Gartner came out with its annual list of the top 30 countries for offshore outsourcing. Despite my complicated relationship with lists (totally sucked in and deeply skeptical), I’ve found the Gartner lineup an interesting window on the global economy over the years. Vietnam, a “best-kept secret” just a few years ago, for example, is now a player, attractive for its English language skills and cultural affinity to the United States.(!!) In Russia, where the former Communist regime fostered a seemingly bottomless pool of brilliant computer scientists and mathematicians, the entrepreneurial class now driving IT outsourcing just wants the government to stay out of its way. Mexico leads the Latin pack, despite the escalating drug violence there.
Per usual, the Stamford, Conn.-based consultancy divides the world of offshore outsourcing into three parts: Americas; Asia/Pacific; and Europe, the Middle East and Africa — EMEA, for short. I’m writing a story on who’s in and who’s out. Spoiler alert: Seven developed countries you know well are off the list. The booting of the seven stalwarts notwithstanding, the general outlines of the offshore outsourcing world really don’t change much from year to year. India is the undisputed leader in offshore IT outsourcing, with China at its heels.
But as Gartner analyst Ian Marriott pointed out to me in our interview about the top 30, a game-changer is looming: cloud computing.
As more IT work is driven through the industrialization of computing, the cheap labor that is such a compelling reason to ship IT work offshore, of course, matters less. Automated work potentially could be done from anywhere, including the United States. That’s a dynamic that will affect the IBMs and Accentures of the IT provider world, with their huge investments in India, as well as the indigenous offshore providers.
As customers map their IT needs to a global economy, offshore providers will need to anticipate not only which services will be needed, but also how much of the work is commoditized and thus potentially could come from anywhere, Marriott said. Some providers will take the niche route.
“We’ll see them looking to build very focused skills, customized for the marketplace,” Marriott said.
As for who will rule the cloud, he’s betting on China to leverage its manufacturing and process capabilities to become a world force in industrialized IT. Soon. Look at what China has managed to accomplish in solar power. Unlike language skills, which can take a generation or more to improve, technology improvement can happen fast. American tech titans, are you listening?
Write to me at firstname.lastname@example.org.
Public cloud computing carries with it great promise and great risk. Enterprises are hesitant to get on board, despite continuous advice last year from industry experts to embrace it rather than ban it. Departments and divisions are provisioning their own IT services from the cloud with a credit card — a shadow process that in itself is a risk.
I’ve used the WikiLeaks episode in this blog as a jumping-off point to explore risk in the public cloud, and I now see that it’s just the tip of the iceberg. There’s a lot more under the surface.
The public cloud is nothing if not complex, and “complexity is the enemy of security,” said Steve MacLellan, senior vice president for Enterprise Architecture Financial Services at the Fidelity Technology Group in Boston. That complexity is one reason why the buzz at the start of 2011 has been all about the private cloud.
Well, maybe not all. The public cloud is here, it’s huge and it’s not going away. Hence, organizations that invest the time, money and personnel into building a private cloud are still going to have to grapple with a public cloud strategy, according to Rich Mogull, analyst and CEO at Securosis LLC in Phoenix, and half of the Cloud Security Alliance’s (CSA) Editorial Working Group.
“The biggest risk at the enterprise level is losing control through lack of a cloud strategy,” Mogull said. “We know of organizations that didn’t have policies or controls in place and found themselves with extremely important and sensitive data stored in a weakly secured cloud service.”
Working with the CSA, Mogull is responsible for guidance standards and overall coherence of guidance documents. In other words, he helps make a complex issue less so. It’s no easy task. In developing a list of the top 10 threats to enterprises for SearchCIO.com, I’ve come across dozens of public cloud computing risks in lists compiled by senior executives like Fidelity’s MacLellan and by global organizations like ENISA, the European Network and Information Security Agency. The threats are like trees with branches and buds.
The CSA has been at the forefront of this thinking. The group released guidance on securing the public cloud last year that is being used by corporations around the world. Last September the group invited people to comment on its guidance for an upcoming Version 2.0.
The CSA’s thinking, IMHO, is sublime: Whereas many of the top threat lists roughly match up along such topical areas as security, availability and liability, the CSA’s list indicates that the WikiLeaks episode is a fair reference to risk in the public cloud, especially considering the distributed denial-of-service attacks that followed:
- Abuse and nefarious use of cloud computing.
- Insecure interfaces and APIs.
- Malicious insiders.
- Shared technology issues.
- Data loss or leakage.
- Account or service hijacking.
- Unknown risk profile.
We’ll be looking at the various public cloud computing risks — and mitigation strategies — on SearchCIO.com in the coming weeks. As much as a CIO might wish otherwise, the public cloud is complex, inherently risky and here to stay. But chin up: Defenses against those threats can be more robust, scalable and cost-effective.
In an effort to get enterprises swiftly and safely on board, the CSA will be running a one-day workshop as part of the RSA Security Conference in San Francisco on Feb. 13. Attendees will get a discount on the test for a Certificate of Cloud Security Knowledge, the first of its kind.
Being the lowest-cost service provider of offshore IT outsourcing pays off in ways that go beyond being — well, the lowest-cost IT service provider. Rock-bottom prices attract new customers, who in turn bring capital that improves the infrastructure and, in time, the quality of the outsourcer’s labor pool. The service provider matures, adding new services, and eventually is no longer the lowest-cost provider. Call it the virtue of starting cheap.
That point was driven home to me in an interview with Gartner analyst Ian Marriott for an upcoming story on offshore IT markets. Take the example of Indonesia, a relatively new entrant to Gartner’s top 30 offshore countries that is rated by Gartner as poor on government support and only fair for its labor pool, but scores an “excellent” on cost.
“That strong cost proposition will be something that draws with it interest from other countries, service providers and also captive centers. Because they’re interested in the cost advantage, [service providers] will make investments. Those investments will bring in project management skills and process maturity, and it will start to raise capability, simply by those investments being made,” Marriott said.
Email me at Linda Tucci, Senior News Writer.
Ron Maillette is on his third CIO job since his retirement in 2002 from The Coca-Cola Co., where he ran IT for Coke’s food service and hospitality division, its largest standalone unit. Don’t tell him the CIO career is a young person’s game.
“Each position was as a CIO where the company was looking for leadership to create a growth strategy. I turn 65 this year, with no end in sight for employment opportunities,” Ron emailed me yesterday.
He was writing in response to my story this week on CIOs and age discrimination, a look at whether the CIO career is more vulnerable to ageism than other C-suite roles.
As might be expected with such a fraught issue, the reality is not given to simple answers. But it’s probably fair to say that IT executives come to the end of their CIO careers before they reach Ron’s age. Technology changes fast, the role constantly evolves, the revolving door still spins faster for CIOs than for other occupants of the C-suite: All these things conspire against a CIO career that extends into one’s twilight years.
If you are 55 or 60 years old and have the bad luck to be on the job market — especially this job market — “chances are diminished for finding a CIO job,” said Jerry Luftman, a professor of IT management and executive director of the Stevens Institute of Technology in Hoboken, N. J. Most CIOs in that position became consultants. The good news is that they are in high demand, he said. The Big Five consulting companies go after the Fortune 500 CIOs, or “magnets,” to capitalize on their large networks for snagging new clients. And the smaller consulting firms court CIOs from smaller companies to serve as mentors to their clients.
Nothing wrong with that, but it was nice to hear from someone like Ron, whose CIO career path certainly did not dead-end at age 55 or 60, and who has bypassed the consultancy route. From Coke, he went to work at Pacer Global Logistics, a large freight transportation and logistics business, and from there to NuCO2, a carbon dioxide gas distributor. Today he’s CIO of Education Corporation of America, an operator of private accredited colleges across the United States. I took a peek at his photo on the website and saw the Ron I met five years ago when he was at Pacer, only grayer on top and with a snow-white moustache.
“One thing I might add,” Ron wrote, “is that if you are a gray-hair, you are not only less vulnerable to repeat the same mistakes, but you are also better positioned to understand what new thing is old and vice versa.” Take VDI [virtual desktop infrastructure]. He jumped on that innovation early because of his experience with the dumb terminals of the ’70s and early ’80s, he said. “We just have a lot smarter ‘terminal’ now and we can manage it with a lot less resources.” It was obvious to an older CIO like himself that VDI was the “best of both worlds.”
Experience counts, he was telling me, just as it does in other C-suite positions. Maybe the real question for older CIOs, he said, is what one’s experience represents. “Is it one year on the job repeated 30 times? Or do we continually learn, embrace, grow; learn, embrace, grow … ?”
The topic of risk in the public cloud elicits a strong emotional reaction from IT executives. In response to one of my recent stories about the WikiLeaks episode, I heard from readers on both ends of the spectrum.
“WikiLeaks was not a public cloud scandal,” said a director at a financial services firm. Furthermore, so-called “experts” are turning acceptable use into a faux security risk that requires the assistance of — what else — consulting services, he said.
An IT manager said I hadn’t dug deep enough into the forensics of a public cloud gone bad.
“I think you’re ignoring a basic point,” he wrote. “Amazon and a few others pulled the plug on WikiLeaks under severe governmental pressure. The talk of ‘contravening the terms of service’ was pure hogwash. Amazon and the others knew pretty well what Wiki was doing; it gave them a lot of business and everyone was happy … till the government stepped in. If the government machinery decides to nab you (or me), no matter how law-abiding you are, it will find some excuse and some archaic law, invoke that and … zap.”
Is it 1984, 27 years later?
The financial services director is aghast that this “unprecedented concept — to prevent the Feds from coming in and shutting down the cloud!!!” illogically “builds fear into the service provider background check process which exists for very different reasons.”
Who’s right? You tell me.
The IT manager who suspects the government’s influence on private enterprise said his question about risk in the public cloud is this: “What is the security that I can get for the continuous use of the platform without the platform owner using some specious excuse to drop me? ‘Continued and Guaranteed Service’ is now a risk item that has to be examined seriously,” he said.
Would nefarious use of the same public cloud on which your data resides come back to bite you, or is segregation and encryption enough to protect your data? It is unlikely that the government would shut down all of Amazon Web Services for the misdeeds of a few — especially, as Drue Reeves, a Gartner analyst has pointed out, AWS may be too big to fail. Like the financial institutions that recovered with the help of bailouts, large public clouds are becoming cornerstones of the economy, he said.
But it is possible to have data residing on a cloud that suffers a distributed denial-of-service (DDoS) attack in retribution for another customer being dumped. That’s exactly what happened on December 8, when “hacktivists” launched a DDoS attacks against Amazon.com and several financial institutions including Visa, PayPal and MasterCard for their decisions to stop processing payments to WikiLeaks.
What other risks are there? How about hackers using high-performance cloud services on Amazon to break passwords on wireless networks? We’ll hear more about that when security expert Thomas Roth delivers a talk at the Black Hat conference in Washington, D.C., next week.
Regarding the financial services director’s concerns, I plan to follow up with a story on SearchCIO.com next week about best practices for mitigating risk in the public cloud.
What’s your experience? Email me at Laura Smith, Features Writer.
Waiting in line at a recent data center conference, I struck up a conversation with an enterprise architect at a major appliance manufacturer who said he was there with a mission: to figure out how to articulate a cloud strategy to get funding for cloud services.
Formulating a cloud strategy is on the minds of many IT executives — it’s the priority for 2011, according to analysts at Gartner Inc. in Stamford, Conn., ahead of virtualization and mobile computing.
“My concern is that it may be cheaper initially, but more expensive over the long run,” said my confidante en queue, who added that his cloud strategy to date has been to “move the grey to the cloud — not the most exciting applications, but the ones where it makes sense.”
Email, for example, and other “nondifferentiators” are the most likely candidates for public cloud services, according to Tom Bittman, a vice president and distinguished analyst at Gartner: “the things that everybody does, very separate from the business.” By 2012, 10% of enterprise email seats will be in the cloud, he said. The focus for nondifferentiated services is to “build an interface, very standardized between cloud and on-premises.”
The cloud is not a thing; it’s a style of computing like client/server, a way to deliver services, according to experts. And like actual clouds, there are lots of computing varieties, all of which must be considered in an enterprise cloud strategy.
Most organizations are going to have a mix of public cloud and private cloud initiatives. No doubt, “we’re going to see cloud sprawl. … If we saw virtualization sprawl internally, we can’t assume that it won’t happen externally,” Bittman said.
There are good and bad sides to the cloud, but the key to success is focus — the right services, the right requirements, and a service-based orientation.
“There is not a black and white, public and private; in many things, there is grey,” Bittman said.
A cloud strategy doesn’t have to be pure to provide value, for example. A cloud provider might limit access to companies within a particular industry, forming a community cloud. Or an enterprise might use a public cloud but insist that resources be shared only among applications in the company — a new construct becoming known as the “virtual private cloud.”
Throughout 2012, two-thirds of IT organizations will be spending more on cloud computing services, with 20% more spending on public clouds, Gartner analysts predict. The only bad strategy at this point is to have no strategy at all. Users are going to do their own thing, using personal credit cards to take advantage of cloud services beyond the realm of centralized IT. Having executive buy-in makes sense.
The cloud strategy boils down to how you evaluate which applications go into the public cloud, and which stay internal. Now is the time to align data center management with vertical service delivery. The bottom line is that you need to experiment; that leadership is critical to gaining executive buy-in. Focus on the service catalog and portfolio your services.
Like actual clouds, the computing variety is always shifting, showing up in an array of public, private, community and hybrid models. To help you understand the possibilities, SearchCIO.com will be looking in the next few weeks at such key issues as private cloud attributes and public cloud risks.
What cloud experience do you have to share? Email Laura Smith, Features Writer.
When should a CIO on the job market start lying about his or her age? Or, to put a finer point on the question, hiding one’s age? For one of the headhunters I consulted on a story this week about writing a resume to land a CIO job in 2011, the answer is never; don’t do it. When he sees a CIO resume that leaves off the dates for education, that’s a dead giveaway the candidate is worried about age. Facts are facts.
“If somebody isn’t going to hire you because you’re 58 rather than 52, then it is probably not the right place to be anyway, because that is a narrow view,” he said.
That’s true, I was thinking. But in a job market with 9% unemployment, taking the moral high ground could come at a hefty price for a middle-aged, out-of-work exec looking for a CIO job. Especially when older workers are having a hard time getting hired.
Another headhunter made a slightly different point when I raised the age question. When he sees a date left off on one’s education, his first thought is that the person didn’t go there or didn’t graduate. It’s not an age issue, it’s an integrity issue, he said. Not to mention annoying. He then has to call up Columbia or Carnegie Mellon and or wherever and verify whether the person was awarded a degree. Not a good way to make friends with a recruiter.
This interesting but minor debate about whether to include a date for one’s education on a CIO resume, of course, raises a more fundamental question: Is the CIO job a young person’s game? Given how quickly technology changes, are companies more comfortable hiring a youngish CIO — and what is youngish anyway? If so, the bias seems to be quite different for CEOs, where experience is valued and it’s quite common for companies to yank very seasoned fellows — think Ed Whitacre at General Motors — out of semiretirement to set the business straight.
So far, I’ve been batting around this idea about ageism and the CIO job mainly with consultants and headhunter types. I’d love to hear from CIOs of a certain age who have some firsthand experience with this issue.
Write to me at email@example.com.
Those of you who find the Wikileaks story fascinating, as I do, might enjoy zooming through Red’s Query, a fictional piece of work by technology media executive Eric Lundquist. The last quarter of the book is a thriller that reveals some interesting techniques for blowing past computer security measures to gain access to sensitive information.
Of course, sensitive information can be anywhere on the spectrum from embarrassing to potentially harmful — or dangerous, such as inside information from a financial institution, according to Tanya Forsheit, founder of the Information Law Group in Los Angeles. That’s why many states, independent of federal legal requirements, now are requiring companies to put in place such computer security measures as “programs, policies and procedures that are appropriate to the size of the company to mitigate risks,” she said.
Even if a data breach is just embarrassing, “the reputational harm is difficult to quantify, which is yet another reason” to think ahead, Forsheit said.
Some corporations even do their own hacking to test computer security measures, according to Darren Hayes, an expert in the field of computer forensics and security and a professor at Pace University’s Seidenberg School of Computer Science and Information Systems in New York.
“I know of corporations who have brought in the services of hackers, or even employed them full-time,” Hayes said. “But policy within law enforcement does not allow them to work with convicted hackers. It’s a problem, because they can’t bring in all the expertise that they need.”
The U.S. Navy offers scholarships for people with no criminal record who are interested in hacking, according to Hayes, who works closely with the New York Police Department and United Nations, among other organizations, to follow digital clues.
“There are not enough people out there doing this type of work,” Hayes said. “We need a lot more people.”
Hayes has a special sensitivity to security, having begun a 10-year career in the financial services industry in 1990 at Cantor Fitzgerald in the World Trade Center. At Pace, he manages the computer forensics laboratory, conducting research with students and publishing much of it in the Institute of Electrical and Electronics Engineers, or IEEE.
Technology improvements in tracking wanted criminals must be made to capture suspects like WikiLeaks founder Julian Assange, who was able to cover his digital trail before surrendering, according to Hayes.
Not much has been revealed about how the latest U.S. diplomatic cables wound up on the WikiLeaks site, other than to implicate 24-year-old Army Pfc. Bradley Manning, who is rumored to have used music files as a cover to download the cables onto CDs.
“Bradley Manning is not that tech savvy; he probably had help from someone,” Hayes said — which, coincidentally, is a strategy that unfolds in the pages of Red’s Query.
But unlike fiction, WikiLeaks has real consequences, by way of Manning’s imprisonment, before being convicted of the charge against him, in a fashion some are calling torture.
What if someone hacked into your data center and revealed your private emails or strategic data? Or those of an institution that you do business with?
Bank of America and its customers may soon find out, if threats from Assange are true. On the heels of the bank’s decision this week to join MasterCard, Visa and PayPal in refusing to process payments for WikiLeaks, the whistle-blowing organization put a warning up on Twitter:
“Does your business do business with Bank of America? Our advice is to place your funds somewhere safer.”
We got Kinect. For Christmas and the winter ahead, my husband said. For when the house is empty again and the weather outside is frightful. It will be good for our health, he told me. I do not play virtual reality games — not Second Life, not World of Warcraft, not The Sims 1, 2 or 3. I am not much of a game player, virtual or otherwise. If there is time to be spared, I prefer to read, cook, clean house, google Sarah Palin — really, do just about anything other than play a virtual reality game. Then I stood in front of the TV console and waved my arm to connect to Kinect. In no time this old lady was dodging pins, rafting down a curvy river, flying! A machine other than my dentist’s X-ray generator or an airport body scanner could see me! I loved it on sight. (I understand that Kinect can hear me too, but we haven’t worked out all the kinks on that yet.)
Having read a bit about Microsoft’s Kinect technology, I realize I’m not the only Luddite who is delighted by this virtual reality game, by the Redmond giant’s baby steps into a virtual reality we’ve hitherto experienced only in the movies. But I know that if Kinect can set my limbs in motion, it can move a population of couch and computer potatoes to more active lives.
Yesterday there was a story in The New York Times on the progress made by the Bill & Melinda Gates Foundation five years after Bill Gates invited scientists to submit ideas for solving the world’s most vexing health problems. The foundation has dispensed an astounding $450 million to make some of those ideas come true. Unlike in technology, the reporter explained, in biology there is no Moore’s Law, and progress has been slow. Eradicating malaria is hard.
While the world waits for its toughest health problems to be solved, I have a modest proposal for Mr. Gates. Give children in the wired world Kinect. It won’t alleviate the suffering of people with no access to proper health care, but it will make a lot of kids sitting in front of the TV jump for joy. And that can only make them healthier.
The WikiLeaks debacle has put a spotlight on the need for better corporate security policies and new technology approaches. But even these safeguards are no guarantee in an age where data is so easily transmitted for all to see online.
“I honestly believe [WikiLeaks] is not a technical leak, but malicious intent,” said Prateek Dwivedi, CIO of Mount Sinai Hospital in Toronto, about the WikiLeaks posts. Mount Sinai “does a lot of work” to prevent inadvertent data breaches, he said, “but if somebody wants to get in, they’ll get in. That’s what we have to worry about — how do we keep it from happening? I’m not a diplomat, and our documents don’t have trade secrets, but we do have information on people’s health.”
The hospital already has locked down everything it should, partly because the health care industry mandates it and partly because of Dwivedi’s “healthy paranoia,” he said. “We can make it really hard if it’s inadvertent, but everything comes down to policy,” including requiring people to take oaths not to leak sensitive or valuable information.
Yet corporate security policies and oaths can’t always control human behavior: physicians using a common-area fax machine, for example. For safer transfer of patient information, Mount Sinai is installing a secure link through a website that will replace fax transfers with encrypted PDFs. “The fax machine is not secure,” Dwivedi said. “We don’t even know who the fax is going to! As we implement new technology, we need to buy [more secure] products.”
Insisting upon secure PDFs instead of faxes is one way CIOs can update their corporate security policies.
But paramount is an overarching data management strategy, according to Gartner analyst Drue Reeves: Use document management to make sure you don’t have copies everywhere, and purge nonrelevant material. “Sometimes it’s okay to delete data,” he said. In fact, a lot of companies are forming internal groups to decide just what to chuck.
Other keys to corporate security policies: identity management (make people authenticate again and again), storage management and encryption, Reeves said.
And then, pray.
“Even if you do everything technically, if you have a determined hacker, you cannot stop them,” Reeves said. “Sooner or later, some company somewhere is going to be sued for negligence.”
As more corporate data resides on third-party infrastructures, that negligence could extend to cloud providers. They could be called on more often to adhere to the same security policies the corporations they serve have in place, according to experts.
With help from Reeves and others, I explored cloud liability in a series of articles on SearchCIO.com earlier this year. Perhaps it’s time for another take, as WikiLeaks “is yet another illustration of why organizations need to be focused on and cognizant of security risks,” said Tanya Forsheit, a founding partner of the Information Law Group, based in Los Angeles.
“This round was about diplomatic cables, but it could be the same thing in the corporate context, and we’ve seen suggestions in the media that that’s the next thing,” Forsheit said. “Regardless of whether it’s WikiLeaks or someone else, it’s a data breach.”