the finger-friendly apps
DESCRIPTION
Apart from being platform-agnostic, today's enterprise applications need to be as user-friendly as in a mobile app storeTRANSCRIPT
Technology for Growth and Governance March | 07 | 2013 | 50Volume 08 | Issue 14
A 9.9 Media Publication
VIewPoInt
the new Measuring
Stick Page 48
BeSt of Breed
Caught in the
Crossfire Page 20
no holdS BArred
Addressing Modern
Security Issues Page 42
thefinger-friendlyapps
Datacard and Secure Issuance Anywhere are registered trademarks, trademarks and/or service marks of DataCard Corporation in the United States and/or other countries. ©2012 DataCard Corporation. All rights reserved.
INSTANT ISSUANCE
Datacard, CardWizard and Secure Issuance Anywhere are registered trademarks, trademarks and/or service marks of DataCard Corporation in the United States and/or other countries. EMV is a registered trademark of EMV CO., LLC. ©2012 DataCard Corporation. All rights reserved.
New financial instant issuance portfolio
Datacard Group offers a full range of new innovative printers, CardWizard® software, the
world’s #1 instant issuance software and unmatched global service and support. Our
solutions give you the flexibility to issue permanent embossed, unembossed, magnetic
stripe, EMV®-compliant cards and NFC enabled mobile devices immediately.
Datacard Group makes it easy and affordable to launch a profitable instant issuance
card program. Our Secure Issuance Anywhere™ platform empowers you to manage
your card and mobile payments programs the way you want to – anytime, anywhere.
To schedule an instant issuance demo, visit www.datacard.com/cto
Datacard India Private Ltd B-302,Flexcel park,S.V.Road, Next to 24Karat Multiplex, Jogeshwari (W) Mumbai-400102.India Tel:+91-22-61770300 Email:India_sales @datacard.com
GIVE CARDHOLDERS THE CONVENIENCE AND SERVICE LEVELS THEY DEMAND
2 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
editorialyashvendra singh | [email protected]
editor’s pick
From Complexity to Simplicity
Mobility and cloud are deconstructing enterprise
applications
At Salesforce.com’s annual conference this year, its
Ceo, marc Benioff, told report-ers, “All software is going to look like facebook.”
Benioff may not be an oracle but what he said doesn’t seem to be too far fetched either. As a matter of fact, the transition towards his forecast already appears to be underway.
Traditionally, an enterprise solution is meant to be a ‘show of force’ — a powerful system that has been optimised to work
cloud computing comes into the picture. By leveraging the cloud model, applications can now be accessed anywhere, any-time and on any device.
for the time-honoured and complex enterprise software, the going is bound to get tough in the mobile-centric world. But ringing in simplicity will come with a price. A Cio will have to walk the tight rope balancing mobility and simplicity on one side and security and compli-ance issues on the other side.
nonetheless, a start has been made. in this issue’s cover story, we discuss this new trend threadbare, and focus the spot-light on top technology leaders and vendors adopting it.
facebook is one such com-pany that has been decon-structing. in its nine years of existence, the social networking service has been splitting its
on a desktop. This arrangement worked perfectly till the advent of enterprise mobility and cloud computing. Then the rules of the game changed.
A look at the numbers and it is hard to ignore the fact that enterprises are going mobile. Consumerisation of iT is here to stay and prolifer-ate. however, mobility is not synonymous with complexity. it supports simple, lightweight applications. This shift towards minimalism is intensified when
web application into smaller and lighter apps (messenger and camera, for instance) that can run on mobile devices.
As for Benioff, he is putting his money where his mouth is. moving towards simplic-ity, Salesforce labs has come up with an app called logger, which enables sales people to update records on the go. The app, sans Salesforce’s frills and fancies, claims to be the easiest and fastest way to log activity.
if you too have plans of doing away with the old and intricate systems in your enterprise to usher in simplicity, do share your plans with us. We look for-ward to your feedback. 24 the Finger-friendly
appsApart from being platform-agnostic, today’s enterprise apps need to be as user-friendly as in a mobile app store
Discover which physical infrastructure management tools you need to operate your data centre. Download White Paper #104 today and 10 lucky respondents can WIN a telescope!Visit www.SEreply.com Key Code 48019y
Tap in to the health of your data centre. As an IT or data centre manager, you know that doing your job well means saving your company both time and money. Today, there finally is a way for you to be completely tapped in to the overall health of your data centre. StruxureWare™ for Data Centres gives you visibility across your entire data centre infrastructure so you can make informed decisions — not arbitrary ones — about your infrastructure. For example, you can plan proactively for needed capacity and streamline workflow management to improve your business agility and availability. In fact, now more than ever, infrastructure decisions are business decisions.
An always available, efficient data centre. What’s more, StruxureWare for Data Centres communicates in real-time with the leading virtualization platforms: VMware® vSphere™ and Microsoft® System Centre Virtual Machine Manager. The software’s built-in automated response capabilities ensure that virtual loads always have healthy host environments. With your VMs on healthy hosts, you can focus on running your data centre more efficiently. The software also gives insight into PUE/DCiE trending over time, enabling you to make intelligent energy management decisions. With StruxureWare for Data Centres planning and reporting capabilities, who’s the company hero now? You are!
APC™ by Schneider Electric™ is the pioneer of modular data centre infrastructure and innovative cooling technology. Its products and solutions, including InfraStruxure™, are an integral part of the Schneider Electric IT portfolio.
Now, align your data centre with your business strategy.
Now, make informed decisions about your infrastructure:
> Plan proactively for needed capacity.
> Blueprint data centre expansions and consolidations.
> Streamline workflow management of your IT physical infrastructure to improve your business agility and availability.
> Make changes knowing how they will affect your business.
> Visualize change/capacity scenarios to improve your bottom line.
> View your current and historic PUE/DCiE and energy costs of subsystems to make intelligent energy management decisions.
StruxureWare for Data Centres insight enables a healthy, business-driven data centre.
©2013 Schneider Electric. All Rights Reserved. Schneider Electric, APC, StruxureWare, vSphere, and InfraStruxure are trademarks owned by Schneider Electric Industries SAS or its affiliated companies.All other trademarks are the property of their respective owners. • www.schneider-electric.com • 998-4108_B_IN
CTO_Forum_0301_48019y_IN.indd 1 1/28/2013 3:02:52 PM
4 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
48 | viewpoint: the new Measuring stickBy steve duplessie
06 | i believe: siloed it: the biggest challengeBy shailesh kumar davey
Cover Story
24 | The Finger-Friendly Apps Apart from being platform-agnostic, today’s enterprise applications need to be as user-friendly as in a mobile app store
CopyrighT, All rights reserved: reproduction in whole or in part without written permission from Nine Dot Nine interactive pvt Ltd. is prohibited. printed and published by Kanak ghosh for Nine Dot Nine interactive pvt Ltd, C/o Kakson house, plot printed at Tara Art printers pvt Ltd. A-46-47, Sector-5, NoiDA (U.p.) 201301
Please Recycle This Magazine And Remove Inserts Before
Recycling
co nte nt s theCtoforum.Commarch13
Cover design by: Manav saChdev
S P I N E
Technology for Growth and Governance
CT
O
FO
RU
MVolum
e 08 | Issue 14
March | 07 | 2013 | 50Volume 08 | Issue 14
IPH
ON
ES
AR
E C
OM
ING
TO
TH
E P
LA
NT
FL
OO
R| C
YB
ER
SP
AC
E: IT
’S A
ME
DIU
M, N
OT
A P
LA
CE
A 9.9 Media Publication
VIEWPOINT
The New Measuring
Stick PAGE 48
BEST OF BREED
Caught in the
Crossfire PAGE 20
NO HOLDS BARRED
Addressing Modern
Security Issues PAGE 42
thefinger-friendlyapps
ColumnS
featureS20 | best of breed:caught in the crossfire Cios are stuck between different business leaders who have conflicting business priorities
24
5 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
Managing Director: Dr Pramath Raj SinhaPrinter & Publisher: Kanak Ghosh
Publishing Director: Anuradha Das Mathur
EditorialExecutive Editor: Yashvendra SinghConsulting Editor: Atanu Kumar Das
Assistant Editor: Varun Aggarwal & Akhilesh Shukla
dEsignSr. Creative Director: Jayan K Narayanan
Sr. Art Director: Anil VKAssociate Art Directors: Atul Deshmukh & Anil TSr. Visualisers: Manav Sachdev & Shokeen Saifi
Visualiser: NV BaijuSr. Designers: Raj Kishore Verma, Shigil Narayanan
& Haridas BalanDesigners: Charu Dwivedi, Peterson PJ
Midhun Mohan & Pradeep G Nair MarcoM
Designer: Rahul Babustudio
Chief Photographer: Subhojit PaulSr. Photographer: Jiten Gandhi
advisory PanElAnil Garg, CIO, Dabur
David Briskman, CIO, RanbaxyMani Mulki, VP-IT, ICICI Bank
Manish Gupta, Director, Enterprise Solutions AMEA, PepsiCo India Foods & Beverages, PepsiCo
Raghu Raman, CEO, National Intelligence Grid, Govt. of IndiaS R Mallela, Former CTO, AFL
Santrupt Misra, Director, Aditya Birla GroupSushil Prakash, Sr Consultant, NMEICT (National Mission on
Education through Information and Communication Technology)Vijay Sethi, CIO, Hero MotoCorpVishal Salvi, CISO, HDFC Bank
Deepak B Phatak, Subharao M Nilekani Chair Professor and Head, KReSIT, IIT - Bombay
salEs & MarkEtingNational Manager – Events and Special Projects:
Mahantesh Godi (+91 98804 36623)National Sales Manager: Vinodh K (+91 97407 14817)
Assistant General Manager Sales (South):Ashish Kumar Singh (+91 97407 61921)
Senior Sales Manager (North): Aveek Bhose (+91 98998 86986)Product Manager - CSO Forum and Strategic Sales:
Seema Menon (+91 97403 94000)Brand Manager: Jigyasa Kishore (+91 98107 70298)
Production & logisticsSr. GM. Operations: Shivshankar M Hiremath
Manager Operations: Rakesh upadhyay Asst. Manager - Logistics: Vijay Menon Executive Logistics: Nilesh Shiravadekar
Production Executive: Vilas Mhatre Logistics: MP Singh & Mohd. Ansari
oFFicE addrEssPublished, Printed and Owned by Nine Dot Nine Interactive Pvt
Ltd. Published and printed on their behalf by Kanak Ghosh. Published at Office No. B201-B202, Arjun Centre B Wing,
Station Road, Govandi (East), Mumbai-400088. Printed at Tara Art Printers Pvt Ltd., A-46-47, Sector-5, NOIDA (U.P.) 201301
Editor: Anuradha Das MathurFor any customer queries and assistance please contact
www.thectoforum.com
regularS02 | editorial08 | letters10 | enterprise
round-up
This index is provided as an additional service.The publisher does not assume
any liabilities for errors or omissions.
38 | tech for governance:cyberspace: it’s a MediuM, not a place internet is a medium with which we fabricate a social contract to communicate
38
a QueStion of anSwerS
16 | ruchir godura, Vp, india and South Asia,Vidyo, talks about the enterprise video conferencing and telepresence markets
44 | next horizons: iphones are coMing to the plant floor iT is changing constantly and we need to work from general principles
44
16
advertisers’ indexDatacard IFCIBM 1Schneider 3CTRLs 7ESDS 9Cisco 13, 33, 37Zenith 15Patel India 19SAS Institute 23Wipro Infotech 32-AFalcon (Expo 2020 Dubai) IBCMicrosoft BC
6 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
I BelIeve
currentchallenge
eliminating siloed it management environment
xxx author Is the Vice President at ManageEngine and is responsible for new IT
developments in the company.
Gaining the Trust of Management Manarojan Kumar cIO, Kanoria chemicals & Industries believes for a cIO to gain
and business enabler. in the absence of such a role, the Cio remains just a custodian of iT infrastructure.
The management always has a high expectations from the iT team led by the Cio at the fore front. in case the expectations are not met, they are highly disappointed of the iT team and lose interest in any new iT project. They lose faith in the Cio and his ability to transform the enterprises with the help of iT. The management's attitude sooner or later reflects in the functioning of the Cio. failing to deliver, the Cio is seen as a liability on the organisa-tion. The management stops taking up new iT project unless they are absolutely imperative for business growth.
however, for the management to lose faith in the company's Cio, the latter is also responsible to a large extent. Cios often present a rosy picture to the management to get their approval for fresh investment. in fear of not getting approvals for the project they do not highlight the challenges, and completely ignore them while presenting a case for new project. Such challenges are bound to crop up during the imple-mentation phase and lead to delays or over spending or both. These challenges, however small they may be, have the potential of putting a project in jeopardy. once the project outcome is not as per the case pre-sented by the Cio, the management becomes skeptical of future invest-ments.
i believe that a Cio should be honest enough to the manage-ment while presenting the case for any new deployment. Along with the benefits of the new project, he should also highlight the challenges that may be encountered during the execution of the project. i am sure that it would help the management to understand the ground level chal-
In my more than two decades of experience in iT , i have realised the importance of regular communication with the management. This not only helps in building a rapport with the management but also strengthen the role of a Cio in an organisation as a business leader
By manarojan kumar, CIO - Kanoria Chemicals
LETTERS
WRITE TO US: The CTOForum values your feedback. We want to know what you think about the magazine and how
to make it a better read for you. Our endeavour continues to be work in progress and your comments will go a long way in making it the preferred publication of the CIO Community.
Send your comments, compliments, complaints or questions about the magazine to [email protected]
ARE CTOS mORE InTERESTEd In SATISfyIng ThE CfO & BOARd RAThER ThAn ThE COnSUmER?
I see CTO is aligned to the CFO and the Board in that order, the CTO will have to also be good at resume writing as he will not last too long. But then the question arises, is the CFO aligned to the Consumer? If he is not, then even he may be in hot water sooner or later.Arun guptA, Group CIO,Cipla
1. Place of publication Nine Dot Nine Interactive Pvt. Ltd. Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706
2. Periodicity of its publication Fortnightly
3. Printer’s name Kanak Ghosh Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706
4. Publisher’s name Kanak Ghosh Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706
5. Editor’s name Anuradha Das Mathur Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706
6. Names and addresses of individuals who own the newspaper and partners or shareholders holding more than one per cent of the total capital
Nine Dot Nine Interactive Pvt Ltd. Plot No.725, GES, Shirvane, Nerul, Navi Mumbai-400706
Nine Dot Nine Mediaworx Pvt Ltd N-154 Panchsheel Park, New Delhi 110017.
I, Kanak Ghosh hereby declare that the particulars given above are true to the best of my knowledge and belief.
form IVStatement of ownership and other particulars about the publication, CHIEF TECHNOLOGY OFFICER FORUM as per Rule 8
Dated: 1st March, 2013Sd/-
Signature of Publisher
8 07 MARCH 2013 cto forum The Chief
TeChnologyoffiCer forum
Major Shareholder
10 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
Enterprise
Round-up
FEATURE InsIdE
datacentre networking is
still in its TeensPg 12
Will be the global bi revenue in 2013
India’s Digital Universe to Grow to 2.9 ZB study reveals cloud as key concern area; value through Big data as the biggest opportunityEMC CoRpoRation announced results of the emC-sponsored iDC Digital universe study, “Big Data, Bigger Digital Shadows, and Biggest growth in the far east — india”— which revealed that the digital universe in india will grow 23-fold between 2012 and 2020. The digital bits captured or created each year in india are expected to grow from 127 eB to 2.9 ZB between 2012 and 2020.
india’s digital information explosion is being driven by proliferation of devices such as PCs and smartphones worldwide, increased internet access within emerging markets and the boost in data from
machines such as surveillance cameras or smart meters. other contributing factors include increasing machine-to-machine communication (m2m), falling cost of technology,and digitisation of TV, among oth-ers. over time, the distribution of the bits within the digital universe by country of origin will more and more closely mirror the distribution of population.
Key findings of this india-specific study include:less than half a percent of all digital information is
analysed today while 36 percent would provide valu-able insights making big data a significant opportu-nity for india.
$14billion
dATA BRIEFIng
illu
ST
RA
TiO
N B
Y A
Nil
T
E n t E r pr i s E ro u n d - u p
11 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
A quarter of distributed denial of service (DDoS) attacks in 2013 will be application-based. Instead of inundating websites with requests, such ddos attacks send targeted commands to applications to overwhelm them and make them unavailable
QUIck ByTE on ddos
Five Ways to Spot and Score bad iP Clients Fortinet highlights the importance of client reputation idEntifying improper behaviour among the devices connected to their network is a critical tool for any organisation concerned about Advanced Persistent Threats (APTs). in light of the rapidly changing landscape of such targeted malware attacks, fortinet lists the top five types of behaviour that might indicate that a device has been infected.a) Bad Connection Attempts: Typical malware behaviour often includes attempts to connect to hosts that don’t exist on the internet. While some bad connections may be due to user error or bad links, a series of bad connections could be a sign of malware infection.b) Choice of Application: A host that installs a P2P file sharing application can be considered riskier than a host that installs a game. Some consider both actions problematic. The ability to add weights to each action allows each risk to be scored.c) Geographic Location: Visits to hosts in certain countries can be categorised as risky behaviour, especially if there is a significant amount of traffic involved. iden-tifying such behaviour can be combined with a white list approach that identifies legitimate sites in such countries to help identify infected clients.
The year 2012 was a landmark year for the IT-BPM industry in India as it crossed the landmark of $100 billion of revenues, says Mittal.
— Som Mittal, President, Nasscom
“The year 2012 also has its share of uncertainty with global economic volatility, slowdown in technology spending and the mantra of doing more with less”
they Said it
Som mittal
imA
ge
BY
PH
OT
OS
.CO
mim
Ag
e B
Y P
HO
TO
S.C
Om
E nt E r pr i s E ro u n d - u p
12 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
Datacentre Networking is Still in its Teens Forrester’s analysis of current dc networking solutions says that they are still immaturedata CEntRE networking solutions on offer
today are still in their ‘teen years’ and it will take some time for them to reach ‘adult-hood’ says forrester’s analysis of leading data center networking solutions. After a comprehensive analysis of solutions from vendors including Alcatel-lucent, Arista networks, Avaya, Brocade Communication Systems, Cisco Systems, extreme networks, hewlett-Packard, and Juniper networks and combing through customer stories, technical documents, and vendor responses, researchers at forrester concluded that “even though the proposed solutions offer
tremendous value, today’s data center net-working solutions are immature.”
in his latest blog, analyst Andre Kindness who serves infrastructure & operations pro-fessionals wrote that data center networking solutions have just hit their “teen years” and exhibit teenager characteristics. Kindness outlined five traits exhibited by today’s top solutions to substantiate his theory.
According to him, today data center net-working solutions: Continuously re-identify-ing themselves.
At one time, data center networking char-acteristics were one-dimensional, focused
According to research firm Gartner, the Middle East and africa it infrastructure market is set to reach $3.9 billion in 2013, marking a four percent increase from 2012
on flattening the network. now the conver-sation has expanded to include the integra-tion of virtualised and physical infrastruc-ture while creating a fabric of horizontally interwoven networking components. how-ever, customers will be hard-pressed to find a consistent definition from each vendor that hasn’t evolved over the past two years. And guess what?
They’re likely to change it several more times in the next three years.
require adult supervision. no matter how many software defined networking (SDn) slides are shown, network automation is limited to reacting to Vm movement. The systems monitor one boundary condition when the system should be monitoring thousands, if not hundreds of thousands, of instances (virtual and physical ports/links/switches, applications, policies, etc.).
networking teams should expect con-tinuous babysitting. They’ll be manually configuring the devices and adjusting knobs to figure out the bandwidth allocation, QoS settings, buffering settings, etc.
Are moody. overlay Transport Virtualiza-tion (oTV), Virtual ethernet Port Aggrega-tor (VePA), Virtual eXtensible local Area network (VXlAn), and others are new tech-nologies that have little mileage and can be unpredictable or fail to even work in certain environments.
Some customers said they rolled back some of their deployments because the technology was just too temperamental.
feel isolated. many of the data center networking components from a single solu-tion are tightly interwoven with each other; however, few venodors have provided inter-faces that enable the network subsystem to share stateful information with another subsystem.
The cliques are alive and well within the data center.
Act self-absorbed. networks will encom-pass both virtual and physical aspects. This means policies, control, and network ser-vices have to go past the last physical edge port. Virtual network functions belong to the network domain, except most solutions don’t offer visibility, control, or manage-ment of the virtual network.
This overly inward focus will likely thwart i&o from realising true benefits of a next-gen data centre.
gloBAl TRAckER
IT Infrastructure
So
ur
ce
: g
ar
tn
er
illu
ST
RA
TiO
N B
Y S
Hig
il N
AR
AYA
NA
N
E nt E r pr i s E ro u n d - u p
14 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
networks are the internet. using
‘login with Facebook’—or other
popular social networks—reduces
friction and therefore improves
users' experience of customer reg-
istration and subsequent login.
For registration, the required per-
sonal information can be imported
from users' social profiles, reduc-
ing—if not eliminating—form fill-
ing. moreover, using a social net-
work identity means users don't
have to remember rarely used pass-
words or endure convoluted pass-
word reset processes when they
forget them.”
According to research firm gartner,
along with federation technolo-
gies and mobile computing, social
identity adoption will have a major
impact on the practice of identity
and access management (iAm) in
2013 and beyond.
Says Ant Allan, research vice presi-
dent at gartner, “For an increasing
number of internet users, social
Social Credentials to define retail Customer identities half of new retail identities to be social-based
mobile aPPS
With enterprises under
extreme pressure from
management and employees to
develop and deploy mobile appli-
cations to accommodate mobile
work styles and increase customer
engagement, gartner predicts that
more than 50 per cent of mobile
apps deployed by 2016 will be
hybrid. “mobility has always been
a separate topic for iT profes-
sionals, but it is now influencing
mainstream strategies and tactics
in the wider areas of technology
enablement and enterprise archi-
tectures," said Ken Dulaney, vice
president and distinguished ana-
lyst at gartner. increasingly, enter-
prises are finding that they need
to support multiple platforms,
especially as the BYOD trend gains
momentum. To address the need
for mobile applications, enterpris-
es are looking to leverage applica-
tions across multiple platforms.
The advantages of the hybrid archi-
tecture, which combines the por-
tability of HTml5 Web apps with
a native container that facilitates
access to native device features,
will appeal to many enterprises.
The need for context aware-
ness in mobile applications has
increased with the capabilities of
mobile devices, causing develop-
ers to consider both hybrid and
native architectures. For applica-
tions to leverage location, on-
device hardware the applications
need to be developed using either
hybrid or native architectures.
LEt's faCE it, for a large num-
ber of users, internet essentially
means Facebook or Twitter. Such
has been the impact of social
media on our daily lives. it is no
surprise then, that experts predict
that by the end of 2015, as many
as 50 per cent of all new retail cus-
tomer identities will be based on
social network identities.
softwaRE development firm, Telerik, has launched "SafeBridge", a free mobile applica-tion which can be used for safeguarding women. Designed to help vulnerable groups such as women, children, professionals, working late at night, foreign tourists and city visitors, the application allows users to send emergency SmSs with gPS information to preset lists of trusted contacts. There is no need for any registration to use the app.
Free mobile app for Safeguarding Women The app allows users to send emergency sMss
FAcT TIckER
Developed in response to recent spike in crime incidents against women, the beta version of the application is currently available for both low-end and high-end Android phones and will soon be made available for iPhone and BlackBerry devices.
“Since opening our office in new Delhi in 2012, we at Telerik have made it our priority to be active citizens of this society. The urgency of the recent incidents required a prompt response and thanks to Telerik' products, we are able to quickly build the application for all types of phone users,” says Abhishek Kant, country manager of Telerik india.
using the safety app is simple. At the start of the application, the user first must preset the contacts of friends and relatives who will be notified in the case of an imminent threat.
To decrease response time in emergency situa-tions the app involves just the one-touch function of simply pressing a "helP me!" button to send out an SmS with gPS information.
in the cases when the threat is over, there is an "i'm Safe" button to immediately notify contacts that everything is alright. "SafeBridge" can func-tion with limited internet or no internet availabil-ity on the phone.
Telerik's "SafeBridge" allows the user to person-alize the "help" and "safe" messages. The applica-tion also provides a "Track me" feature, which includes sending out the user's current location at pre-determined intervals. The application also includes a Directory of police stations in Delhi. in future, Telerik's team plans to add other indian cities to this police directory as well as city-by-city contact information of hospitals and ngos in the country. The app will also include the option to report crimes the user witnesses but may not be the victim of.
illu
ST
RA
TiO
N B
Y R
Aj
ve
Rm
A
Huge Potential: Video conferencing revenue is growing 14.4% Y-o-Y globally
A Q u e s t i o n o f An swe rs ru ch i r g o d u r a
16 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
Given the fact that most businesses today are
reluctant to invest into an expensive telepresence solution and free applications such as Skype are getting better in terms of quality, what business opportunity do you see in the videoconferencing and telepresence market in India?A recent iDC report shows that the worldwide hardware based enter-prise video conferencing and tele-presence market showed a noticeable deceleration in growth in the first quarter of 2012, with video confer-encing revenue growing 14.4 percent year over year, well below the 23-25 percent year-over-year growth range witnessed in the last three consecu-tive quarters. on the other hand the
scalable, software based enterprise video conferencing and tele-presence market remains one of the bright-est prospects globally and is gain-ing huge momentum. enterprise technology leaders are starting to shy away from proprietary solutions. The flexibility offered by web con-ferencing, and availability of video conferencing solutions such as those offered by Vidyo – agile, adaptive, and form factor agnostic – will drive the future in personal and enterprise video market.
one of the primary drivers for enterprise web conferencing tools has been explosion of free consumer services like Skype and facetime. having been exposed to the benefits of video calling in their personal lives, employees are demanding a
similar facility in their enterprise tools. The clear demand from corporate users has been to be able to connect from anywhere, not just conference rooms, and in high quality, and to seamlessly and securely integrate with existing enterprise iT systems like uC tools, active directory, corporate firewalls and conference and board room sys-tems. it provides a more affordable solution to organisations, without additional investment in equipment required. other factors leading the growth of web conferencing include fewer firewall configuration issues, and lower internet bandwidth requirements for organisations look-ing for agile video solutions.
Vidyo is a cost effective for enter-prises and can be the best choice for
RucHiR GoduRa | VP, IndIa & South aSIa, VIdYo
Govt Sector has Huge Potential In a conversation with CTO Forum, Ruchir Godura, Vice President, India and South Asia, Vidyo, talks about the enterprise video conferencing and telepresence market and its potential in the country
ru ch i r g o d u r a A Q u e s t i o n o f An swe rs
17 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
uc system
allows people to
be productive for
a lot longer.
india is a priority
market for Vidyo
and going forward
we will continue
expanding base in
the country.
india definitely
has a huge
opportunity
especially in
the government
space.
thIngs I BelIeve In
Smes for video conferencing as it’s a fully featured, secure, high defini-tion video conferencing solution that runs on the web as well as on private corporate networks and on platforms ranging from smartphones and tab-lets to full immersive telepresence rooms. Application like Skype etc face security concerns which doesn’t hold true for the solutions provided by Vidyo.
What are your focus areas and how are you trying to gain
entry into the enterprise space in the country?organisations across sectors, have shown interest in web conferenc-ing solutions. in the private sector we see tremendous growth coming from the financial services, health, telecom, retail and education sectors. in india, the government has also become a strong proponent of pro-moting e-governance, education and telemedicine via video conferenc-ing tools. We also see the adoption increasing in bigger organisations as they upscale or downscale, based on the existing economic environment.
india is a priority market for Vidyo and going forward we will continue expanding base in the country by providing cost effective and secure solution for enterprises. Video conferencing in india, as a trend has picking up pace as compared to earlier. Couple of years back, the idea of video conferencing had not even penetrated the personal lives of individuals, let alone the enterprise space. Today, with barriers such as complexity of technology, high costs, poor quality and unreliability being overcome, more and more people have begun to use video conferenc-ing in their day-to-day lives. india definitely has a huge opportunity especially in the government space and Vidyo would be keen to join hands with governments across the country to create an enhanced and seamless communication mode across domains like Defence, educa-tion, healthcare etc.
What does an effective unified communication
strategy offer to an enterprise?The biggest advantage that a unified communication system offers is that it allows people to be productive for a lot longer — regardless of their time and location — by just helping them collaborate with their colleagues. This ubiquity adds a whole lot of business value to enterprises. A good enterprise unified communication system today can largely reduce the need to physically travel for busi-ness meetings as well as reduce the need for a whole lot of prior resource reservation, thereby, saving on time and cost.
What are you doing in the area of video conferencing
over mobile?We have something called Vidyo-mobile software that brings high-quality video conferencing to popular Android and ioS tablets and smart-
phones. now you can host or join a person-to-person or multi-party video conference from wherever you are, using a simple internet connection. As an endpoint in your VidyoConfer-encing system, Vidyomobile delivers transcode-free video conferencing for natural communication at the pace of conversation, without the broken pictures associated with traditional solutions. enjoy the freedom to con-nect and collaborate easily with oth-ers across a wide range of endpoints from smartphones to room-based telepresence systems.
The software offers full functional-ity on both Wifi and 4g networks, extending access to remote and mobile participants. it is designed from the ground up for multi-party collaboration. With this technology, you can leverage mobile devices that users already have over commodity wireless networks. The application also has the ability to conference with legacy endpoints via Vidyogateway.
“applications like Skype etc face security concerns which doesn’t hold true for our solutions”
A Q u e s t i o n o f An swe rs ru ch i r g o d u r a
18 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
20 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
Best of
BreedAs is often the case, Cfos will rightly
insist that erP applications are the official systems of record. But from a practical perspective much of daily business is now being man-
aged via Crm and social media applications. The Ceo and the board of directors, of course, wants all these systems reconciled, which unfairly puts Cios squarely in the crossfire between different business leaders that often have conflicting busi-ness priorities and objectives.
A“We see this issue all the time. it’s definitely a tough time to be a Cio,” says Paul Allen, world-wide service line leader for finance & analytics for hewlett-Packard. “But it also creates a mandate for the Cio to solve the problem.”
Savvy Cios see this conflict as an opportunity to leverage some creative tension to finally address a range of application integration and data management issues across the enterprise. in fact, new big data and in-memory computing tech-nologies may finally give Cios control over data in a way that has eluded
them since the days when mainframes reigned supreme over all of iT.
unfortunately, it usually takes a major event of one type or another to get organisations to focus on the core problem. over a decade ago when DirectTV wanted to launch nfl Sunday Ticket, a service that lets subscribers watch every nfl game being televised on any given Sunday, the company had multiple systems of record in place that made it difficult to share revenues with the various networks televising the games. To solve
Caught in the CrossfireCIOs are stuck between different business leaders who have conflicting business priorities By Michael Vizard
ILLU
ST
RA
TIO
N b
y R
Aj
ve
Rm
A
CIOs are simply making the best of a bad business situation
92What would you dowith an extra 92 hours?
®High-performance analytics from SAS helped a financialservices firm reduce loan default calculation time from 96
Early detection of high-risk accounts is crucial to determiningthe likelihood of defaults, loss forecasting and how to hedgerisks most effectively. Now, SAS can help you speed thattime to decisions from days to literally minutes and seconds– transforming your big data into relevant business value.
hours to just 4
high-performanceanalyticsA real
game changer.
High-Performance Computing
Grid Computing
In-Database Analytics
In-Memory Analytics
Big Data
sas.com/92 to learn more
For more information please contact [email protected]
Each SAS customer’s experience is unique. Actual results vary depending on the customer’s individual conditions. SAS does not guarantee results, and nothing herein should be construed as constituting an additional warranty. SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. © 2012 SAS Institute Inc. All rights reserved. S90309US.0412
B E S t o f Br E E D S e c t i o n n a m e
22 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
a ppl i cat i o n S B E S t o f Br E E D
the problem, the senior management team simply declared one application would be the company’s official system of record. “The senior management team recognized the need to address this issue back when we had nine different systems,” says mike Benson, Cio of DirectTV and a member of the Technology Business man-agement Council, a nonprofit organization of iT executives.
unfortunately for Cios, with the grow-ing usage of Crm systems there is now more tension than ever between sales and finance. “We’re seeing Crm systems increasingly becoming the system the busi-ness relies on more simply because that’s where they get the most visibility into what’s really happening in the company on a daily basis,” says eric Berridge, Ceo of Bluewolf, an iT services firm.
Brandon Brown, Cio of Trident market-ing, a direct response marketing firm, says this issue is more pronounced in some ver-tical industries than others. in manufactur-ing industries where transactions still tend to take place on a quarterly basis, the erP system still dominates. But in a lot of busi-ness-to-consumer transactions, Brown says there tends to be a lot small, high-volume transactions that are happening in real time. That kind of business environment tends to shift the focus of the action within the com-pany to the Crm system.
“it now really depends on the nature of the industry as whether the business is going to be driven by a Crm or erP sys-tem,” says Brown.
Brown also notes that with advances in analytics platforms from vendors such as iBm it’s becoming easier to unify dispa-rate business processes and applications.
in fact, as advanced analytics continues to evolve alongside the rise in-memory com-puting, the data management pendulum may finally be swing-ing back in favor of the Cio.
many Cios have been trying to unify business processes via application integration proj-ects that make sure there is a single truth manifesting itself across every business applica-tion. Conflicting data from different applications, however, can easily wind up rendering
those applications all but useless. in addi-tion, organisations often wind up having to deploy analytic applications against data warehouses that add a lot more complexity and expense.
Simo Said, vice president of database and technology for lines of business and indus-tries for SAP, says unifying all the raw data in one system is one of the major business benefits of investing in a system such as the SAP high Performance Analytic Appliance (hAnA). in effect, hAnA becomes the system of record for processing all data in real time, which can then be accessed by any application that either runs directly on top of hAnA or via an application programming interface. rather than having multiple cop-ies of the same data running throughout the enterprise, hAnA provides an opportunity to centralize all that data in-memory in a way that makes distributing multiple copies of data around the enterprise unnecessary.
SAP hAnA is not the only database platform that iT organ-isations can opt to process data in memory in real time. exa-sol, for example, makes it possible to run existing SQl applications on top of an in-memory database. Converse-ly, Starcounter has developed a noSQl database that runs completely in-memory.
Alternatively, some organ-
isations may simply get by with Apache hadoop implementation, which may not be as fast as an in-memory database, but at the very least allows iT organisations to more cost effectively build big data analyt-ics applications.
obviously, it will take some time for the transition to in-memory computing to fully play out across the enterprise. in the mean-time, Cios, in the absence of a corporate mandate that identifies one particular appli-cation as the system of record within the organisation, may want to bide their time.
The simple fact is that a lot of the division that exists in many organisations winds up being reflected in the iT systems that support business units that are either not quite as closely aligned as they might be, or are hostile to each other because the underlying business model is fundamen-tally flawed. of course, that doesn’t stop anybody on the business side from accusing iT of not understanding the needs of their business unit, even though those needs are often in direct conflict with the needs of another part of the business. more often than not, Cios are simply making the best of a bad business situation that is currently, but perhaps not permanently, beyond the means of their control.
—The article was first published in CIO
Insight. For more stories please visit www.cioin-
sight.com.
Many CIOs have been trying to unify business processes via application integration projects that make sure there is a single truth manifesting itself across every business application
$131bn will be the Size
of public cloud
market by 2017
ci sco c to f cu s tom s e r i e s
23 07 MARCH 2013 cto forumThe Chief
TeChnologyoffiCer forum
ci sco c to f cu s tom s e r i e s
Simplifying IT Management Through Cisco’s UCSIn a series of interactive articles, Cisco will shed more light on its Unified Computing System (UCS), thereby enabling CIOs to better manage their IT infrastructure
How can UCS help me in simplifying management of
my IT resources?Dinesh Kaushik, Head IT, Caparo IndiaAnswer: Management solutions for an integrated data center infrastructure must help monitor the network and storage resources required by the computing platform. Complexity in server management software can increase as more products are used to develop and maintain an integrated infrastructure. Additionally, each component vendor will bring its own management interface and communication protocols.This simplification changes things for the better because it takes a lot of complication out of the equation.The Cisco UCS Manager runs embed-ded in the fabric interconnect and helps manage all components of the Cisco UCS with Intel® Xeon® pro-
cessor through a single pane. Manag-ing the server, networking, and storage resources with a unified approach greatly decreases complexity, providing the capa-bility to deploy and alter applications quick-ly through the innovative use of policies, role-based access control (RBAC), service profiles and templates.
Cisco’s UCS is no doubt an inno-vative solution. However, would
deploying this lead to vendor lock-in? How compatible is it with other IT infrastructure/solutions?Manoranjan Kumar, CIO, Kanoria Chemicals & IndustriesAnswer: Deploying Cisco UCS with Intel® Xeon® processor will not result in a vendor lock-in. The difference lies in the architec-ture which provides a significant advantage based on how it is implemented. Standard Intel x86 processors are beneficial both from a connectivity and a management perspectives. Cisco UCS supports most
operating systems commercially avail-able as well as third party storage devices. Therefore, it can be easily integrated along with any existing infrastructure.
The following link gives the interoperability matrix with other vendors: http://cisco.in/ucs/matrix
To learn more, you may also visit us at cisco.in/servers
BROUGHT TO YOU BY
Intel®, the Intel® logo, Xeon®, and Xeon® inside are trademarks of Intel® Corporation in the U.S. and/or other countries
For any queries regarding Cisco UCS, please send them to [email protected]
the finger-friendly
apps
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
24 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
The introduction of social, mobile and cloud technologies has changed the way billions of people around the world communicate with each other. It has had an impact on enterprises too. The result has been that businesses
today are transitioning from complex, desktop-optimised applications to light, user-friendly applications that work
seamlessly on mobile devices. Vendors have taken the cue and are increasingly developing such apps.
CTO Forum take a closer look at some such enterprise applications and how CIOs are leveraging them.
By Atanu Kumar DasDesign By Pradeep G Nair
t h e f i n g e r- fr i e n d ly a pp s COVE R S TORY
25The Chief TeChnology
offiCer forum 07 march 2013 CTO fORum
Gone are those days when enterprise applications were complex solutions that were delivered through desktops. With the emergence of consumerisation
of iT, employees now expect applications to be available on their mobile devices anywhere and anytime. They also want them to be simple to use. Vendors are increasingly align-ing their product development strategies in line with this trend. The success or failure of any enterprise applications is directly related to its ease of use. Analysts believe that 80 percent of enterprise applications succeed in today's envi-ronment because of their ease of use.
According to hirak Kayal, Vice President, Applica-tions Product management, oracle india, “As an enterprise technology leader, oracle offers a huge number of business applications across the stack and to companies in every domain. We believe that a user-friendly and simple interface is the primary user-need for every single business application. This is an area where oracle has been carrying out signifi-cant amount of work across the applications product portfolio. user experience is not just the ease of navigation through the application. it’s much deeper.
We have been enhancing the whole way a user works in the application to get his / her work done.”
“having actionable insights telling the user what best to be done, when to be done and how to be done through a simple and intuitive user interface is what improves his / her productivity to a great extent. That’s what improves the overall user-experience of the system. it does not stop at desktop user experience alone. We are extending similar experience through hand-held mobile devices and tablets as well. A user can access the application through these devices and be able to not only execute transactions but also have access to embedded analytics to support his/her actions,” he says.
for example, the company claims that one of its solu-tion suite, oracle fusion applications, leverage years of in-depth, customer-driven research and design to create a next-generation user experience. user-experience in oracle fusion applications is designed to leverage the power of oracle fusion middleware, business intelligence and embedded social collaboration. With oracle fusion applications, organisations will move beyond simply com-pleting transactions to gaining real business insight. The
innovative apps,amazing experience
vendors are developing enterprise applications that are user-friendly and light on the bandwidth
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
26 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
oracle fusion applications user experience puts users at the center. The user discovers what he/she need to know and the result is a dramatic improvement in end-user productivity, according to oracle.
We are in the midst of a computer revolution – cus-tomers, employees and partners are all empowered. The introduction of social, mobile and cloud technologies has changed the way billions of people around the world com-municate with each other. more than 150 million social conversations are happening every day. more than 1.7 bil-lion touch devices were shipped in 2012. over half of Ceos surveyed in iBm’s 2012 study expect that social channels will be the primary way of engaging customers within the next five years. Companies now realise that they must con-nect with their customers, employees, partners and prod-ucts to become customer companies.
one of the important aspects about the growing popularity of building social networks is to have user-friendly interfaces.
As Sidharth malik, AVP india, Salesforce.com says, “The growing popularity of social networks like face-book and Twitter has made feed-based user interfaces the new standard when it comes to consumer applica-tions. When Salesforce.com started, we asked why couldn’t business applications be as easy to use as Amazon.com. Today, we are asking why business appli-cations can't be as easy to use as facebook. All of our enterprise applications, including the Sales Cloud, Ser-vice Cloud and marketing Cloud, have award winning, intuitive and easy to use user interfaces. each applica-tion also integrates with Salesforce Chatter, the number one enterprise social network.”
With Chatter, enterprises have the power to leverage the social features popularised by facebook and Twitter -- such as profiles, status updates and real-time feeds in a secure enter-prise environment. Chatter’s user-friendly, feed-based user-interface lets employees “follow” documents, people, business processes and application data, and companies can connect content and applications from any source, gaining valuable insight into what is happening across the entire business.
The results of providing employees with such a user-friendly interface are clearly visible. There is a new level of productivity that crosses departments and organisational barriers because the insights are pushed to users in real-time.
Today with more than 100,000 customers, salesforce.com is the only company delivering a next generation customer plat-form that enables companies of all sizes to revolutionise the way they sell, service, market and innovate.
Delhi-based company Crmnext's Ceo nishant Singh also feels that it is very important for vendors to focus on ease of use of enterprise applications.
he says, “i strongly believe that it is becomming increas-ingly important for vendors to provide user-friendly interface.
When we started our company eight years, we realised that 50 percent of Crm applications failed. We were adamant to
find the reason for the same. We did four years of r&D and concluded that one of the primary reasons for the failure was because the applications were very difficult to use. They lacked simplicity.”
“Another important factor is enterprise applications should have the ability to be accessed from remote locations. The legacy apps had to be accessed from inside the office. our product was designed keeping in mind the usability factor and needs of the employees,” he says.
Satisfied customersone of the biggest customer for Crmnext is hDfC Bank. four years ago, the bank was looking for a Crm applica-
“The growing popularity of social networks like Facebook and Twitter has made feed-based user interfaces the new standard when it comes to consumer applications”
Sidharth Malik, AVP India, Salesforce.com
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
28 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
The Cloud Is Here. Join Us To Secure It Now.Founded in 2011, CLOUDSEC summits are Asia Pacific's leading cloud security events for CXOs and senior managers. These events are vendor-neutral and features presentations by industry experts who will address a wide spectrum of real-world challenges and strategies in cybersecurity today.
Back by popular demand, CLOUDSEC 2013 will continue to inspire and direct our path towards the cloud, guided by the theme “Have A Safe Journey”. The events will be held in gateway cities in the Asia-Pacific region.
Date : Wednesday, 10 April 2013Time : 8:00am onwardsVenue : Grand Hyatt, Mumbai
CLOUDSEC 2013 INDIAMUMBAI
Date : Friday, 12 April 2013Time : 8:00am onwardsVenue : Inter-Continental Eros, New Delhi
DELHI
Turbocharge your cybersecurity today.
:rosnopS dnomaiD:yB detsoH Regional Supporters:
SIGN UP NOW SEATS ARE LIMITED
To Register call - +91 8452949090For more information, please visit
www.cloudsec.co
2010-11. The quality of documentation improved from 60 percent to 97 percent in november 2011.
The effect of social mediaToday a brand gets mentioned in social media a lot more than we could have imagined. A single customer view about customer service or product benefit or organisation culture play a huge role in influencing prospective custom-ers or potential hiring candidates.
“Taking into cognizance the change of tide towards social media and its benefits, oracle has designed its cloud-based as well as on-premise applications with a social element incorporated. oracle’s Social relationship management (Srm) solutions are a good example of this. They help organisations transform their corporate business processes and systems, with innovative social collaboration, market-ing and insight services. it provides a complete platform to execute social media strategy for an enterprise,” adds Kayal.
oracle Srm suite is an integrated enterprise service that enables companies to listen, engage, create, market, and analyse interactions across multiple social platforms in real-time, providing a holistic view of the consumer.
oracle social network comes packaged with oracle fusion Crm for enterprise wide collaboration. oracle
social network is a secure private network that provides a broad range of social tools desaigned to capture and preserve information flowing between people, enterprise applications, and business processes. By connecting users with most critical applications, oracle social network provides contextual, real-time communication within and across enterprises. With oracle social network, users have the tools they need to collaborate quickly and efficiently, while leveraging the organisation’s collective expertise to make informed decisions and drive business forward. it is therefore, critical to have a user-friendly interface that is known to users and is simpler to collaborate on.
“oracle social network can be accessed anywhere and
tion that could manage its 55,000 users. The prior Crm application which the bank was using was not able to integrate different applications into one. The result was that it had become tedious for the bank employ-ees to work on.
“The mandate was to manage the customers of hDfC better. They were looking for a Crm product which could be positively evaluated on three key parame-ters. first, a product with architecture capable of managing over 55,000 users serving over 25 million customers. Sec-ondly, they needed a Crm solution with integration capa-bilities that was reliable and capable of managing complex and diverse scenarios while retaining traceability. lastly, the bank needed an implementation partner with banking domain knowledge and capability to execute the vision. Above all, the solution had to be user-friendly,” says Singh.
Crmnext created multi-wave process workouts to ensure unification and consolidation of all unstructured processes (that ran on excel) and semi automated processes. it phased out six applications such as lead tracking system, customer contact management, etc. Crmnext integrated with seven core systems to provide end-to-end status vis-ibility. Process T-A-T was guaranteed by alerts and multi-stage escalations across departments and channels by using mobile and two-way SmS capabilities to create leads, update status, request for customer offers, etc.
This resulted in a whopping jump in hDfC's customer base by 150 percent. Assets' business grew by 100 percent over 2008 levels. number of leads captured per month from September 2010 to march 2012 increased by 275 percent. There was an increase of 32 percent in lead con-version from the financial year 2009-10 to financial year
“I strongly believe that it is becomming increasingly important for vendors to provide user-friendly interface” Nishant Singh, CEO,CRM next
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
30 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
anytime from a variety of interaction points including a web browser, outlook application, or mobile and tablet devices. each client provides a rich experience through form factors specific to the devices they run on. outlook integration bridges the social experience between oracle social network participants and their email. oracle social marketing enables creation of social content and publish-ing. oracle social engagement and monitoring helps an enterprise track social activities around their brand and analyse effective roi on various social campaigns. our recruitment solutions help enterprise leverage the power of social media to source candidates,” adds Kayal
Social collaboration is absolutely integral for companies and malik also feels the same. he says, “in the midst of today’s computer revolution, we cannot afford to live and work in silos. Social collaboration in the enterprise breaks down barriers across departments and regions, improving transparency, productivity and engagement. Sales teams can collaborate close more deals faster. The C-Suite can have unprecedented transparency across their organisation to drive innovation. ”
Design and technologyDesign and choice of technology is extremely important for an enterprise grade application. no application can be developed without planning out the design archi-tecture of it. The design of user interface is the key to deliver a system of engagement.
“Design of oracle fusion applications user-interface relies on years of customer usage data, feedback and analytics. every step has to be considered in great detail to be able to build a successful and easy-to-use application. Choice of technology should also enable us to execute and deliver the designed application. for example our ADf mobile platform completely enable us build mobile applications once and render natively across multiple mobile operating systems. it’s a combination of design and technology which plays a significant role in delivering a user friendly application. We
embarked on the design principle and tech-nology choice for fusion applications quite a
few years back and good part is that the strategy remains unchanged. That means we have been
moving in the right direction,” said Kayal.
Security issues There have been concerns among enterprises that security features will get compromised if the vendor develops an application which is too simple and easy to use. Kayal feels that vendors are today working towards providing security and also offer a simple platform.
“it is definitely possible to develop secure enter-prise applications while keeping them simple and easy to use. That’s why the choice of technology and design framework is so important. While the design and technology layer enables us to deliver the desired user-experience, security is ensured across multiple layers from hardware, operating system, database to application layer. oracle owns the entire stack and hence we are most capable to offer secu-rity across the stack. oracle has a number of secu-rity solutions and suites that can be integrated into applications to make them secure and robust.”
oracle identity management is a complete and inte-grated, next-generation identity management platform that provides breakthrough scalability; enables organisa-tions to achieve rapid compliance with regulatory man-dates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Security does not only come from software capabilities. Physical security is also extremely important as well for cloud applications.
“Oracle social network can be accessed anywhere and anytime from a variety of interaction points including a web browser, outlook application, or mobile and tablet devices”
Hirash Kayal, Oracle
t h e f i n g e r- fr i e n d ly a pp s COVE R S TORY
31 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
M3m india limited, a property development and real estate firm based in gurgaon, has evolved from a realty advisor to a designer of luxury
residential and commercial properties. m3m india owns more than 500 acres of land in gurgaon, Delhi and nCr. m3m india’s business has developed through three phases: acquiring and consolidating land and licenses; construction development and marketing; and maintenance. in 2010, the company began the devel-opment phase and decided its existing home-grown accounting system no longer met its requirements.
Challenges“We needed a simple enterprise resource plan-ning (erP) system to manage financials, sales, and projects across all of our locations,” said gaurav Jain, vice president – finance, m3m india lim-ited. “if we continued using our existing account-ing system, we would have required additional applications to manage key business processes.”
in early 2010, m3m india engaged oracle Partner filix Consulting to deploy oracle e-Business Suite release 12.1.2 modules: oracle financials, purchasing, property manager, inventory management, and Crm on demand.The integrated system streamlined financial and inven-tory management processes, improved sales lead man-
agement, and made it easier for staff to manage and complete property sales.
“oracle e-Business suite and oracle Crm on demand supported the expansion of our property portfolio across all locations. The best part of the application was its ease-of-use features, ” said Jain. “These applications provided us with the right financial, inventory, and sales data in real-time, ensuring our customers received a sat-isfactory level of service at all times.”
Improved Reporting with More Secure Datam3m india used oracle financials to process all transac-tions—including administrative expenses such as sala-ries and general office purchases—and project expenses, such as raw materials required for property construction and development, like cement, steel, and furnishings.According to Jain, oracle financials provided the compa-ny with security and data management capabilities that were not available with its previous accounting system.“oracle financials was capable of handling thousands of transactions, providing us with a system that will sup-port future growth,” said Jain. The system also offered a high level of data security. We can assign a staff member to only perform a certain task at a particular time and it meant connectivity in remote locations.
M3M India used Oracle financials to process all transactions, including administrative expenses and general office purchases
m3m ups sales by using oracle app
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
32 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
“for example, if we have one staff member responsible for invoicing processing, i can restrict his or her access to certain parts of the system that are used only to pro-cess payments.”
oracle financials also enabled m3m india to gener-ate expenditure reports and reports related to indian tax regulations immediately, using clean and reliable financial data.
“We can now generate any financial report almost immediately,” said Jain. “Previously, we would spend two to three days gathering information from spread-sheets to generate any type of financial report.”
More Control over Purchasingm3m india uses the centralised oracle purchasing appli-cation to order raw materials used to construct proper-ties and purchase office products from various suppliers. The system enabled cost control by monitoring product orders, determining if purchases have been received, and processing invoices easily.
“As this business grows, oracle purchasing will become more and more beneficial,” said Jain. “We are hoping to get to the point where one less person is involved in processing each order.
“oracle purchasing ultimately provided us with peace of mind that the correct information is available to every-one involved in purchasing. The system also reduced the chance of unauthorised purchases across our business because we have control over the movement of packages from the time an order is placed to when it is received.”
Better Customer Service with Centralised Systemoracle property manager provided a central data reposi-tory that enabled m3m india to record customer infor-mation and more easily and effectively manage property sales. The web-based system provided sales executives at several locations with the latest stock information. This
ensured they can find relevant information immediately when customers call.
“for example, if a customer inquires about the status of their payment for a property, we can access the rel-evant information for that customer immediately,” said Jain. “This ultimately improves the service we provide to our customers.”
Solutions enabled accounts staff to generate financial reports
almost immediately rather than spend two to three days gathering data from spreadsheets Provided data security features
that restricted unauthorised staff from accessing certain financial information Prevented staff from making unauthorized purchases
by providing complete control over the procurement of office items and raw materials improved customer service levels by providing a cen
tral data repository to store client data and more effec tively manage property sales Provided insight into inventory at construction sites,
which ensured staff always had the right amount of stock and projects were completed on time ensured staff followed sales leads, which helped
increase property sales by 10 percent Saved 50 percent on software, hardware and mainte
nance costs with the hosted oracle Crm on Demand application.
Implementation ProcessDuring the first phase of the project, m3m engaged filix Consulting to deploy oracle financials, purchasing, proper-ty manager, and inventory management. filix also deployed oracle Crm on demand during the same phase. “We were india’s first real estate company to go live with oracle Crm on demand and oracle e-business suite release 12, achiev-ing this in only four months,” said Jain.
“we were india’s first real estate company to go live with
oracle crm on demand and oracle e-business suite
release 12, achieving this in only four months”
Gaurav Jain, VP, Finance, M3M India Limited
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
32-B 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
ask the expert
Dr Mahipal Sachdev Founder, Centre for Sight
Q: Centre for Sight is India’s second-largest ophthalmology chain with 44 centers across the country. We expect a turnover of more than ̀ 125 crore this fiscal. The company has successfully leveraged private cloud to achieve real-time multi-location, multi-business integration. We are now looking up to our IT team to further strengthen this initiative and make Centre for Sight a more resilient organisation. What solutions can I expect from my IT team when it comes to business intelligence, asset management and new-age disaster management?
A: There are many resilient and robust applications that are available on a cloud model including ERP, DW/BI and Disaster Recovery (DR). Disaster Recovery organisations can also look to deploying a public cloud, because they will not have to invest in trained manpower. As the DR datacenter can be owned by service providers to run these services, there will be no investment on the setting up of the DR datacenter. For the rest of the applications, the existing environment needs to be examined. If the current running applications have additional modules available, which are well tested and integrated for BI, CRM, SCM etc., they would enable easy integration. Many other standard applications are also available that can help get the datacenter upto speed on these aspects.
Ashish WattalNational Product Manager– UCS Cisco India & SAARC
ADVERTORIAL
ci sco c to f cu s tom s e r i e s
37 07 february 2013 cto forumThe Chief
TeChnologyoffiCer forum
ci sco c to f cu s tom s e r i e s
Next Gen UCS servers for Next Gen ComputingIn a series of interactive articles, Cisco will shed more light on its Unified Computing System (UCS), thereby enabling CIOs to better manage their IT infrastructure
How has Cisco made server I/O more powerful and
much simpler?Answer: One of the key differentia-tors of Cisco UCS (Unified Comput-ing System) with Intel® Xeon® processor is the way in which high-capacity server network access has been aggregated through Cisco Virtual Interface Cards and infused with built-in high performance virtual networking capabilities. In “pre-UCS” server system architectures, one of the main design considerations was the type and quantity of physi-cal network adapters required.
Networking, combined with comput-ing sockets/cores/frequency/cache, system memory, and local disk are historically the primary resources considered in the balancing act of cost, physical space and power consump-tion, all of which are manifested in the
various permutations of server designs required to cover the myriad of workloads most efficiently. Think of these as your four server subsystem food groups. Architec-ture purists will remind us that everything outside the processors and their cache falls into the category of “I/O” but let’s not get pedantic because that will mess up my food group analogy.
In Cisco UCS, I/O is effectively taken off the table as a design worry because every server gets its full USRDA of net-working through the VIC: helping por-tions of bandwidth, rich with Fabric Extender technology vitamins that yield hundreds of Ethernet and FC adapt-ers through one physical device.
Gone are the days of hemming and haw-ing over how many mezz card slots your blade has or how many cards you’re going to need to feed that hungry stack of VM’s on your rack server.
This simplification changes things for the
better because it takes a lot of complication out of the equation.
There is also a need for higher processing power for bringing
new choices for design optimization. What is happening on this front?Answer: Cisco has been working hard making server networking better with improved and optimized efficiency. With the advent and advance of multi-core pro-cessing, the workhorse two socket server has become a real performance monster. In fact, for some applications the amount processing power required, relative to the other food groups I mentioned in my previ-ous answer, is outstripped by the capabili-ties of the mainstream processor family, which in today’s incarnation is Intel’s Xeon E5 2600 series.
In response to this phenomenon, Intel subdivided the Xeon lineup to include a new “EN” class of processors, the E5-2400 series, which ease back on the gas pedal of Moore’s law for designs that don’t require as much processing power in relation to local storage and memory. This creates a new class of cost & performance optimized systems for lighter workloads or for stor-age heavy systems (think big data) at the entry end of the portfolio.
Three of our new UCS M3 series systems fall in this category: the B22, C22 and C24. At the same time, Intel has brought four socket server options, formerly the prov-ince of the mission critical, “EX” end of the spectrum, down into the mainstream. An example of this is our new UCS B420 blade. So if you want four socket core count and performance but don’t necessarily need the comprehensive RAS features of an EX class system, you now have a price/performance optimized solution for that need.
BROUGHT TO YOU BY
Intel, the Intel logo, Xeon, and Xeon inside are trademarks of Intel Corporation in the U.S. and/or other countries
For any queries regarding UCS, please send them to [email protected]
What are your views on vendors developing applications/solutions that have a user-
friendly interface? How important it is for enterprises?Vendors are today concentrating on developing enter-prise applications that have a user-friendly interface. As per data available with gartner, eight out of 10 enterprise applications succeed only because they have a user-friendly interface. And the primary rea-son for their failing enterprises is because they lack an interface that is attractive to the user. Be it SAP, oracle, microsoft or Salesforce, the core idea is to pro-vide a platform that is as easy to use as is facebook or linkdin. enterprise users are increasingly demand-ing simplicity in their apps. So today the vendors are concentrating totally on improving the end-user expe-rience. i remember once SAP had to revamp an entire application just because it was not user friendly.
Why do you think there is demand among enterprises to use applications which have
a user-friendly interface?i think the demand is primarily because of the experience that users have by using social tools in their mobile. Today, there is a very thin line between office experience and personal usability. employees want the same look and feel when they come to work and they do not want to work on multiple platforms to complete a task. The vendors are working on developing enterprise applica-tions that can give on-premise access as well as mobile access. The idea is to optimise the license usage. earlier, enterprise used to buy licenses and they were left unused because of the cumbersome interface and this led to loss of productivity. But, now vendors are aware that usability is the key cri-teria for success.
Sunil Padmanabh, Research Director, Gartner India, talks to Atanu Kumar Das on the importance of developing apps with a simple interface
“making apps user-friendly”
COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s
34 07 march 2013 CTO fORum The Chief
TeChnologyoffiCer forum
What are the challenges in developing an application/solution which has a user-
friendly interface?The most important challenge that i feel is to make the application simple to use. Vendors try and bundle all the functionalities in one enterprise application. This makes the solution not just complex but also cumbersome for end users. meanwhile, corporates want applications that have modules, which can be accessed by specific departments. Today, users also want gamification experience in their applications, which also poses a challenge for the vendor. i feel a user-friendly app is one that is intuitive, content-specific, should designate appropriate business roles and should have dynamic analytical features. The need of the hour is to develop applications that can run on any and every platform, be it on the desktop or on a mobile device. employees today want flexibility to work from anywhere on any device and that should be the primary concern for vendors developing enterprise applications.
Can enterprise applications stay user- friendly if we implement strong security
features?one of the most integral part that enterprises look at is security but vendors should ensure that security features at the back-end should not be a deterrent in developing a user-friendly interface. The problem is that enterprise vendors mostly concentrate of application security as well as data security. The trick is to concentrate on the data security as that is the primary concern of the enterprises and keep the interface simple. Security is important but it should not be over engineered, there should be a balance between the functional needs. There have been many instances where enterprise applications have
failed primarily because vendors have tried to concentrate too much on security and less
on developing simple usability of the application. So there should be an equal mix of both security features and easy-of- use as both are integral for the applications success.
What are the key features that an enterprise looks for while deploying an application?Some of the key features that enterprises look for in an application is support for multiple mobile plat-forms. Be it Apple, Android, BlackBerry or Windows, the vendors should be developing applications that supports all these platforms. An enterprise applica-tion store should allow the applications to be down-loaded on the device from the browser via a url or through an enterprise market application which is similar to the google Play Store or iTunes App store. Another important feature is security and application with downloads happening on a secure VPn tunnel.
Where do you see enterprise applications heading in the future?
in the future, i foresee that vendors would concentrate on making enterprise applications more simpler to use. The idea would be to integrate with legacy as well as modern applications and provide a platform which is scalable and flexible. The vendors will concentrate on improving the user experience as this is the key to building a successful enterprise application.
“The problem is that enterprise vendors mostly concentrate of application security as well as data security. The trick is to concentrate on data security”Sunil Padmanabh, Research Director, Gartner India
t h e f i n g e r- fr i e n d ly a pp s COVE R S TORY
35 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
'The Innovation Steeplechase'In his or her mind, each of us wants to be 'innova- tive'. Innovation is the new mantra for success for corporations and individuals within them. It is the answer to problems of growth, profitability, produc- tivity, and organisational logjams. It is also the ready response expected from 'leaders' - functional or otherwise.
But like leadership, innovation remains elusive and daunting.
How does innovation come about and how can you bring it about - across the organisation or within your department? Most CXOs feel constrained due to 'too much to do in too little time'... and therefore none left over to innovate or fight deeply entrenched systems that come in the way of change. Equally inertia could result from the feeling that what you do is too mundane to innovate. Misconceptions around innovation only make 'getting started' tougher!
Given how critical innovation is for raising the bar - every time, every day - the 9.9 Leadership Institute is launching a series of 'Innovation Workshops' to help with 'winning the innovation steeplechase' irrespective of where you are in the race - before the start line, in the uncertain middle, or closer to the finish line...
FOR MORE INFORMATION CONTACTEmail: [email protected]: +91-9999799614Email: [email protected]
What the '9.9 Innovation Team' can do for you...Companies and senior executives are grappling with answers to one or all of the questions below in the innovation context.
The HowHow do I execute and implement?Here we offer our Creativity & Innovation Toolkit to help you kickstart the process to:- Deliver specific outcomes- Sustain the process- Embed programmes to influence the DNA of the organizationIf you are unaware of the one right problem to solve that creates "unfair" advantage for your organization in the marketplace, then "The How" applies to you.We offer Initiation Workshops; Toolkits; Projects and Embedding Programmes - with durations ranging from 2 hours to 2 days to 2 months and beyond.
The WhyWhy should I innovate? Can I be innovative?This question is answered through awareness around innovation, including:- Addressing myths and
misconceptions- And why each one of us can be
'innovative'If you spend all your time making tiny process improvements and watching competitors steal your customers with innovative new products and services, then "The Why" applies to you.
The WhatWhat areas should you innovate for maximum benefit?We outline areas where innovation can deliver serious benefits and identify the most popular application areas across organisations. The most obvious approaches begin with a need for:- Topline growth- Bottomline improvementYour business is going fine, sales and profits are a bit flat perhaps but they will pick up... or will they? If this is your concern, then "The What" applies to you.
Depending on which of these questions dominates your thoughts around innovation, the 9.9 Innovation Team will design a workshop or programme for you and your team.
'The Innovation Steeplechase'In his or her mind, each of us wants to be 'innova- tive'. Innovation is the new mantra for success for corporations and individuals within them. It is the answer to problems of growth, profitability, produc- tivity, and organisational logjams. It is also the ready response expected from 'leaders' - functional or otherwise.
But like leadership, innovation remains elusive and daunting.
How does innovation come about and how can you bring it about - across the organisation or within your department? Most CXOs feel constrained due to 'too much to do in too little time'... and therefore none left over to innovate or fight deeply entrenched systems that come in the way of change. Equally inertia could result from the feeling that what you do is too mundane to innovate. Misconceptions around innovation only make 'getting started' tougher!
Given how critical innovation is for raising the bar - every time, every day - the 9.9 Leadership Institute is launching a series of 'Innovation Workshops' to help with 'winning the innovation steeplechase' irrespective of where you are in the race - before the start line, in the uncertain middle, or closer to the finish line...
FOR MORE INFORMATION CONTACTEmail: [email protected]: +91-9999799614Email: [email protected]
What the '9.9 Innovation Team' can do for you...Companies and senior executives are grappling with answers to one or all of the questions below in the innovation context.
The HowHow do I execute and implement?Here we offer our Creativity & Innovation Toolkit to help you kickstart the process to:- Deliver specific outcomes- Sustain the process- Embed programmes to influence the DNA of the organizationIf you are unaware of the one right problem to solve that creates "unfair" advantage for your organization in the marketplace, then "The How" applies to you.We offer Initiation Workshops; Toolkits; Projects and Embedding Programmes - with durations ranging from 2 hours to 2 days to 2 months and beyond.
The WhyWhy should I innovate? Can I be innovative?This question is answered through awareness around innovation, including:- Addressing myths and
misconceptions- And why each one of us can be
'innovative'If you spend all your time making tiny process improvements and watching competitors steal your customers with innovative new products and services, then "The Why" applies to you.
The WhatWhat areas should you innovate for maximum benefit?We outline areas where innovation can deliver serious benefits and identify the most popular application areas across organisations. The most obvious approaches begin with a need for:- Topline growth- Bottomline improvementYour business is going fine, sales and profits are a bit flat perhaps but they will pick up... or will they? If this is your concern, then "The What" applies to you.
Depending on which of these questions dominates your thoughts around innovation, the 9.9 Innovation Team will design a workshop or programme for you and your team.
38 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
Internet is a medium with which we fabricate a social contract to communicate with each other
POINTS5
Much hay has been
made over the use of
the term ‘Cyberspace’
The inTerneT was
born with the idea
of sharing data and
to connect systems
(nuclear weapons
primarily)
in gibson’s universe, people
‘jacked’ into the
internet and left their
bodies behind for a
digital domain
cyberspace is in
fact what is between
our ears
cyberspace is only a space in the
cognitive dissonance
t E cH f or G oVE r NAN cE cyb e rs paceim
ag
ing
BY
an
il.t
CyberspaCe: It’s a MedIuM,Not a plaCe
39 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
lately i have been focusing more on the cognitive, social, and psychological issues surrounding the human animal and the technological interface that we have created for communicating with one another. The internet was born with the idea of sharing data and to connect systems (nuclear weap-ons primarily) during a time of war after regular infrastructure may be destroyed. it has morphed since then to encompass much more of our daily lives. not only from the methods we use to pay our bills but also sociologically by the invention of social media. Along the way we humans also created a mystique around this new technology that was futuristic and cool. The name that was coined for this ideal was put forth before the internet was born by Wil-liam gibson in his book “neuromancer” it was this presaging of the idea that not only would we someday in the future be able to communicate with people on a network of computers, but also that we would actu-ally live on the “net” in gibson’s universe people “jacked” into the net and left their bodies behind for a digital domain with imagery that felt real and technologies that could kill your physical body while you were linked to cyberspace. it was really from this coining of the term and it's cool factor that it began to catch on as we developed the technologies of the internet and the means to interface with it more graphically. hackers gravitated to the word as well as war fighters early on but it really did not
not the modern lexicon until more recent times with the advent of APT (Advanced Persistent Threats) and Stuxnet where mal-ware and espionage met and small conflicts were waged. Suddenly the sexiness of Cyber which really also more commonly was used with the term “sex” after it became the word of the day and once tagged with war became the de facto term for a new kind of warfare. …. But, lets go back to this notion of “cyber” being a place. is it in fact a place? Can one inhabit it? or is it just a medium by which data is passed between systems and people to communicate? i would say that both of the latter are the reality and that clothing the medium in a sexy terminology leads to too many misapprehensions about the realities of what exactly is going on when one goes to war in it. As if anyone really can.
Sociology & LinguisticsWhile the internet was originally con-ceived as a network to send data and com-municate between systems it has become much more societally today to us all. it is the primary means of communication for people via phones, computers, and other types of interfaces. it is this fact, that more-over the social aspects of the internet and its important to society have become the primacy that we need to investigate it as a mirror to our natures. it is our nature that is effecting the direction of the technology.
in the realm of the information security world i have been moving more and more
away from the strict notions of defense and offense via technological means alone toward a more comprehensive understand-ing of the why and the how of the adver-sary's aegis instead of primarily looking at the vulnerabilities and the outcomes of their being used.
This shift for me has widened the scope quite a bit and it became clear to me that by looking at the problem between the key-board and the computer is a key to a better 360 degree process that we could use to manage our vulnerabilities more effectively. By studying these new sciences (Cyber-Psychology & Cyber-Sociology) i think that we can get a much better handle on creating a more secure environment to start as well as a more holistic means to information security on the whole.
once again, the medium is just the means of communication though that does evolve the communication and lay the groundwork for social change. mores, ideas, and language all effect the society broadly. in this case the medium of the internet or “cyberspace” as a modality is having real world consequences due to the hyper connected nature of it all today. Ponder the future connectivity as we move from Web 2.0 to 3.0 as well. how much more will the medium, which now can effect our daily lives in good as well as terrible ways directly enable us to further or destroy society up to the physical in the case of infrastruc-ture (grid security etc.
Cognitive DissonanceThe key point that i want to make in this first of perhaps a few blog posts on all of these ideas is that the human behind the keyboard is just as important if not more important than the keyboard and CPu they wield. it is also important to set forth that cyberspace is only a place in the cognitive dissonance that we are all deluding our-selves into believing. in reality cyberspace is in fact what is between our ears and the internet is a medium with which we fabri-cate a social contract to communicate with each other, and potentially wage war. By understanding the tool user and their moti-vations you can understand the tool. —This article is printed with prior permission
from infosecisland.com. For more features and
opinions on information security and risk man-
agement, please refer to Infosec Island.
Much hay has been made over the use of the term “Cyberspace” since all this talk about cyberwar has been bandied about. i for one have also been one of the more vocal personages yelling online and off about the use of the term or more to the point its over-use and lack of real context. i consider it a bit of a pet peeve really but i started to think about it much more recently and think that it’s time to put down some ideas that have been in my head about cyberspace.
cyb e rs pace t E cH f or G oVE r NAN cE
40 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
t E cH f or G oVE r NAN cE re g u l at i o n
It’s a common problem. A company learns that a former employee copied confidential computer files--proprietary source code, marketing plans, customer lists and pricing information--before leaving and has used the information to start a compet-
ing business or has shared it with a competitor. The first instinct is to challenge the conduct as a misappropria-
tion of trade secrets. After all, the company marked the files as confidential information and had a company policy requiring employees to keep such information secret. unfortunately, this may not be enough to prevail on a trade secret claim.
effective action to combat this threat includes the use of a full array of legal weapons. Copyright pro-tection, however, is often overlooked in the battle to defend corporate secrets. This oversight is a mistake, given the advantages under copyright law for challeng-ing information theft.
Proving the existence of a trade secret involves more than merely showing that work was designated as confidential. A party claiming a trade secret must show that the claimed work has value because it is a secret and that the claimant has taken reasonable efforts to maintain the work as a secret. Confidentiality designa-tions alone are not necessarily sufficient. An example of the diffi-culty of proving trade secret rights is presented in the illinois case of liebert v. mazur, in which the plaintiff was unable to protect its customer list. The dispute involved a former salesman for a heat-ing and cooling equipment distributor who copied customer files from the company’s computer system before leaving to work for a competitor. The court concluded that the list was sufficiently secret and had economic value to satisfy part of the test for being a trade secret. But the plaintiff failed to show that it took reasonable steps
to maintain the work as a secret. instead, it appeared that employ-ees and others had copies of the list without specific restrictions on its distribution. The owner of a trade secret must take affirmative action to protect a trade secret’s confidentiality. it is important that employees who have access to a trade secret take steps to prevent its unauthorized disclosure, whether on the internet, by word of mouth or otherwise. All proprietary materials should be marked as such, denoting that they should be kept confidential and are con-sidered proprietary. Access to the trade secret should be limited to
those individuals with a need-to-know. Procedures for maintaining confidentiality should be implemented and enforced. if disclosure to employees and third-par-ties is necessary, those who are granted access to trade secrets should sign nondisclosure and confidentiality agreements. These issues relating to a trade secret are fact intensive and can be difficult and expensive to prove at trial. A copyright claim, in contrast, is much easier to establish as it is based on objective facts. To prevail on the copyright claim, a company would merely need to show that it owns a valid copyright, that there was access to the original and that the allegedly infringing work is identical or substantially similar to
protectable elements in the original. in our experience, the test for creating a work protected by copyright — original, tangible expres-sion — is easily met by confidential business records. Similarly, the test for infringement is easily met when an employee directly copies files protected by copyright. if you are required to go to court to prove your claim, it will generally be much quicker and cheaper to prove a copyright case.—This article was first published in CIO Insight. For more stories please
visit www.cioinsight.com.
Legal Weapons to Fight Info TheftCompanies should use trade secret and copyright law to maximise their ability to protect confidential information By Mark V.B. Partridge
124%was the surge in
sales of windows
phones in q4 2012
Ca d e n Ce c to f cu s tom s e r i e s
41 07 March 2013 cto forumThe Chief
TeChnologyoffiCer forum
Future-Proof
TE Connectivity’s superior cabling solutions helped Cadence not only make their datacenter expansion meet design specification at the right cost but also reduced its carbon footprint
Cadence's IT team, which provides sup-port to the San Jose-based company's offices worldwide, selected TE Connectiv-ity’s structured cabling solutions: Among other operational efficiencies, Cadence was looking for, speed and quality of installa-tion, port density, easy MACs (move, add, changes), superior cable management with optimum floor space utilisation.
Together with TE Connectivity Regional Manager, Neerav Kumar, Cadence designed a LAN on Distributed Network Architecture (DNA) that facilitated easy management. Fiber backbone redundancy was maintained to each hub room from the datacenter and between the hub rooms using MPO fiber optic cabling solution. The datacenter, however, used the Centralised Network Architecture (CNA) topology with the zone cabling approach to address the increasing operational costs of network administration. This would also help ease future migrations to high-speed LANs.
Managing DensityAnother challenge was density limitation that has a severe effect on the scalabil-ity and cost of the overall infrastructure design. This complex issue in design specification was addressed through TE Connectivity’s Hi-D cable management platform that increased port density by 50 percent and allowed all 720 ports to be correctly managed within a 42u cabinet, thereby reducing the real estate footprint of the telecom room and resulting in huge cost savings as well. This was further augmented with modular plug-and-go solutions on copper (MRJ-21 solution) and fiber (MPO solution) media, which was faster to deploy and easier to maintain and use. These factories pre-terminated and tested products brought in high density and speed, reliability and scalability to the Cadence datacentre.
Says Ashwin Rao, IT Group Director of Cadence, “With TE Connectivity’s state–of-the-art modular plug-and-go solutions for copper and fiber connectivity and Hi-D connect system in the datacenter facility; Cadence is able to use space optimally with reduced cable load. We are also able to plan better cooling in our datacenter with reduced power consumption.”
“The, award-winning datacenter has PUE, or power-usage effectiveness, a measure of efficiency, of 1.23,” Rao says. This means 81 percent of all the power fed to the datacenter is used by the servers.
The solutions used in the facility accrue multiple benefits for Cadence in the short and long run: the solution on pre-terminated plug-and-go MPO fiber system is ready to take on the constant growth of processor power inside the server farms as well as the demand for faster com-munication throughout the premises. The network is ready for future bandwidth-hungry applications at today’s cost with flexibility, scalability and reliability that is warranted for the next 25 years.
When the semicon-ductor design firm Cadence Design Systems was look-ing to expand their
operations to accommodate a new, larger development center, it needed to simplify its datacentre topology to cut costs and create a network infra-structure that was secure, easy to manage, always available, and capable of adjusting to unpredictable workloads and changing business needs. The construction and setup of state-of-the-art 4000 sq ft datacenter at Noida has consolidated all servers that were earlier kept at 11 small computer rooms scattered over three buildings.
The expansion meant building a future-proof, high-speed network. An essential part of the requirement was infrastructure cabling that would sup-port bandwidth-hungry, highly available, and scalable network devices.
BROUGHT TO YOU BY
DatacentresSolutions for
42 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
N o H o LDS BArr E D A l b e r t Ku o
In a conversation with Atanu Kumar Das, Albert Kuo, GM and VP, Field Operations, Blue Coat, Asia Pacific, discusses the numerous security threats confronting enterprises in India and Asia Pacific
DoSSier
Company:Blue Coat Systems
EstablishEd:
1996
hEadquartErs:
California, US
produCts:
Proxy SG, MACH5,
K9 Web Proxy,
PacketShaper,
CacheFlow
EmployEEs:
1,250+
Addressing modern security issues
43 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
A l b e r t Ku o N o H o LDS BArr E D
What are the key security threats that Indian enterprises are facing
today? How is Bluecoat helping them in tackling these threats?Today, enterprise customers are at a risk when it comes to network security. Cyber criminals are always on the prowl. it is, therefore, imperative for oragnisations to ensure that they deploy security solutions to keep their infrastructure safe. Some of the key threats confronting enterprises are phishing, advanced persistent threats (APTs) and malware.
We, at Bluecoat, believe that enterprise security should be held upfront, and towards this end we have developed several innovative solutions. The most important thing for the enterprises is to realise the difference between normal and abnormal behaviour when they go to the web. it is also integral that they deploy filtering technol-ogy as the first layer to detect malware at an early stage.
How should Indian and Asian organisations gear up to tackle
the modern security threats in a cloud environment?enterprises in india and Asia alike are star-ing at numerous threats. The first step in the fight against such threats is to be proac-tive and deploy the best of breed security solutions. This will help protect critical data and infrastructure.
The Blue Coat cloud service is a flexible security-as-a-service (SAAS) offering that leverages the same protection and policy infrastructure deployed by the largest com-panies around the world and extends the corporate security perimeter to all devices in any location.
The cloud service can be seamlessly deployed within an existing security infra-structure and can scale on-demand to sup-port new user requirements.
As an enterprise-grade offering with a fully meshed global network, the cloud service delivers a 99.999 percent SlA guar-antee. Customers can seamlessly direct all traffic to the cloud service through a variety of deployment and connection methods, including iPSec VPn, proxy chaining, explicit proxy and client agent, to ensure consistent protection and control for all devices, regardless of location.
How is Blue Coat helping CIOs in securing their enterprise network?
one of the most important thing is to begin early. This allows the organisation enough time to conclude whether or not it has deployed the right security solution. At Blue Coat, we leverage on our core strength, which lies in addressing vulnerabilities in the web platform.
We help enterprise technology decision makers Cios by making them aware of the need to implement a fool-proof solu-tion that can protect the various enterprise applications.
Today, consumerisation of iT is a big issue in enterprises, and Cios are doing their best to address it. At Blue Coat, we regularly develop security solutions for bet-ter protection of enterprises. With Bring your own Device (ByoD) proliferating in
this region, unfortunately there has been a matched increase in the risk factors. our strategy is to develop innovative securi-ty products which Cios are yearning for. We are working towards developing solutions that can take care of all the security needs for the enterprises.
Blue Coat Ceo has publicly stated our unchanged strategy across two highly strong markets —web security and WAn optimisa-tion. We will continue to focus on these two areas in the Asia Pacific market in the com-ing months.
founded in 1996, Blue Coat provides products to more than 15,000 customers worldwide, including 88 percent of the for-tune global 500 companies.
There are CIOs who believe that offence is the best defence. What
are your thoughts on the issue?Should citizens attack criminals before the criminals get a chance to attack them? Should we arm our citizens with guns and weapons so they can shoot the criminals? it is probably not a good idea. The same is true in cyber security.
first, so many websites get spooked, there are so many botnets but there are very few companies that carry out a counterattack. Second, doing so is illegal and it is always good to follow the law.
But you are not wrong in one sense – we need a better capability to anticipate an attack to better recognise it.
So we need to share information such that if ‘A’ gets attacked and is able to see the attack we can use his experience to save ‘B’. The best defence is the thorough under-standing of the attack methodologies and information sharing for getting the ability to see the attacks.
ByoD has brought about a lot of change in enterprise working experience. We all know that ByoD has increased productiv-ity quite a bit but there are also numerous concern areas.
Some of the concerns identified by Blue Coat are ByoD device oS updates and upgrades; app downloads; photo and video uploads and downloads; ByoD backup to cloud storage or a company-issued laptop or desktop; watching recreational video on youTube; facetime and Skype video/audio conferencing; and guest wireless.
“We, at Bluecoat, believe that
enterprise security should be held
upfront, and towards this end
we have developed several innovative
solutions”
enterprises, it has opened the gates to secu-rity breaches. on his part, therefore, a Cio needs to provide selective access to enter-prise applications. This was not the case five years ago. The job of the Cio is therefore becoming more challenging. We have been in constant touch with Cios and are offer-ing customised solutions on the cloud so that the security issues can be addressed at different platforms.
What is Blue Coat's strategic vision for the Asia Pacific region in tandem
with the new market shifts?We understand that Asia Pacific is the fast-est growing market for Blue Coat. While there has been a tremendous improvement in security of enterprise applications in
NEXTHORIZONS
44 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
illu
st
ra
tio
n b
y m
an
av
sa
ch
de
v
Browsing industry newsletters, i noticed that Automation World had two related stories on new technologies. Both articles indirectly point to an
issue that industry needs to come to terms with quickly if we are ever going make our plant floors secure.
The BYOD Iceberg?let’s start with the Tablets and Smart Phones story. it is about the issue of mobile devices, especially personal mobile devices, showing up on the plant floor. never going to happen you say? i wouldn’t be so sure.
first, a definition. The topic of personal mobile devices is referred to in the corpo-rate iT world as “Bring your own Device” or ByoD. if you haven’t heard of ByoD, Wikipedia defines it as:
Bring your own device (ByoD) is a busi-ness policy of employees bringing person-ally owned mobile devices to their place of work and using those devices to access privileged company resources
A common example is using your per-sonal iPhone to access your company’s email system. And as i will explain later, the iPhone is only the tip of the iceberg. The
IT is changing constantly and we need to work from general principles By Eric ByrEs
iPhones Are Coming to the Plant Floor
45 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
mo b i l i t y N E X t H or I Zo N S
whole “Bring your own Device” (ByoD) phenomenon is a major concern through-out the corporate world.
like icebergs, mobile technology has become an unstoppable force of nature. They have invaded the corporate office – is the plant floor the next frontier?
The iceberg is a good metaphor for the onslaught of this technology. When dealing with an iceberg, pushing against it or ignoring it generally aren’t effective options. it is bigger than you are and will go where it wants. The best you can do is to try to manage it.
Bring Your Own Devices to the Plant Floor?most iT departments are beginning to accept the inevitability of ByoD. According to arecent study, the majority of companies surveyed said they are now adapting their iT infrastructure to accommodate employee’s personal devices, rather than restricting employee use of personal devices.
“Dear mom, Today is my first day pro-gramming the filling line.”
What about the plant floor? Will tablets soon be standard equipment in the refinery? or will they be banned from moving outside the corporate office. The first sentence of the Tablets and Smart Phones article says it all: industrial iT teams are likely to rail against the use of mobile devices, but many equipment makers feel they are fighting against the tide to ignore them. Productivity will determine which side will win.
#1 on the Engineer’s Wish List?next read the industrial networking Desires revealed article. you will notice that when engineers are asked to identify their unful-filled industrial networking desires, the num-ber #1 item is: “Connecting to the factory with a smart phone”.
i have discussed in past blogs that in any war between security and productivity, security will lose. The situa-tion is no different here. Smart phones are coming to the plant floor. The only question is “Will we adapt to this new world in a secure way or will it be another source of insecurity”?
What is a Mobile Device Anyway?one option for the mobile device question is to just ban them outright. There are cases when this might be appropriate (explosive environments for example), but generally outright bans rarely work the way people want them to.
one of the reasons is that we have a ten-dency to see technology only in terms of what is available today or what is popular. This results in narrow definitions of a spe-cific technology that lets other technologies slip through. for example, an iPhone is clearly a mobile device, but what about a personal uSB keyboard or mouse that an employee brings in, perhaps for health rea-sons? (if you don’t think that a mouse can be a security issue then see: hackers pierce network with jerry-rigged mouse). Some-times a “mobile device” isn’t even a device at all. Consider a CD that contains a Stuxnet-infected S7 ladder logic file.
or an automated forklift that moves from site to site. At the extreme end, many people know we have been working with Boeing for the past few years – they have large mobiledevices called 787s. What is important to remember is mobile devices can range from a CD with what appears to
be an innocent document file, to the obvious iPhone, right up to entire mobile platforms.
The only way to address this range of evolving “mobile” tech-nology is to use the Zone and Conduit concepts promoted in the iSA/ieC 62443 standards. Properly done, zone and conduit security can result in operational requirements that define a securi-ty process, rather than proscriptive
requirements like “mobile Devices should not be used on the plant floor”. restricting devices seems simple and comforting, but since this is so narrow, restrictive and inflexible, it encourages inventive staff to find ways around the rules so they can do their job.
recently i talked to a customer with a very innovative way to manage Wi-fi-capable mobile devices on his factory floor. instead of banning wireless technologies (something that is hard to enforce if you have a lot of contractors), he actually set installed Wi-fi access points throughout the manufacturing areas.
Then he routed all the access points into a “Captive Portal” – one of those locked down web pages you run into in hotels and airports. This Captive Portal strategy had multiple benefits – first he immediately had a record of who was trying to use Wi-fi in his factory. Second, by forcing all employees and contractors to log in, he could track exactly what they were doing and when. Then, based on each user’s log-in creden-tials, he could restrict network access to specific systems in his factory. for example, a contractor working on the finishing line could be restricted to only seeing the finish-ing line PlCs.
Who Knows What Tomorrow’s Mobile Device Will Look Like?information technologies are changing constantly. Trying to manage them with pro-scriptive rules is a hopeless task, because we can never keep up. instead we need to work from general principles. —This article is printed with prior permission
from infosecisland.com. For more features and
opinions on information security and risk man-
agement, please refer to Infosec Island.
One option for the mobile device question is to just ban them outright. There are cases when this might be appropriate, but generally outright bans rarely work the way people want them to
5.5%will be the
growth of it
spending in
middle east in 2013
46 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
N E X t H or I Zo N S m a n ag e m e n t
Technology 2013: The Script UnfoldsThe market indicators highlight the need for solutions-oriented approach By NarayaNa mENoN
Most technology has the shelf life of a banana.” Scott McNealy. We have always been at a cross road in terms of technology. The advent of almost anything as a service provides another dimen-sion in terms of choices in deploying iT. Amidst
all these, as iT has matured as a critical business enabler, iT leaders in organisations shoulder responsibilities of positively contribut-ing to the organisational growth through optimal Capex/opex and roi, innovative resource deployment and utilization, tighter process controls and reporting mechanisms. iT heads act as headlights by providing actionable business intelligence and analytics.
in this context lies the need to cope with exponential data growth, particularly in the semi-structured and unstructured realm. A planned data management strat-egy includes effective Disaster recovery (Dr) manage-ment (considering the criticality of business continuity from a financial, regulatory and reputation perspective at a time of increased outages owing to both man-made as well as natural disasters). Strategic big data, mobility/ByoD solutions, cloud computing (personal and hybrid clouds), XaaS (anything/everything as a service), mobile and smart device applications for the enterprise, effec-tively harnessing the power of social media and compre-hensive, actionable Bi & BA are now key and immediate tech priori-ties, while integrated ecosystems, enterprise app stores, in-memory computing and internet of things and appliance models would be viewed more strategically over the next five years.
Emerging technologiesA recent gartner survey indicated that 48 percent of enterprises
surveyed expect to invest in a private cloud owned and maintained by themselves on premises in 2013. on similar lines, 68 percent of the respondents indicated that they would invest in private cloud but would have a service provider maintain it for them in-house. A modest 36 percent of the respondents indicated that they will invest in public cloud computing within the next year. A spurt in cloud deployments will follow as technology and standards evolve.most indian enterprises seem to have implemented the first phase of their virtualisation strategy and are now looking to take it to the next level to facilitate business agility and efficiency along with cost sav-
ing. it is also interesting to see a growing base of SmB customers deploying virtualisation in various forms purely from a cost reduction perspective.The indian iT services market is forecast to reach $10.2 billion in 2013, which is a 12 percent increase over the previous year as per various industry analysts, indicating a clear growth expected within the XaaS/hosted services purview. TCo, flexibility and SlA based pay-as-you-go pricing models contribute to these technologies being looked at more favourably – also indicative of the thinning gap between XaaS and the cloud models to form a more inclusive model of service delivery.
Growing Indian Marketgartner has recently raised its estimates for global information tech-nology spending this year to $3.7 trillion, representing a 4.2 percent growth over 2012. They also estimate that iT spending in india is projected to total $71.5 billion in 2013, of which enterprise iT spend-ing is estimated at $42.5 billion.
it is also interesting to note that according to ABi research, the
25% of enterprises
will have app
stores by the
year 2017
47 07 march 2013 cto forumThe Chief
TeChnologyoffiCer forum
m a n ag e m e n t N E X t H or I Zo N S
global business continuity and data disaster recovery market will exceed $39 billion by 2015. Disaster recovery has a high potential in india. respondents to the forrester Q2 2010 iT budget survey rated BC/Dr as the number one priority for small and medium busi-nesses and the second highest priority for enterprises.
Where are enterprises investing?The industry predicts near double digit growth on spending around services, software and hardware (to include client devices). We see a clear indication of services led models being the flavour of the hour and this is where i feel most investments would be closely followed by the others. Products, processes and people form the corner stones on which successful organisations and consequently industries are built on. i would divide this in to twoviewpoints – the vendor perspective and the consumer perspective: from a vendor perspective, innovative products that offer flex-ibility and can easily integrate into complex existing environments would be the need of the hour. While providing superior standards and business edge, the technology needs also to have a clear road map in terms of adapting to the physical, virtual and cloud environments and catering to interoperability with incumbent technologies, at the same time allowing access via a variety of both old school and new age devices. Vendors will primarily invest in process clarity, in skilling human resource and in growing distri-bution networks to reach end customers.
from an end-customer perspective, choosing the right technolo-gies to suit their business objectives and deploying best fit models of iT (cloud, XaaS, hosted etc) to facilitate the same along with data management and business continuity would be of prime importance. in terms of process – with multiple technologies coexisting in a typical iT environment, it is important to integrate and set an SlA driven model with clear metrics.
SMBs: No longer behindAccording to advisory firm Zinnov, as against about 5,000 large enterprises there are over 10 million SmBs ready to consume iT. This represents a tremendous market potential. in my view, SmBs in india are uniquely placed as they have a wide choice with respect to the iT path they can embark on. They could choose to jump straight in to a XaaS model with minimal in-house investment, sav-ing infrastructure, space, power and cooling requirements to name a few. free of operational hassles in setting up and running their iT, SmBs are able to look at it with a more strategic approach to tie-in with their growth and business ambitions. As mentioned earlier, business continuity is emerging as a key focus area for SmBs and based on the business impact analysis they can opt for the most appropriate Dr option. for instance, Sanovi Cloud Drm offering is the specific product offering that enables service providers to offer Dr as a service. Sanovi’s cloud product enables service providers to scale and deploy Dr offerings at the service level and values that are attractive to SmB customers for its subscription-based fee and asso-ciated SlA. Apart from business critical applications, data manage-ment, business continuity and appropriate analytics, SmBs would embrace XaaS in conjunction with or as a prelude to the Cloud, mobility and ByoD solutions with fervour in the months to come.
Opportunity for the ChannelsSolutions integrators and resellers are looking at Sanovi to provide the key differentiator for customers’ comprehensive Dr strategy with Dr management as the fulcrum. At Sanovi, partners are our growth engine, an integral part of our business strategy. Today, 90 percent of our business is with and through our channel partners. True to our emphasis on partners, we have built an exten-sive channel network spanning across india, as well as parts of the Asia-Pac and middle east regions. We at Sanovi, enable our partners to identify and fulfil new opportunities, creating a win-win situation for all involved.
The market indicators clearly highlight the need for solutions oriented approach with a services led option (XaaS) to choose from. Partners should re-orient themselves to go to market as enablers of technology solutions rather than mere facilitators. Channels need to invest in developing service and solutioning capabilities around a combination of key pull and some strategic push technologies in the market as these in turn will work out to be profitable growth and revenue models for them.
“Gartner has raised its estimates for IT spending to $3.7 trillion, representing a 4.2 percent growth over 2012”— Narayana Menon, Lead-Marketing, APAC & Middle East, Sanovi Technologies
VIEWPOINT
48 07 march 2013 cto forum The Chief
TeChnologyoffiCer forum
twenty five years ago netapp became the modern day bellwether of this metric — they acquired real paying customers at a clip heretofore unheard of. for the last 20+ years they maintained that bar.
not anymore. yesterday nimble announced they reached 1000 cus-tomers in only 2.5 years. not free software downloading customers - paying SySTemS customers.
That is an astounding rate of suc-cess. There are others. Actifio has hundreds of customers in two years of gA. There are a bunch on the horizon that will break soon - legi-ble, nutanix, Whiptail, Data robotics (50,000+ units shipped or something crazy like that), etc., just to name a few. five years ago it was unthink-able. A company simply couldn’t acquire a thousand real customers if it was in the systems business (where stuff costs a lot, and requires a real commitment from a customer to install, learn, and use a product) no matter what size VC investment it had.Why? Because the big guys controlled the market - and the infor-mation flow. god bless the internet
brilliant enough to claim a market have had the almost anointed right to maintain that status forever (even if their stuff sucks). no more.
This wave has just begun. not only will the biggest have to contend with the other big guys to fight over share loss - they will soon have to pay very serious attention to “those on the cusp of global legitimacy” - who actually may end up a bigger threat to market supremacy than the tradi-tional major players.
if getting to 1000 customers in just 2.5 years is the STArTing point, what happens in a few more years? remember when the uS only wor-ried about one big threat? The rus-sians!!! Protect against them and we’ll be safe! Throw that out the win-dow. now we have to protect against little packs of unrelated (seemingly) random threats/psychos. A whole different ball game.
This is kind of the business equiva-lent. not that the little guys are ter-rorists, mind you - but they intend to steal the the money the market gives the big guys. metaphorically it’s the same principle.
and the social aspects of knowledge dissemination.
The barriers to “smart” are no lon-ger controlled by big brother (except in China, of course) - so a little guy with a better mousetrap can bring their story to the masses - and if that story resonates with a real life issue, customers will find you.
it’s awesome to watch. i think people take it for granted but they shouldn’t - it’s as big a sea change business/market wise as anything to hit the systems business in, well, for-ever. it forces the big guys to compete at a pace and level they have not had to deal with since they were the little guys. And they don’t like it much. Why would they care about little Actifio stealing 250 customers when they have 250,000? Because an epi-demic starts with 2. And their ability to contain and control as they could in the not too distant past is gone. So now not only is it near impossible to become a big giant company that becomes the market leader in a big giant market - it’s become just as hard to hold on to that position. for 50 years those who have been lucky/
The New Measuring Stick Time To
Legitimacy ima
ge
by
xx
xx
xx
About the Author: Steve Duplessie
is the Founder of
and Senior Analyst
at the Enterprise
Strategy Group.
Recognised
worldwide as
the leading
independent
authority on
enterprise storage,
Steve has also
consistently been
ranked as one of
the most influential
IT analysts. You
can track Steve’s
blog at http://www.
thebiggertruth.com
Steve DupleSSie | [email protected]
WHEN YOU RUN THE NUMBERS, DUBAI MEANS BUSINESS.
SEE THE FILM AT VISION.AE/VIDEOS/NUMBERS
EXPO2020DUBAI.AE
MILLION* PEOPLE VISITED DUBAI WORLD TRADE CENTRE LAST YEAR
SQUARE METRES OF EXHIBITION SPACE IN ONE BLUE-CHIP VENUE
PER CENT OF THE REGION’S SHOWS HAPPEN IN THE UAE. WELCOME TO THE WORLD’S EVENTS HUB
1.65100,00050
*Source: DWTC, 2011 figures latest available.
FalconDubaiEvents_CTOForum_290x220_AW.indd 1 12/02/2013 22:17