some lighter moments in between. Share with each other about your families, friends, and life.
I am sure, these 5 project management lessons will help you in your project journeys. In fact, do share your experience. Even if you agree or not. As a matter of fact, I would love to listen from project managers from various parts of the world.
Deloitte Malta plans to go all digital. Hence it is taking Digital Strategy and Transformation as its top priority. In fact, this begins with the launch of Deloitte Digital. This is a one of the brand of repute that belongs to the organization wide network. This network also has member firms as its integral part. The aim is to focus on business transformation and technology implementation thus building world-class capabilities of a digital agency.
Malcolm Booker, Deloitte Malta CEO, says, “Digital is enabling business transformation at an unprecedented rate. It is impacting business models and redefining the way companies interact and engage with clients, while also becoming an intrinsic and essential part of their service offering. There is no doubt that those companies that do not leverage digital to their advantage will ultimately lose out to competitors who do.”
He further adds, “We envisage major opportunities for Deloitte Digital in Malta and beyond, as clients look to us for guidance on how to counter the disruptive forces that are challenging their business. This belief led us to acquire the Alert Group, in order to be able to hit the ground running when it comes to offering a top-notch digital service offering.”
Furthermore, he elaborates, “We are now fully committed to building upon the considerable experience of the existing digital team in providing the necessary investment and resources for a fully-fledged digital agency worthy of the Deloitte Digital brand.”
Deloitte Malta Goes Digital
Claudine Cassar, the founder of Alert Group and Deloitte Malta Digital and Technology Leader says, “With the digital revolution, industries are facing many new challenges and opportunities. The launch of Deloitte Digital will combine our digital and creative skills with the industry expertise we have built up over the years. The Digital team will be offering a comprehensive range of services for organisations who want to make effective use of the internet and advanced technologies in order to grow their business.”
She further adds, “The Deloitte brand is well known in the region and has an excellent reputation. This, combined with our digital expertise has helped us make inroads in the Gulf, where there is massive business potential. It certainly is not easy to receive a digital accreditation from Deloitte and it was really a very proud moment for us when we did. A whole new world of opportunities has opened for us.”
Walmart is the biggest retailer and employer in the world. It has more than 20,000 stores in around 30 countries. With the fast changing trends in technology and businesses, and to cope up with its business requirements, it is transforming hugely. The company is in the process of creating the biggest private cloud in the world. It aims to process more than 2.5 petabytes of data every hour. Surprising? Yes, of course. What a huge setup it is going to be. It seems ‘biggest’ is synonym with Walmart in all aspects of business and technology. Now, when a business plans to churn out so much of information, there has to be a team deciding what is the intake of data to churn out so huge information every hour.
Definitely, real-time analytics, intelligent dashboards, and timely alerts will be on the top of agenda. Walmart is creating its Data Café. It is going to be a state-of-the-art analytics hub within its Bentonville, Arkansas headquarters. There are more than 200 streams of internal and external data. It includes 40 petabytes of latest transactional data. In fact, modelling, structuring, and visualization will be taking place in a rapid manner. As a matter of fact, all teams are welcome to throw any problem that they are facing in business. Any such problem goes to the analytics experts in Walmart’s Data Café. The expert team works on the solution in a faster manner that is visible on the centre’s touch screen they call as “smart boards”.
Walmart Data Cafe
Senior Statistical Analyst Naveen Peddamail, Walmart says, “If you can’t get insights until you’ve analyzed your sales for a week or a month, then you’ve lost sales within that time.” He further adds, “If you can cut down that time from two or three weeks to 20 or 30 minutes, then that saves a lot of money for Walmart and stopped us losing sales. That’s the real value of what we have built with the data café.”
It is really going to be quite exciting, challenging, and collaborating atmosphere at data Café in Walmart helping business take a new leap.
CenturyLink Inc. is collaborating with Cloudera Inc. for a new Big Data-as-a-Service (BDaaS). While CenturyLink is a global communications expert, it seems to be a perfect combination with Cloudera. Cloudera, as we know, has a stronghold on Apache Hadoop analytics systems. As happens in other BDaaS initiatives, the two aim to empower enterprises with Big Data Analytics to have an edge in the global markets. It will create competitive business advantages without big investments. Because with BDaaS businesses will not require recruiting data scientists and developers on their rolls. The expertise will come along with this service as a complete package.
In a way, BDaaS saves a big investment on infrastructures like servers, storage, backup devices, and data center. In addition, it also takes off your burden of hiring high-value positions like Data Scientists and developers. Furthermore, the whole thing comes as a complete service. It thus saves a lot in your capital investment and operational cost. Rather, the talent that comes along with BDaaS brings an expertise of consulting, training, and education to the organization availing it. In fact, it also saves a lot of time for initial setup and deployment. It is now a question of just configuration and post-deployment support.
In this context of the release of BDaaS, Cloudera CEO Tom Reilly says, “Cloudera and CenturyLink’s innovations with Big Data analytics can drive true business transformation at a time when many companies are finding it hard to harness the power of increasing volumes of data. He adds further, “Companies that break down their information silos are finding themselves better positioned to capture new market share and deliver superior customer service.”
BDaaS Big Data-as-a-Service Is a Big Revolution
Similarly, CenturyLink says, “CenturyLink BDaaS is enhanced by adding data and advanced analytics consulting services supported by a deep bench of Cloudera-certified data scientists and Cloudera Hadoop solution administrators, developers and architects.” It goes further saying, “The solution, bolstered by CenturyLink’s global high-speed network connectivity, provides storage, processing, and management components deployed on CenturyLink Cloud Bare Metal servers. The bare metal private cloud environments, which allow customers to achieve faster time-to-market, improved data protection, and rapid public cloud scalability at a lower cost, have been certified by Cloudera as an architecture that meets its rigorous criteria for ensuring optimal performance and efficiency.”
In addition, James Curtis, Research Analyst, CenturyLink says, “With numerous vendors offering components for Big Data solutions today, a key to achieving success for customers is services and support. Providers that offer data and analytics consulting, deployment support and customized infrastructure and application solutions, should be able to deliver enhanced strategic value for customers.”
In the nutshell, BDaaS is going to revolutionize the business in an entirely new spectrum thus shifting the focus on fast adaptability and usage.
Big Data Analytics In The Retail Industry can help any online retail business to a great extent. Online retail stores must understand customer behavior in various parameters. The same understanding is equally important for the prospects that are not yet their customers. Though walk-in is important but more important is conversion. A high walk-in or check-in with low sales means the business is able to attract visitors from outside but once they enter the site, they don’t find it lucrative enough for purchase. The reasons could be many. One needs to understand it deeply so as to take appropriate measures.
The best moments of sales for retailers are holidays. These holiday periods compensate the down periods during the year when there are no sales. In fact, holidays help a lot in boosting the sales and profits. That is why holidays are quite crucial for retail business. It helps them in capitalizing on the season to its fullest. And even if during these periods if they fail to capitalize, it creates a lot of other failing factors. Interestingly, on the other hand, if there is a boom in sales during this period, it covers up their risks and losses. That is the reason for retailers to find all kind of pointers to boost their sales. Big Data Analytics in the retail industry become quite handy in that aspect. Right?
Big Data Analytics in the Retail Industry
In fact, Big Data Analytics in the retail industry not only helps them in increasing their sales but also to find out a large number of interesting and realistic points. It caters to their different purposes, in fact. As a matter of fact, these analytics solutions can also give great insights on success and failure. For this, you need to have the right set of tools, strategies, and manpower to draw full benefits of Big Data Analytics in the retail industry. Only then you can have a cakewalk on the success path.
Transformation is a tough task. In fact, it never happens overnight. It takes a lot of learning, understanding, willingness, desire, determination, and discipline to transform in life. Creating a Transformational Project Manager is a tougher job, as a matter of fact. Rather, it does not happen on its own. You need a spark to transform. And that spark might come from anything. It could be a person, instance, or an inner voice. Or, a combination of all the three. You can’t create a transformational project manager further in your team or peers if you are not the one yourself. That is like bringing a change by 360 degrees. Usually, you will not find project managers even having an urge to become a transformational project manager. There might be sharp, smart, and accurate project managers, though. But even they don’t fall in this category. It is a different class altogether.
Well, If you feel to be in the category of transformational project managers, let us play a quiz as below. If you answer yes, add 1 point to your score. Similarly, if you answer no to a question, then subtract two points from your score. Your overall score might be negative. Don’t worry about that. Be realistic and accept the reality on the face of it. Only thing is that in that case, you will have to work really hard to get into this category. So, here we go:
Transformational Project Manager Check List
- Are you a change seeker?
- Do you keep a close watch on your policies and procedures?
- Do you raise a voice for making a change in your policies and procedures?
- Do you maintain revisions to these policies and procedures?
- Are you a changemaker?
- Did you observe any major change in your working style in last quarter?
- Did this change ease your and your teammate’s comfort level?
- Are you able to bring change in your teammates working style?
Be honest in your replies. Because only then you will be able to assess if you are a real transformational project manager.
Greece’s Theotokos Foundation Turns to Metalogix and Orthology for Microsoft Office 365 Operations ManagementBackup and Recovery, Data protection, Disaster Recovery, Metalogix, microsoft office 365, Office 365, SharePoint, Virtualization
Non-profit to Next Leverage Metalogix for SharePoint Cloud.
The Theotokos Foundation has deployed Metalogix’s Essentials for Office 365, in order to regain control and streamline the ongoing management of its client services and internal operations content. In doing so, the non-profit can better focus on its core business goal of serving more than 300 learning and developmentally disabled clients and their families in Greece.
Recently, the Theotokos Foundation identified the need to clean up and regain control of its vast store of data spread across various applications. Its goal was to enhance productivity and collaboration. The first step was to find and migrate all of its data – from emails to online calendars, to all other client and internal operations data into Microsoft Office 365. It turned to its trusted advisor Orthology for the best solution from both a features and functionality standpoint, as well as pricing. Orthology recommended Metalogix right away. And, after a thorough review and testing (free trial), the Theotokos Foundation agreed it exceeded expectations, and offered far better capabilities, was less complicated to use and delivered a much higher ROI than any of its competitors.
It first leveraged Metalogix Essentials to find and then accurately migrate its content into Office 365. Once this was complete, its next goals were to streamline management of the environment, as well as ensure data protection and disaster recovery (DR) capabilities. Again, it turned to Metalogix Essentials. With the solution, Theotokos automated the provisioning and management of its Office 365 users and licenses (currently 200 licenses). It now also uses Essentials to simplify day-to-day administrative tasks. And, Essentials gives them complete backup and granular restore capabilities for Office 365 data – protecting against everything from an accidental deletion to a serious disaster event.
Greece’s Theotokos Foundation Turns to Metalogix and Orthology
“Metalogix Essentials provided just what we needed to protect our vital information, in an easy to deploy and manage package,” said George Koumarianos, IT Manager, Theotokos Foundation. “Moreover, right away we could see that it was much more flexible than any other solution we evaluated. With Metalogix Essentials in place, the Theotokos Foundation now enjoys complete peace of mind that our data is highly available, reliably protected and ready for fast and simplified recovery if needed.”
Now, having completed its Microsoft Office 365 initiative it is planning for its upcoming SharePoint cloud project. And with Metalogix having exceeded expectations, Theotokos plans to turn to them again. “Once our users have been trained on SharePoint, we will also use Metalogix to optimize and protect our SharePoint data in the cloud,” said Koumarianos. “Metalogix has more than proven itself across our Office 365 environment, and we will without hesitation deploy it to support our SharePoint environment as well.”
A Theotokos Foundation case study can be read here, should you wish to learn more.
In today’s world of internet and digitalization, any startup is a sort of tech startup. As the startups are mushrooming on a regular basis, it is essential to understand the most critical stumbling blocks of startups. Why I call almost every startup as a tech startup, you will come to know a little later. The reason for this is mobility and internet. The startup might relate to hospitality, travel, medical, or food venture. But as most of them are online apps, they fall in tech category too. You can differentiate the stumbling blocks of startups in two categories. As a matter of fact, the first category is that of Generic or global causes. While the second one is a set of reasons varying case to case. We would be talking about the former category of key stumbling blocks of startups that fits all.
I remember a startup launching a contest on its portal. There were four prizes for the top 4 winners. Contrarily, the contest results were entirely different. Two of the five winners were getting the third prize. And rest were getting some gift vouchers. This was almost a violation of the rules and guidelines. Coming back to the key stumbling blocks of startups, I think, the most prominent are a lack of vision. In fact, startups forget to keep walking on the right track and start deviating quite easily. They lack concrete project charter and plans. The adherence to plans and timelines is missing. Rather, there are so much of changes that happen too frequently.
Stumbling Blocks of Startups
The next couple of biggest stumbling blocks of startups is mismanagement of finances and funds. A mismatch or gap between the inflow and outflow without knowing the facts is dangerous. It may lead you to a wrong direction. In fact, it can cause wrong financial decisions that could be quite harmful.
Looking at the current trends in the technology segment, 5 Top Technology Skills in demand for the next year would be as follows. The current trends show Project Management has been a top agenda during the year. A lot of aspiring learners opt to qualify such certifications. The certification like the one from PMI (Project Management Institute) helps them in getting relevant job. But on the other hand, there have been a number of upcoming trends that ensure those will be in high demand during the next year. These upcoming trends include Big Data Analytics, Cloud Migration (or in fact, cloud technologies), Digital Marketing, and Cyber Security. All these indicate to be 5 top technology skills in demand for the next year.
I feel, managing your projects will depend a lot on how you manage your people. Hiring right skill people is definitely a great skill. But managing them and getting the best out of them demands an altogether different set of skills. This is where the role of a successful project manager comes into demand. Similarly, if we look at current scenario, no business is untouched by big data. Every business is engaging with social media to enhance its outreach. Big Data Analytics, thus, is going to be a big ticket item in the list of 5 top technology skills in demand for the next year.
Businesses are migrating to cloud rapidly as it promises a lot of benefits. These benefits not only are in monetary terms but also in terms of manageability and security. You need less infra, space, and manpower when you migrate your data center to cloud.
5 top technology skills in demand
With the increase in business on internet (e-business), the demand of digital marketeers is at its peak. And, in fact, it will be one of the 5 top technology skills in demand for the next year. Finally, as the number of business transactions are increasing on portals and e-commerce sites, the security is becoming a major concern. It is also about the important information available online that needs a strong shield of security against the vulnerabilities and threats.
With the new year coming it is essential for analyzing the current year. Then we will talk about 5 new year resolutions essential for project management. It is equally important to understand what is gone well, what could have gone better, and what didn’t go well. For the things that you have done well during the year, you must ensure that the same will happen the next year. Sustenance is pretty essential in life for all good things we achieve in the profession. Secondly, for the things that could go better, build a learning spectrum to ensure that the same does not repeat next year. In fact, if you perform the same task again, it has to be in the first category. And finally, ensure that more and more results lie in the third category to keep your morale high during the year.
One of the top 5 new year resolutions is to identify your style of working. You must not have all the top qualities. But you would have a number of strongholds. Identify those. And keep them intact. On the other hand, identify your low streams and create a plan to convert them to high stream.
The second big ticket item among 5 new year resolutions is Optimize your team capabilities. For this. it is important to identify the potential and shortfalls of every team member. Then strategize to balance them out in a way that one person’s strength covers another team member’s weakness. Meanwhile, ensure to convert weaknesses to strengths through training, coaching, mentoring etc.
5 New Year Resolutions
The third of the 5 new year resolutions is quite tricky. You, as a project manager, must own your organization, team, work, customer, and so on. Own in terms of deliverance rather than expectations.
In the same way, own your customer. Be a part of his successes and failures. Share his pain to help him coming out of all failures.
And finally, when we talk about 5 new year resolutions, the magic word is CHANGE. Be the change, change with the change, and motivate others to change.
Customer Service is all about your relationship with the customer. It is what you tell the customer about your service or product and what you deliver. Rather it also depends on your post delivery commitments. It is always better to deliver more than what you commit to your customer than committing more and delivering less. Overall, your customer service depends on the successful acquisition of new customers in a consistent manner. Also, retaining old customers is equally critical. Your acquisition rate can be higher in the beginning of a business. But when you achieve maturity in business it is always the sustenance of existing customers that matters most. In fact, that gives you a higher potential to spend more in acquiring new customers. But this should always happen without any compromise with the service to the existing customers.
As a matter of fact, new customer acquisition at the cost of old customers is always harmful to the business. Losing your old customer at the same or higher pace than acquiring new ones is poisonous to your business. This is the prime mistake many businesses make without realizing its killing impact. And by the time they realize it, it is already too late. And ultïmately, they lose the race of survival in the market. Here are few beautiful quotes in relation to customer service:
- “Ask your customers to be part of the solution, and don’t view them as part of the problem. ” – Alan Weiss, Author “Million Dollar Consulting”
- “To keep a customer demands as much skill as to win one.” – American Proverb
- “Strive not to be a success, but rather to be of value.” – Albert Einstein
- “Customers may forget what you said but they’ll never forget how you made them feel.” – Unknown
- “Customer service is the new marketing.” – Derek Sivers, Founder CD Baby
If we observe carefully, Big Data is all about 5 Vs. The five pillars of Big Data are Volume, Velocity, Variety, Veracity, and Value. In fact, it is very important to understand each pillar very clearly. Otherwise, it would be like a black hole. As Dan Ariely says rightly, “Big Data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it.” I don’t think in today’s era of the digital age, any business can survive without it.
When it comes to any business data versus the big data volume, it is almost incomparable. In fact, it does not matter even if the organization is too large. The volume of the business data against the latter is insignificant. And, as a matter of fact, this comparison stays valid for all the 5 Vs we are talking about. Craig Mundie is absolutely right when he says, “Data are becoming the new raw material of business.” Another fact is from Pat Gelsinger “Data is the new science. Big Data holds the answers.” Pat Gelsinger is the Chief Executive Officer of VMware, Inc. and former Chief Operating Officer of EMC Corporation.
In this regard let us look at a very relevant quote. “With too little data, you won’t be able to make any conclusions that you trust. With loads of data you will find relationships that aren’t real… Big data isn’t about bits, it’s about talent.” – Douglas Merrill
“The world is one big data problem.” – Andrew McAfee, the associate director of the Center for Digital Business at the MIT Sloan School of Management (also known as MIT Sloan or Sloan.)
“We chose it because we deal with huge amounts of data. Besides, it sounds really cool.” – Larry Page, co-founder of Google.
I wonder if all team members in a project work like Bluetooth devices. And, in fact, it happens. Before we learn how to get Bluetooth working between devices, let us exemplify it. When developers and testers work on a product, it is simply a pairing between the two. Similarly, when a business analyst prepares CRD (Customer Requirement Document) there is a pairing between the analyst and customer. If you are able to understand this, it becomes easier to understand how to get Bluetooth working between devices. It is just a phenomenon of pairing and then working together in the desired manner.
I have a Bluetooth device Teewee connected with my Plasma television device. I can easily pair Teewee with my smartphone or tablet and play any video that projects on my large TV screen. Similarly, I have Bluetooth speakers that I can easily pair with my laptop, tablet, or smartphone to play music through it. The life has become quite simpler with the help of technology. Devices talk to each other in a much simpler and easier manner. Learning how to get Bluetooth working between devices is not a rocket science.
How To Get Bluetooth Working Between Devices
It is quite simple if both the devices in question are Bluetooth enabled and it is ‘on’. Any active Bluetooth enabled device searches for the other devices active within the permissible vicinities. There are active bt devices and similarly, there are passive bt devices. Active devices are smartphones, tablets, laptops etc. And passive devices are like Bluetooth speakers, Bluetooth printers etc. Any to bt devices need to ‘pair’ to sync with each other in order to talk to each other and perform desired operations. You can easily pair passive devices to an active device with the help of the active device. Once they are paired you can perform desired operations. I hope it is now quite clear how to get Bluetooth working between devices.
The new DNA of leadership is ideally an entirely a new journey for new age managers. They have a new set of culture and values. In fact, they provide a new definition of character and competence. As a matter of fact, trust is not thrust in their case. It is a point of earning rather than imposing. Rather, the new DNA of leadership talks about responsibility and capability. There is a direct connection between the two. Without the capability, you can’t own responsibility. And, in fact, without responsibility, all your capabilities are nothing but waste. In today’s world of competence, fair and flexible wins the race. The presence of both elements in a right mix is very important. Mere flexibility is not a point of elegance. Similarly, merely being fair in all your professional deals without any flexibility will lead you ṭo a dead end.
Feedback at every level and every juncture is a key element of the new DNA of leadership. Elon Musk is among the greatest world leaders. One of his quote fits well here. He says, “I think it’s very important to have a feedback loop, where you’re constantly thinking about what you’ve done and how you could be doing it better. I think that’s the single best piece of advice: constantly think about how you could be doing things better and questioning yourself.” Definitely, feedback has its own value. But at the same time, it is important to differentiate a fair feedback from a fake one.
New DNA of Leadership
“Until one is committed, there is hesitancy, the chance to draw back– Concerning all acts of initiative (and creation), there is one elementary truth that ignorance of which kills countless ideas and splendid plans: that the moment one definitely commits oneself, then Providence moves too. All sorts of things occur to help one that would never otherwise have occurred. A whole stream of events issues from the decision, raising in one’s favor all manner of unforeseen incidents and meetings and material assistance, which no man could have dreamed would have come his way. Whatever you can do, or dream you can do, begin it. Boldness has genius, power, and magic in it. Begin it now.” says Johann Wolfgang von Goethe. And this goes so true in the case of the new DNA of leadership.
Social aspirations are changing quite fast across all job roles. And, in fact, it is happening across thë globe. There are a lot of changes happening in recent times. As we see, there is a clearly visible paradigm shift in job roles. Lifetime employment is now no more a prominent aspiration among thè younger generation. In fact, not many of the brilliant engineers aspire for a high-salary job. Ïnstead they plan to start with a high-risk zone of their own venture. And a lot of them are successful in their journey. As a matter of fact, starting your career as a Founder cum CEO is quite fascinating for them. In addition, everybody is vulnerable. Rather, job security is secondary when the business is losing permanence. In fact, social aspirations are acquiring a new meaning. Rather, we are living in a world of changing paradigms.
Social Aspirations Are Changing Fast
“A new scientific truth does not triumph by convincing its opponents and making them see the light, but rather because its opponents eventually die, and a new generation grows up that is familiar with it.”
― Max Planck, Scientific Autobiography, and Other Papers. This is what happens to social aspirations. Similar reflections we see in this quote – “The present convergence of crises––in money, energy, education, health, water, soil, climate, politics, the environment, and more––is a birth crisis, expelling us from the old world into a new.” ― Charles Eisenstein, Sacred Economics: Money, Gift, and Society in the Age of Transition.
But that is not all. In fact, social aspirations were there in thë past in the professional world. And they will stay in future too. “We’ve forgotten much. How to struggle, how to rise to dizzy heights and sink to unparalleled depths. We no longer aspire to anything. Even the finer shades of despair are lost to us. We’ve ceased to be runners. We plod from structure to conveyance to employment and back again. We live within the boundaries that science has determined for us. The measuring stick is short and sweet. The full gamut of life is a brief, shadowy continuum that runs from gray to more gray. The rainbow is bleached. We hardly know how to doubt anymore. (“The Thing”)” ― Richard Matheson, Collected Stories, Vol. 1
The world is changing fast. It is important to understand the changing paradigms of job roles. A few decades back there was a fast emerging new concept. There was a new paradigm in job identification. Like the white collar, blue collar, and pink collar jobs. There was a clear-cut distinction between them. But gradually the sanctity of these collars is vanishing. In current times, a blue-collar worker has all kind of chances to upgrade to a white collar supervisor. This can happen if he carries the will and strength to reach to that level. Contrarily, a white collar executive has no reasons in this changing scenario to maintain a gap between him and workers. If there is a shortfall of a worker on a critical assembly point, the executive has to drop his white collar and wear the blue collar for the day to fill that gap.
Michio Kaku, in the context of changing paradigms of job roles, says – “The job market of the future will consist of those jobs that robots cannot perform. Our blue-collar work is pattern recognition, making sense of what you see. Gardeners will still have jobs because every garden is different. The same goes for construction workers. The losers are white-collar workers, low-level accountants, brokers, and agents.”
Similarly, Tom Peters explains the changing paradigms of job roles, “The workplace revolution that transformed the lives of blue-collar workers in the 1970s and 1980s is finally reaching the offices and cubicles of the white-collar workers.” The same way Sherrod Brown says, “We’re losing all kinds of white-collar jobs, all kinds of jobs in addition to manufacturing jobs, which we’re losing by the droves in my state.”
Changing Paradigms of Job Roles
As a matter of fact, in today’s scenario, all across the globe, changing paradigms of job roles reflect certain common aspects. In fact, we need to understand it well. Either the collarless jobs are increasing or the demand is high for professionals weâring multi-collars.
Mastering State Transition Testing Technique is like learning to drive a car. You need to be patient while learning and practicing. But once you become proficient, everything becomes quite easy. It is a dynamic testing technique, unlike other techniques we use. This technique is quite beneficial in two conditions:
- When you define the system in a finite number of states, and
- The rules of the system control the transition between these states
Hence, the technique is useful where you consider every transforming feature of a system as a state. In such cases, the rules of thë software will govern these transformations. There are three key components in State Transition Testing. These are Original State, Action, and Final State. So whenever there is a transformation from an original state to final state, there is an action or event. And definitely, there is an input that triggers this action or event which results in an output.
State Transition Testing
Think of a scenario where you mark your attendance in your organization with the help of a swipe card. And, in fact, the same card provides you accessibility. If you swipe your card at entry, it marks your ‘in’ and automatically opens the door for you to enter. Similarly, at the exit when you swipe the same card it marks you ‘out’ and opens thë door automatically for you to move out of the building. Now let us understand State Transition Testing with the help of following steps:
- You are at the entry gate.
- Swiping your card marks your attendance and opens the door for you to enter the office.
- You enter and the gate closes after the stipulated time.
- You slide your card outside to your friend Sam to use the same card again for his entry.
- Sam swipes your card at the same entry point.
- This time there is no action and the gate does not open.
You swipe your card first time. It marks your attendance and lets you enter. Next time, you try the same action through Sam but this time it doesn’t open the door. So this time the transition, that is causing the change in state is the earlier entry.
Image source: testing excellence
There is a deep connection among test cases, test scenarios, and SRS. The story begins with SRS i.e. Software Requirement Specifications document. Preparation of SRS begins with a deep analysis of business. This includes exhaustive discussions with business process owners. It also includes different business process walkthroughs. As a matter of fact, any shortfall in SRS leads to a bigger disaster than any glitches happening later. Once SRS sign off takes place, the relevant team starts building test scenarios. And, then, test cases emerge out of these various test scenarios. When the testing team is ready with test scenarios they identify overall scope of the testing. On the basis of this, the QA team prepares a detailed test plan. Then the plan goes to execution. The team responsible for its execution prepares test cases.
Actually, there are two parallel activities that are taking place at this juncture. While the QA team is busy with documenting test cases, the development team begins the SDLC (Software Development Life Cycle) with the coding phase. In a waterfall model, these two activities might be sequential. But otherwise, in agile methodology, by the team each code chunk is ready for testing, the QA team is ready with the test cases by then. This mechanism shrinks the overall tïme of execution of the project.
Test Cases, Test scenarios, And SRS Relationship
While in the waterfall scenario, test phase comes after development phase, in agile, development takes place in iterations. Similarly is for testing. Each iteration clears development and testing in this fashion. Hence, as is clear, in the former case, the overall time increases because the testing begins when coding finishes. The development team hands over the complete code to the QA team. The QA team then starts studying and preparing test cases.
In the nutshell, test cases are all about ‘How’ of the business. If you are ensuring to drive a business with the help of a business application, test cases ensure to validate each ‘how’ related to every process of the business.
Every application that you develop has some fundamental requirements. These requirements arise from business and user. Let us look at it closely to understand clearly what is a test case in software testing. It is essentially very important for the software testing community to understand it clearly so as to ensure the successful launch of any software that their development team creates. Actually, any software development is a collaborative effort. It includes mainly three key stakeholders for the right kind of development. The number of stakeholders increases further when it comes to deployment of the application.
The first set of key stakeholders is the business analyst and customer. If these two don’t marry well, it creates a lot of trouble later. A business analyst should never hesitate in double assuring the customer requirement before documentïng it. In fact, he will have to pass through all possible business scenarios to ensure capturing of right requirements. Now, when it comes to development, whether you follow waterfall approach or scrum methodology, understanding of what is a test case is very crucial. So the second set of key stakeholders is the customer and developers. And the third set of key stakeholders is a tri-party association. It comprises of the tester, developer, and customer. So as we see, the customer is an omnipresent entity throughout this crucial journey of requirement gathering, development, and testing.
What Is A Test Case
As a matter of fact, customer plays the biggest role in all the phases of any development. The higher is the level of engagement with the customer, thë less are the troubles. Now, about what is a test case in software development and testing. A test case, basically, is a set of conditions that a tester will determine to ensure that the system under test satisfies as per the actual requirements so as to works correctly. This process of developing test cases helps in finding problems in the requirements or design of an application.