the finger-friendly apps

54
Technology for Growth and Governance March | 07 | 2013 | 50 Volume 08 | Issue 14 A 9.9 Media Publication VIEWPOINT The New Measuring Stick PAGE 48 BEST OF BREED Caught in the Crossfire PAGE 20 NO HOLDS BARRED Addressing Modern Security Issues PAGE 42 the finger- friendly apps

Upload: ctof-magazine

Post on 31-Mar-2016

216 views

Category:

Documents


1 download

DESCRIPTION

Apart from being platform-agnostic, today's enterprise applications need to be as user-friendly as in a mobile app store

TRANSCRIPT

Page 1: The Finger-friendly Apps

Technology for Growth and Governance March | 07 | 2013 | 50Volume 08 | Issue 14

A 9.9 Media Publication

VIewPoInt

the new Measuring

Stick Page 48

BeSt of Breed

Caught in the

Crossfire Page 20

no holdS BArred

Addressing Modern

Security Issues Page 42

thefinger-friendlyapps

Page 2: The Finger-friendly Apps

Datacard and Secure Issuance Anywhere are registered trademarks, trademarks and/or service marks of DataCard Corporation in the United States and/or other countries. ©2012 DataCard Corporation. All rights reserved.

INSTANT ISSUANCE

Datacard, CardWizard and Secure Issuance Anywhere are registered trademarks, trademarks and/or service marks of DataCard Corporation in the United States and/or other countries. EMV is a registered trademark of EMV CO., LLC. ©2012 DataCard Corporation. All rights reserved.

New financial instant issuance portfolio

Datacard Group offers a full range of new innovative printers, CardWizard® software, the

world’s #1 instant issuance software and unmatched global service and support. Our

solutions give you the flexibility to issue permanent embossed, unembossed, magnetic

stripe, EMV®-compliant cards and NFC enabled mobile devices immediately.

Datacard Group makes it easy and affordable to launch a profitable instant issuance

card program. Our Secure Issuance Anywhere™ platform empowers you to manage

your card and mobile payments programs the way you want to – anytime, anywhere.

To schedule an instant issuance demo, visit www.datacard.com/cto

Datacard India Private Ltd B-302,Flexcel park,S.V.Road, Next to 24Karat Multiplex, Jogeshwari (W) Mumbai-400102.India Tel:+91-22-61770300 Email:India_sales @datacard.com

GIVE CARDHOLDERS THE CONVENIENCE AND SERVICE LEVELS THEY DEMAND

Page 3: The Finger-friendly Apps
Page 4: The Finger-friendly Apps

2 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

editorialyashvendra singh | [email protected]

editor’s pick

From Complexity to Simplicity

Mobility and cloud are deconstructing enterprise

applications

At Salesforce.com’s annual conference this year, its

Ceo, marc Benioff, told report-ers, “All software is going to look like facebook.”

Benioff may not be an oracle but what he said doesn’t seem to be too far fetched either. As a matter of fact, the transition towards his forecast already appears to be underway.

Traditionally, an enterprise solution is meant to be a ‘show of force’ — a powerful system that has been optimised to work

cloud computing comes into the picture. By leveraging the cloud model, applications can now be accessed anywhere, any-time and on any device.

for the time-honoured and complex enterprise software, the going is bound to get tough in the mobile-centric world. But ringing in simplicity will come with a price. A Cio will have to walk the tight rope balancing mobility and simplicity on one side and security and compli-ance issues on the other side.

nonetheless, a start has been made. in this issue’s cover story, we discuss this new trend threadbare, and focus the spot-light on top technology leaders and vendors adopting it.

facebook is one such com-pany that has been decon-structing. in its nine years of existence, the social networking service has been splitting its

on a desktop. This arrangement worked perfectly till the advent of enterprise mobility and cloud computing. Then the rules of the game changed.

A look at the numbers and it is hard to ignore the fact that enterprises are going mobile. Consumerisation of iT is here to stay and prolifer-ate. however, mobility is not synonymous with complexity. it supports simple, lightweight applications. This shift towards minimalism is intensified when

web application into smaller and lighter apps (messenger and camera, for instance) that can run on mobile devices.

As for Benioff, he is putting his money where his mouth is. moving towards simplic-ity, Salesforce labs has come up with an app called logger, which enables sales people to update records on the go. The app, sans Salesforce’s frills and fancies, claims to be the easiest and fastest way to log activity.

if you too have plans of doing away with the old and intricate systems in your enterprise to usher in simplicity, do share your plans with us. We look for-ward to your feedback. 24 the Finger-friendly

appsApart from being platform-agnostic, today’s enterprise apps need to be as user-friendly as in a mobile app store

Page 5: The Finger-friendly Apps

Discover which physical infrastructure management tools you need to operate your data centre. Download White Paper #104 today and 10 lucky respondents can WIN a telescope!Visit www.SEreply.com Key Code 48019y

Tap in to the health of your data centre. As an IT or data centre manager, you know that doing your job well means saving your company both time and money. Today, there finally is a way for you to be completely tapped in to the overall health of your data centre. StruxureWare™ for Data Centres gives you visibility across your entire data centre infrastructure so you can make informed decisions — not arbitrary ones — about your infrastructure. For example, you can plan proactively for needed capacity and streamline workflow management to improve your business agility and availability. In fact, now more than ever, infrastructure decisions are business decisions.

An always available, efficient data centre. What’s more, StruxureWare for Data Centres communicates in real-time with the leading virtualization platforms: VMware® vSphere™ and Microsoft® System Centre Virtual Machine Manager. The software’s built-in automated response capabilities ensure that virtual loads always have healthy host environments. With your VMs on healthy hosts, you can focus on running your data centre more efficiently. The software also gives insight into PUE/DCiE trending over time, enabling you to make intelligent energy management decisions. With StruxureWare for Data Centres planning and reporting capabilities, who’s the company hero now? You are!

APC™ by Schneider Electric™ is the pioneer of modular data centre infrastructure and innovative cooling technology. Its products and solutions, including InfraStruxure™, are an integral part of the Schneider Electric IT portfolio.

Now, align your data centre with your business strategy.

Now, make informed decisions about your infrastructure:

> Plan proactively for needed capacity.

> Blueprint data centre expansions and consolidations.

> Streamline workflow management of your IT physical infrastructure to improve your business agility and availability.

> Make changes knowing how they will affect your business.

> Visualize change/capacity scenarios to improve your bottom line.

> View your current and historic PUE/DCiE and energy costs of subsystems to make intelligent energy management decisions.

StruxureWare for Data Centres insight enables a healthy, business-driven data centre.

©2013 Schneider Electric. All Rights Reserved. Schneider Electric, APC, StruxureWare, vSphere, and InfraStruxure are trademarks owned by Schneider Electric Industries SAS or its affiliated companies.All other trademarks are the property of their respective owners. • www.schneider-electric.com • 998-4108_B_IN

CTO_Forum_0301_48019y_IN.indd 1 1/28/2013 3:02:52 PM

Page 6: The Finger-friendly Apps

4 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

48 | viewpoint: the new Measuring stickBy steve duplessie

06 | i believe: siloed it: the biggest challengeBy shailesh kumar davey

Cover Story

24 | The Finger-Friendly Apps Apart from being platform-agnostic, today’s enterprise applications need to be as user-friendly as in a mobile app store

CopyrighT, All rights reserved: reproduction in whole or in part without written permission from Nine Dot Nine interactive pvt Ltd. is prohibited. printed and published by Kanak ghosh for Nine Dot Nine interactive pvt Ltd, C/o Kakson house, plot printed at Tara Art printers pvt Ltd. A-46-47, Sector-5, NoiDA (U.p.) 201301

Please Recycle This Magazine And Remove Inserts Before

Recycling

co nte nt s theCtoforum.Commarch13

Cover design by: Manav saChdev

S P I N E

Technology for Growth and Governance

CT

O

FO

RU

MVolum

e 08 | Issue 14

March | 07 | 2013 | 50Volume 08 | Issue 14

IPH

ON

ES

AR

E C

OM

ING

TO

TH

E P

LA

NT

FL

OO

R| C

YB

ER

SP

AC

E: IT

’S A

ME

DIU

M, N

OT

A P

LA

CE

A 9.9 Media Publication

VIEWPOINT

The New Measuring

Stick PAGE 48

BEST OF BREED

Caught in the

Crossfire PAGE 20

NO HOLDS BARRED

Addressing Modern

Security Issues PAGE 42

thefinger-friendlyapps

ColumnS

featureS20 | best of breed:caught in the crossfire Cios are stuck between different business leaders who have conflicting business priorities

24

Page 7: The Finger-friendly Apps

5 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

Managing Director: Dr Pramath Raj SinhaPrinter & Publisher: Kanak Ghosh

Publishing Director: Anuradha Das Mathur

EditorialExecutive Editor: Yashvendra SinghConsulting Editor: Atanu Kumar Das

Assistant Editor: Varun Aggarwal & Akhilesh Shukla

dEsignSr. Creative Director: Jayan K Narayanan

Sr. Art Director: Anil VKAssociate Art Directors: Atul Deshmukh & Anil TSr. Visualisers: Manav Sachdev & Shokeen Saifi

Visualiser: NV BaijuSr. Designers: Raj Kishore Verma, Shigil Narayanan

& Haridas BalanDesigners: Charu Dwivedi, Peterson PJ

Midhun Mohan & Pradeep G Nair MarcoM

Designer: Rahul Babustudio

Chief Photographer: Subhojit PaulSr. Photographer: Jiten Gandhi

advisory PanElAnil Garg, CIO, Dabur

David Briskman, CIO, RanbaxyMani Mulki, VP-IT, ICICI Bank

Manish Gupta, Director, Enterprise Solutions AMEA, PepsiCo India Foods & Beverages, PepsiCo

Raghu Raman, CEO, National Intelligence Grid, Govt. of IndiaS R Mallela, Former CTO, AFL

Santrupt Misra, Director, Aditya Birla GroupSushil Prakash, Sr Consultant, NMEICT (National Mission on

Education through Information and Communication Technology)Vijay Sethi, CIO, Hero MotoCorpVishal Salvi, CISO, HDFC Bank

Deepak B Phatak, Subharao M Nilekani Chair Professor and Head, KReSIT, IIT - Bombay

salEs & MarkEtingNational Manager – Events and Special Projects:

Mahantesh Godi (+91 98804 36623)National Sales Manager: Vinodh K (+91 97407 14817)

Assistant General Manager Sales (South):Ashish Kumar Singh (+91 97407 61921)

Senior Sales Manager (North): Aveek Bhose (+91 98998 86986)Product Manager - CSO Forum and Strategic Sales:

Seema Menon (+91 97403 94000)Brand Manager: Jigyasa Kishore (+91 98107 70298)

Production & logisticsSr. GM. Operations: Shivshankar M Hiremath

Manager Operations: Rakesh upadhyay Asst. Manager - Logistics: Vijay Menon Executive Logistics: Nilesh Shiravadekar

Production Executive: Vilas Mhatre Logistics: MP Singh & Mohd. Ansari

oFFicE addrEssPublished, Printed and Owned by Nine Dot Nine Interactive Pvt

Ltd. Published and printed on their behalf by Kanak Ghosh. Published at Office No. B201-B202, Arjun Centre B Wing,

Station Road, Govandi (East), Mumbai-400088. Printed at Tara Art Printers Pvt Ltd., A-46-47, Sector-5, NOIDA (U.P.) 201301

Editor: Anuradha Das MathurFor any customer queries and assistance please contact

[email protected]

www.thectoforum.com

regularS02 | editorial08 | letters10 | enterprise

round-up

This index is provided as an additional service.The publisher does not assume

any liabilities for errors or omissions.

38 | tech for governance:cyberspace: it’s a MediuM, not a place internet is a medium with which we fabricate a social contract to communicate

38

a QueStion of anSwerS

16 | ruchir godura, Vp, india and South Asia,Vidyo, talks about the enterprise video conferencing and telepresence markets

44 | next horizons: iphones are coMing to the plant floor iT is changing constantly and we need to work from general principles

44

16

advertisers’ indexDatacard IFCIBM 1Schneider 3CTRLs 7ESDS 9Cisco 13, 33, 37Zenith 15Patel India 19SAS Institute 23Wipro Infotech 32-AFalcon (Expo 2020 Dubai) IBCMicrosoft BC

Page 8: The Finger-friendly Apps

6 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

I BelIeve

currentchallenge

eliminating siloed it management environment

xxx author Is the Vice President at ManageEngine and is responsible for new IT

developments in the company.

Gaining the Trust of Management Manarojan Kumar cIO, Kanoria chemicals & Industries believes for a cIO to gain

and business enabler. in the absence of such a role, the Cio remains just a custodian of iT infrastructure.

The management always has a high expectations from the iT team led by the Cio at the fore front. in case the expectations are not met, they are highly disappointed of the iT team and lose interest in any new iT project. They lose faith in the Cio and his ability to transform the enterprises with the help of iT. The management's attitude sooner or later reflects in the functioning of the Cio. failing to deliver, the Cio is seen as a liability on the organisa-tion. The management stops taking up new iT project unless they are absolutely imperative for business growth.

however, for the management to lose faith in the company's Cio, the latter is also responsible to a large extent. Cios often present a rosy picture to the management to get their approval for fresh investment. in fear of not getting approvals for the project they do not highlight the challenges, and completely ignore them while presenting a case for new project. Such challenges are bound to crop up during the imple-mentation phase and lead to delays or over spending or both. These challenges, however small they may be, have the potential of putting a project in jeopardy. once the project outcome is not as per the case pre-sented by the Cio, the management becomes skeptical of future invest-ments.

i believe that a Cio should be honest enough to the manage-ment while presenting the case for any new deployment. Along with the benefits of the new project, he should also highlight the challenges that may be encountered during the execution of the project. i am sure that it would help the management to understand the ground level chal-

In my more than two decades of experience in iT , i have realised the importance of regular communication with the management. This not only helps in building a rapport with the management but also strengthen the role of a Cio in an organisation as a business leader

By manarojan kumar, CIO - Kanoria Chemicals

Page 9: The Finger-friendly Apps
Page 10: The Finger-friendly Apps

LETTERS

WRITE TO US: The CTOForum values your feedback. We want to know what you think about the magazine and how

to make it a better read for you. Our endeavour continues to be work in progress and your comments will go a long way in making it the preferred publication of the CIO Community.

Send your comments, compliments, complaints or questions about the magazine to [email protected]

ARE CTOS mORE InTERESTEd In SATISfyIng ThE CfO & BOARd RAThER ThAn ThE COnSUmER?

I see CTO is aligned to the CFO and the Board in that order, the CTO will have to also be good at resume writing as he will not last too long. But then the question arises, is the CFO aligned to the Consumer? If he is not, then even he may be in hot water sooner or later.Arun guptA, Group CIO,Cipla

1. Place of publication Nine Dot Nine Interactive Pvt. Ltd. Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

2. Periodicity of its publication Fortnightly

3. Printer’s name Kanak Ghosh Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

4. Publisher’s name Kanak Ghosh Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

5. Editor’s name Anuradha Das Mathur Nationality Indian (a) Whether a citizen of India? Yes (b) If a foreigner, the country of origin N.A. Address Plot No.725, Sector-1, Shirvane, Nerul, Navi Mumbai-400706

6. Names and addresses of individuals who own the newspaper and partners or shareholders holding more than one per cent of the total capital

Nine Dot Nine Interactive Pvt Ltd. Plot No.725, GES, Shirvane, Nerul, Navi Mumbai-400706

Nine Dot Nine Mediaworx Pvt Ltd N-154 Panchsheel Park, New Delhi 110017.

I, Kanak Ghosh hereby declare that the particulars given above are true to the best of my knowledge and belief.

form IVStatement of ownership and other particulars about the publication, CHIEF TECHNOLOGY OFFICER FORUM as per Rule 8

Dated: 1st March, 2013Sd/-

Signature of Publisher

8 07 MARCH 2013 cto forum The Chief

TeChnologyoffiCer forum

Major Shareholder

Page 11: The Finger-friendly Apps
Page 12: The Finger-friendly Apps

10 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

Enterprise

Round-up

FEATURE InsIdE

datacentre networking is

still in its TeensPg 12

Will be the global bi revenue in 2013

India’s Digital Universe to Grow to 2.9 ZB study reveals cloud as key concern area; value through Big data as the biggest opportunityEMC CoRpoRation announced results of the emC-sponsored iDC Digital universe study, “Big Data, Bigger Digital Shadows, and Biggest growth in the far east — india”— which revealed that the digital universe in india will grow 23-fold between 2012 and 2020. The digital bits captured or created each year in india are expected to grow from 127 eB to 2.9 ZB between 2012 and 2020.

india’s digital information explosion is being driven by proliferation of devices such as PCs and smartphones worldwide, increased internet access within emerging markets and the boost in data from

machines such as surveillance cameras or smart meters. other contributing factors include increasing machine-to-machine communication (m2m), falling cost of technology,and digitisation of TV, among oth-ers. over time, the distribution of the bits within the digital universe by country of origin will more and more closely mirror the distribution of population.

Key findings of this india-specific study include:less than half a percent of all digital information is

analysed today while 36 percent would provide valu-able insights making big data a significant opportu-nity for india.

$14billion

dATA BRIEFIng

illu

ST

RA

TiO

N B

Y A

Nil

T

Page 13: The Finger-friendly Apps

E n t E r pr i s E ro u n d - u p

11 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

A quarter of distributed denial of service (DDoS) attacks in 2013 will be application-based. Instead of inundating websites with requests, such ddos attacks send targeted commands to applications to overwhelm them and make them unavailable

QUIck ByTE on ddos

Five Ways to Spot and Score bad iP Clients Fortinet highlights the importance of client reputation idEntifying improper behaviour among the devices connected to their network is a critical tool for any organisation concerned about Advanced Persistent Threats (APTs). in light of the rapidly changing landscape of such targeted malware attacks, fortinet lists the top five types of behaviour that might indicate that a device has been infected.a) Bad Connection Attempts: Typical malware behaviour often includes attempts to connect to hosts that don’t exist on the internet. While some bad connections may be due to user error or bad links, a series of bad connections could be a sign of malware infection.b) Choice of Application: A host that installs a P2P file sharing application can be considered riskier than a host that installs a game. Some consider both actions problematic. The ability to add weights to each action allows each risk to be scored.c) Geographic Location: Visits to hosts in certain countries can be categorised as risky behaviour, especially if there is a significant amount of traffic involved. iden-tifying such behaviour can be combined with a white list approach that identifies legitimate sites in such countries to help identify infected clients.

The year 2012 was a landmark year for the IT-BPM industry in India as it crossed the landmark of $100 billion of revenues, says Mittal.

— Som Mittal, President, Nasscom

“The year 2012 also has its share of uncertainty with global economic volatility, slowdown in technology spending and the mantra of doing more with less”

they Said it

Som mittal

imA

ge

BY

PH

OT

OS

.CO

mim

Ag

e B

Y P

HO

TO

S.C

Om

Page 14: The Finger-friendly Apps

E nt E r pr i s E ro u n d - u p

12 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

Datacentre Networking is Still in its Teens Forrester’s analysis of current dc networking solutions says that they are still immaturedata CEntRE networking solutions on offer

today are still in their ‘teen years’ and it will take some time for them to reach ‘adult-hood’ says forrester’s analysis of leading data center networking solutions. After a comprehensive analysis of solutions from vendors including Alcatel-lucent, Arista networks, Avaya, Brocade Communication Systems, Cisco Systems, extreme networks, hewlett-Packard, and Juniper networks and combing through customer stories, technical documents, and vendor responses, researchers at forrester concluded that “even though the proposed solutions offer

tremendous value, today’s data center net-working solutions are immature.”

in his latest blog, analyst Andre Kindness who serves infrastructure & operations pro-fessionals wrote that data center networking solutions have just hit their “teen years” and exhibit teenager characteristics. Kindness outlined five traits exhibited by today’s top solutions to substantiate his theory.

According to him, today data center net-working solutions: Continuously re-identify-ing themselves.

At one time, data center networking char-acteristics were one-dimensional, focused

According to research firm Gartner, the Middle East and africa it infrastructure market is set to reach $3.9 billion in 2013, marking a four percent increase from 2012

on flattening the network. now the conver-sation has expanded to include the integra-tion of virtualised and physical infrastruc-ture while creating a fabric of horizontally interwoven networking components. how-ever, customers will be hard-pressed to find a consistent definition from each vendor that hasn’t evolved over the past two years. And guess what?

They’re likely to change it several more times in the next three years.

require adult supervision. no matter how many software defined networking (SDn) slides are shown, network automation is limited to reacting to Vm movement. The systems monitor one boundary condition when the system should be monitoring thousands, if not hundreds of thousands, of instances (virtual and physical ports/links/switches, applications, policies, etc.).

networking teams should expect con-tinuous babysitting. They’ll be manually configuring the devices and adjusting knobs to figure out the bandwidth allocation, QoS settings, buffering settings, etc.

Are moody. overlay Transport Virtualiza-tion (oTV), Virtual ethernet Port Aggrega-tor (VePA), Virtual eXtensible local Area network (VXlAn), and others are new tech-nologies that have little mileage and can be unpredictable or fail to even work in certain environments.

Some customers said they rolled back some of their deployments because the technology was just too temperamental.

feel isolated. many of the data center networking components from a single solu-tion are tightly interwoven with each other; however, few venodors have provided inter-faces that enable the network subsystem to share stateful information with another subsystem.

The cliques are alive and well within the data center.

Act self-absorbed. networks will encom-pass both virtual and physical aspects. This means policies, control, and network ser-vices have to go past the last physical edge port. Virtual network functions belong to the network domain, except most solutions don’t offer visibility, control, or manage-ment of the virtual network.

This overly inward focus will likely thwart i&o from realising true benefits of a next-gen data centre.

gloBAl TRAckER

IT Infrastructure

So

ur

ce

: g

ar

tn

er

illu

ST

RA

TiO

N B

Y S

Hig

il N

AR

AYA

NA

N

Page 15: The Finger-friendly Apps
Page 16: The Finger-friendly Apps

E nt E r pr i s E ro u n d - u p

14 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

networks are the internet. using

‘login with Facebook’—or other

popular social networks—reduces

friction and therefore improves

users' experience of customer reg-

istration and subsequent login.

For registration, the required per-

sonal information can be imported

from users' social profiles, reduc-

ing—if not eliminating—form fill-

ing. moreover, using a social net-

work identity means users don't

have to remember rarely used pass-

words or endure convoluted pass-

word reset processes when they

forget them.”

According to research firm gartner,

along with federation technolo-

gies and mobile computing, social

identity adoption will have a major

impact on the practice of identity

and access management (iAm) in

2013 and beyond.

Says Ant Allan, research vice presi-

dent at gartner, “For an increasing

number of internet users, social

Social Credentials to define retail Customer identities half of new retail identities to be social-based

mobile aPPS

With enterprises under

extreme pressure from

management and employees to

develop and deploy mobile appli-

cations to accommodate mobile

work styles and increase customer

engagement, gartner predicts that

more than 50 per cent of mobile

apps deployed by 2016 will be

hybrid. “mobility has always been

a separate topic for iT profes-

sionals, but it is now influencing

mainstream strategies and tactics

in the wider areas of technology

enablement and enterprise archi-

tectures," said Ken Dulaney, vice

president and distinguished ana-

lyst at gartner. increasingly, enter-

prises are finding that they need

to support multiple platforms,

especially as the BYOD trend gains

momentum. To address the need

for mobile applications, enterpris-

es are looking to leverage applica-

tions across multiple platforms.

The advantages of the hybrid archi-

tecture, which combines the por-

tability of HTml5 Web apps with

a native container that facilitates

access to native device features,

will appeal to many enterprises.

The need for context aware-

ness in mobile applications has

increased with the capabilities of

mobile devices, causing develop-

ers to consider both hybrid and

native architectures. For applica-

tions to leverage location, on-

device hardware the applications

need to be developed using either

hybrid or native architectures.

LEt's faCE it, for a large num-

ber of users, internet essentially

means Facebook or Twitter. Such

has been the impact of social

media on our daily lives. it is no

surprise then, that experts predict

that by the end of 2015, as many

as 50 per cent of all new retail cus-

tomer identities will be based on

social network identities.

softwaRE development firm, Telerik, has launched "SafeBridge", a free mobile applica-tion which can be used for safeguarding women. Designed to help vulnerable groups such as women, children, professionals, working late at night, foreign tourists and city visitors, the application allows users to send emergency SmSs with gPS information to preset lists of trusted contacts. There is no need for any registration to use the app.

Free mobile app for Safeguarding Women The app allows users to send emergency sMss

FAcT TIckER

Developed in response to recent spike in crime incidents against women, the beta version of the application is currently available for both low-end and high-end Android phones and will soon be made available for iPhone and BlackBerry devices.

“Since opening our office in new Delhi in 2012, we at Telerik have made it our priority to be active citizens of this society. The urgency of the recent incidents required a prompt response and thanks to Telerik' products, we are able to quickly build the application for all types of phone users,” says Abhishek Kant, country manager of Telerik india.

using the safety app is simple. At the start of the application, the user first must preset the contacts of friends and relatives who will be notified in the case of an imminent threat.

To decrease response time in emergency situa-tions the app involves just the one-touch function of simply pressing a "helP me!" button to send out an SmS with gPS information.

in the cases when the threat is over, there is an "i'm Safe" button to immediately notify contacts that everything is alright. "SafeBridge" can func-tion with limited internet or no internet availabil-ity on the phone.

Telerik's "SafeBridge" allows the user to person-alize the "help" and "safe" messages. The applica-tion also provides a "Track me" feature, which includes sending out the user's current location at pre-determined intervals. The application also includes a Directory of police stations in Delhi. in future, Telerik's team plans to add other indian cities to this police directory as well as city-by-city contact information of hospitals and ngos in the country. The app will also include the option to report crimes the user witnesses but may not be the victim of.

illu

ST

RA

TiO

N B

Y R

Aj

ve

Rm

A

Page 17: The Finger-friendly Apps
Page 18: The Finger-friendly Apps

Huge Potential: Video conferencing revenue is growing 14.4% Y-o-Y globally

A Q u e s t i o n o f An swe rs ru ch i r g o d u r a

16 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

Page 19: The Finger-friendly Apps

Given the fact that most businesses today are

reluctant to invest into an expensive telepresence solution and free applications such as Skype are getting better in terms of quality, what business opportunity do you see in the videoconferencing and telepresence market in India?A recent iDC report shows that the worldwide hardware based enter-prise video conferencing and tele-presence market showed a noticeable deceleration in growth in the first quarter of 2012, with video confer-encing revenue growing 14.4 percent year over year, well below the 23-25 percent year-over-year growth range witnessed in the last three consecu-tive quarters. on the other hand the

scalable, software based enterprise video conferencing and tele-presence market remains one of the bright-est prospects globally and is gain-ing huge momentum. enterprise technology leaders are starting to shy away from proprietary solutions. The flexibility offered by web con-ferencing, and availability of video conferencing solutions such as those offered by Vidyo – agile, adaptive, and form factor agnostic – will drive the future in personal and enterprise video market.

one of the primary drivers for enterprise web conferencing tools has been explosion of free consumer services like Skype and facetime. having been exposed to the benefits of video calling in their personal lives, employees are demanding a

similar facility in their enterprise tools. The clear demand from corporate users has been to be able to connect from anywhere, not just conference rooms, and in high quality, and to seamlessly and securely integrate with existing enterprise iT systems like uC tools, active directory, corporate firewalls and conference and board room sys-tems. it provides a more affordable solution to organisations, without additional investment in equipment required. other factors leading the growth of web conferencing include fewer firewall configuration issues, and lower internet bandwidth requirements for organisations look-ing for agile video solutions.

Vidyo is a cost effective for enter-prises and can be the best choice for

RucHiR GoduRa | VP, IndIa & South aSIa, VIdYo

Govt Sector has Huge Potential In a conversation with CTO Forum, Ruchir Godura, Vice President, India and South Asia, Vidyo, talks about the enterprise video conferencing and telepresence market and its potential in the country

ru ch i r g o d u r a A Q u e s t i o n o f An swe rs

17 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

Page 20: The Finger-friendly Apps

uc system

allows people to

be productive for

a lot longer.

india is a priority

market for Vidyo

and going forward

we will continue

expanding base in

the country.

india definitely

has a huge

opportunity

especially in

the government

space.

thIngs I BelIeve In

Smes for video conferencing as it’s a fully featured, secure, high defini-tion video conferencing solution that runs on the web as well as on private corporate networks and on platforms ranging from smartphones and tab-lets to full immersive telepresence rooms. Application like Skype etc face security concerns which doesn’t hold true for the solutions provided by Vidyo.

What are your focus areas and how are you trying to gain

entry into the enterprise space in the country?organisations across sectors, have shown interest in web conferenc-ing solutions. in the private sector we see tremendous growth coming from the financial services, health, telecom, retail and education sectors. in india, the government has also become a strong proponent of pro-moting e-governance, education and telemedicine via video conferenc-ing tools. We also see the adoption increasing in bigger organisations as they upscale or downscale, based on the existing economic environment.

india is a priority market for Vidyo and going forward we will continue expanding base in the country by providing cost effective and secure solution for enterprises. Video conferencing in india, as a trend has picking up pace as compared to earlier. Couple of years back, the idea of video conferencing had not even penetrated the personal lives of individuals, let alone the enterprise space. Today, with barriers such as complexity of technology, high costs, poor quality and unreliability being overcome, more and more people have begun to use video conferenc-ing in their day-to-day lives. india definitely has a huge opportunity especially in the government space and Vidyo would be keen to join hands with governments across the country to create an enhanced and seamless communication mode across domains like Defence, educa-tion, healthcare etc.

What does an effective unified communication

strategy offer to an enterprise?The biggest advantage that a unified communication system offers is that it allows people to be productive for a lot longer — regardless of their time and location — by just helping them collaborate with their colleagues. This ubiquity adds a whole lot of business value to enterprises. A good enterprise unified communication system today can largely reduce the need to physically travel for busi-ness meetings as well as reduce the need for a whole lot of prior resource reservation, thereby, saving on time and cost.

What are you doing in the area of video conferencing

over mobile?We have something called Vidyo-mobile software that brings high-quality video conferencing to popular Android and ioS tablets and smart-

phones. now you can host or join a person-to-person or multi-party video conference from wherever you are, using a simple internet connection. As an endpoint in your VidyoConfer-encing system, Vidyomobile delivers transcode-free video conferencing for natural communication at the pace of conversation, without the broken pictures associated with traditional solutions. enjoy the freedom to con-nect and collaborate easily with oth-ers across a wide range of endpoints from smartphones to room-based telepresence systems.

The software offers full functional-ity on both Wifi and 4g networks, extending access to remote and mobile participants. it is designed from the ground up for multi-party collaboration. With this technology, you can leverage mobile devices that users already have over commodity wireless networks. The application also has the ability to conference with legacy endpoints via Vidyogateway.

“applications like Skype etc face security concerns which doesn’t hold true for our solutions”

A Q u e s t i o n o f An swe rs ru ch i r g o d u r a

18 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

Page 21: The Finger-friendly Apps
Page 22: The Finger-friendly Apps

20 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

Best of

BreedAs is often the case, Cfos will rightly

insist that erP applications are the official systems of record. But from a practical perspective much of daily business is now being man-

aged via Crm and social media applications. The Ceo and the board of directors, of course, wants all these systems reconciled, which unfairly puts Cios squarely in the crossfire between different business leaders that often have conflicting busi-ness priorities and objectives.

A“We see this issue all the time. it’s definitely a tough time to be a Cio,” says Paul Allen, world-wide service line leader for finance & analytics for hewlett-Packard. “But it also creates a mandate for the Cio to solve the problem.”

Savvy Cios see this conflict as an opportunity to leverage some creative tension to finally address a range of application integration and data management issues across the enterprise. in fact, new big data and in-memory computing tech-nologies may finally give Cios control over data in a way that has eluded

them since the days when mainframes reigned supreme over all of iT.

unfortunately, it usually takes a major event of one type or another to get organisations to focus on the core problem. over a decade ago when DirectTV wanted to launch nfl Sunday Ticket, a service that lets subscribers watch every nfl game being televised on any given Sunday, the company had multiple systems of record in place that made it difficult to share revenues with the various networks televising the games. To solve

Caught in the CrossfireCIOs are stuck between different business leaders who have conflicting business priorities By Michael Vizard

ILLU

ST

RA

TIO

N b

y R

Aj

ve

Rm

A

CIOs are simply making the best of a bad business situation

Page 23: The Finger-friendly Apps

92What would you dowith an extra 92 hours?

®High-performance analytics from SAS helped a financialservices firm reduce loan default calculation time from 96

Early detection of high-risk accounts is crucial to determiningthe likelihood of defaults, loss forecasting and how to hedgerisks most effectively. Now, SAS can help you speed thattime to decisions from days to literally minutes and seconds– transforming your big data into relevant business value.

hours to just 4

high-performanceanalyticsA real

game changer.

High-Performance Computing

Grid Computing

In-Database Analytics

In-Memory Analytics

Big Data

sas.com/92 to learn more

For more information please contact [email protected]

Each SAS customer’s experience is unique. Actual results vary depending on the customer’s individual conditions. SAS does not guarantee results, and nothing herein should be construed as constituting an additional warranty. SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. © 2012 SAS Institute Inc. All rights reserved. S90309US.0412

Page 24: The Finger-friendly Apps

B E S t o f Br E E D S e c t i o n n a m e

22 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

a ppl i cat i o n S B E S t o f Br E E D

the problem, the senior management team simply declared one application would be the company’s official system of record. “The senior management team recognized the need to address this issue back when we had nine different systems,” says mike Benson, Cio of DirectTV and a member of the Technology Business man-agement Council, a nonprofit organization of iT executives.

unfortunately for Cios, with the grow-ing usage of Crm systems there is now more tension than ever between sales and finance. “We’re seeing Crm systems increasingly becoming the system the busi-ness relies on more simply because that’s where they get the most visibility into what’s really happening in the company on a daily basis,” says eric Berridge, Ceo of Bluewolf, an iT services firm.

Brandon Brown, Cio of Trident market-ing, a direct response marketing firm, says this issue is more pronounced in some ver-tical industries than others. in manufactur-ing industries where transactions still tend to take place on a quarterly basis, the erP system still dominates. But in a lot of busi-ness-to-consumer transactions, Brown says there tends to be a lot small, high-volume transactions that are happening in real time. That kind of business environment tends to shift the focus of the action within the com-pany to the Crm system.

“it now really depends on the nature of the industry as whether the business is going to be driven by a Crm or erP sys-tem,” says Brown.

Brown also notes that with advances in analytics platforms from vendors such as iBm it’s becoming easier to unify dispa-rate business processes and applications.

in fact, as advanced analytics continues to evolve alongside the rise in-memory com-puting, the data management pendulum may finally be swing-ing back in favor of the Cio.

many Cios have been trying to unify business processes via application integration proj-ects that make sure there is a single truth manifesting itself across every business applica-tion. Conflicting data from different applications, however, can easily wind up rendering

those applications all but useless. in addi-tion, organisations often wind up having to deploy analytic applications against data warehouses that add a lot more complexity and expense.

Simo Said, vice president of database and technology for lines of business and indus-tries for SAP, says unifying all the raw data in one system is one of the major business benefits of investing in a system such as the SAP high Performance Analytic Appliance (hAnA). in effect, hAnA becomes the system of record for processing all data in real time, which can then be accessed by any application that either runs directly on top of hAnA or via an application programming interface. rather than having multiple cop-ies of the same data running throughout the enterprise, hAnA provides an opportunity to centralize all that data in-memory in a way that makes distributing multiple copies of data around the enterprise unnecessary.

SAP hAnA is not the only database platform that iT organ-isations can opt to process data in memory in real time. exa-sol, for example, makes it possible to run existing SQl applications on top of an in-memory database. Converse-ly, Starcounter has developed a noSQl database that runs completely in-memory.

Alternatively, some organ-

isations may simply get by with Apache hadoop implementation, which may not be as fast as an in-memory database, but at the very least allows iT organisations to more cost effectively build big data analyt-ics applications.

obviously, it will take some time for the transition to in-memory computing to fully play out across the enterprise. in the mean-time, Cios, in the absence of a corporate mandate that identifies one particular appli-cation as the system of record within the organisation, may want to bide their time.

The simple fact is that a lot of the division that exists in many organisations winds up being reflected in the iT systems that support business units that are either not quite as closely aligned as they might be, or are hostile to each other because the underlying business model is fundamen-tally flawed. of course, that doesn’t stop anybody on the business side from accusing iT of not understanding the needs of their business unit, even though those needs are often in direct conflict with the needs of another part of the business. more often than not, Cios are simply making the best of a bad business situation that is currently, but perhaps not permanently, beyond the means of their control.

—The article was first published in CIO

Insight. For more stories please visit www.cioin-

sight.com.

Many CIOs have been trying to unify business processes via application integration projects that make sure there is a single truth manifesting itself across every business application

$131bn will be the Size

of public cloud

market by 2017

Page 25: The Finger-friendly Apps

ci sco c to f cu s tom s e r i e s

23 07 MARCH 2013 cto forumThe Chief

TeChnologyoffiCer forum

ci sco c to f cu s tom s e r i e s

Simplifying IT Management Through Cisco’s UCSIn a series of interactive articles, Cisco will shed more light on its Unified Computing System (UCS), thereby enabling CIOs to better manage their IT infrastructure

How can UCS help me in simplifying management of

my IT resources?Dinesh Kaushik, Head IT, Caparo IndiaAnswer: Management solutions for an integrated data center infrastructure must help monitor the network and storage resources required by the computing platform. Complexity in server management software can increase as more products are used to develop and maintain an integrated infrastructure. Additionally, each component vendor will bring its own management interface and communication protocols.This simplification changes things for the better because it takes a lot of complication out of the equation.The Cisco UCS Manager runs embed-ded in the fabric interconnect and helps manage all components of the Cisco UCS with Intel® Xeon® pro-

cessor through a single pane. Manag-ing the server, networking, and storage resources with a unified approach greatly decreases complexity, providing the capa-bility to deploy and alter applications quick-ly through the innovative use of policies, role-based access control (RBAC), service profiles and templates.

Cisco’s UCS is no doubt an inno-vative solution. However, would

deploying this lead to vendor lock-in? How compatible is it with other IT infrastructure/solutions?Manoranjan Kumar, CIO, Kanoria Chemicals & IndustriesAnswer: Deploying Cisco UCS with Intel® Xeon® processor will not result in a vendor lock-in. The difference lies in the architec-ture which provides a significant advantage based on how it is implemented. Standard Intel x86 processors are beneficial both from a connectivity and a management perspectives. Cisco UCS supports most

operating systems commercially avail-able as well as third party storage devices. Therefore, it can be easily integrated along with any existing infrastructure.

The following link gives the interoperability matrix with other vendors: http://cisco.in/ucs/matrix

To learn more, you may also visit us at cisco.in/servers

BROUGHT TO YOU BY

Intel®, the Intel® logo, Xeon®, and Xeon® inside are trademarks of Intel® Corporation in the U.S. and/or other countries

For any queries regarding Cisco UCS, please send them to [email protected]

Page 26: The Finger-friendly Apps

the finger-friendly

apps

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

24 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 27: The Finger-friendly Apps

The introduction of social, mobile and cloud technologies has changed the way billions of people around the world communicate with each other. It has had an impact on enterprises too. The result has been that businesses

today are transitioning from complex, desktop-optimised applications to light, user-friendly applications that work

seamlessly on mobile devices. Vendors have taken the cue and are increasingly developing such apps.

CTO Forum take a closer look at some such enterprise applications and how CIOs are leveraging them.

By Atanu Kumar DasDesign By Pradeep G Nair

t h e f i n g e r- fr i e n d ly a pp s COVE R S TORY

25The Chief TeChnology

offiCer forum 07 march 2013 CTO fORum

Page 28: The Finger-friendly Apps

Gone are those days when enterprise applications were complex solutions that were delivered through desktops. With the emergence of consumerisation

of iT, employees now expect applications to be available on their mobile devices anywhere and anytime. They also want them to be simple to use. Vendors are increasingly align-ing their product development strategies in line with this trend. The success or failure of any enterprise applications is directly related to its ease of use. Analysts believe that 80 percent of enterprise applications succeed in today's envi-ronment because of their ease of use.

According to hirak Kayal, Vice President, Applica-tions Product management, oracle india, “As an enterprise technology leader, oracle offers a huge number of business applications across the stack and to companies in every domain. We believe that a user-friendly and simple interface is the primary user-need for every single business application. This is an area where oracle has been carrying out signifi-cant amount of work across the applications product portfolio. user experience is not just the ease of navigation through the application. it’s much deeper.

We have been enhancing the whole way a user works in the application to get his / her work done.”

“having actionable insights telling the user what best to be done, when to be done and how to be done through a simple and intuitive user interface is what improves his / her productivity to a great extent. That’s what improves the overall user-experience of the system. it does not stop at desktop user experience alone. We are extending similar experience through hand-held mobile devices and tablets as well. A user can access the application through these devices and be able to not only execute transactions but also have access to embedded analytics to support his/her actions,” he says.

for example, the company claims that one of its solu-tion suite, oracle fusion applications, leverage years of in-depth, customer-driven research and design to create a next-generation user experience. user-experience in oracle fusion applications is designed to leverage the power of oracle fusion middleware, business intelligence and embedded social collaboration. With oracle fusion applications, organisations will move beyond simply com-pleting transactions to gaining real business insight. The

innovative apps,amazing experience

vendors are developing enterprise applications that are user-friendly and light on the bandwidth

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

26 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 29: The Finger-friendly Apps
Page 30: The Finger-friendly Apps

oracle fusion applications user experience puts users at the center. The user discovers what he/she need to know and the result is a dramatic improvement in end-user productivity, according to oracle.

We are in the midst of a computer revolution – cus-tomers, employees and partners are all empowered. The introduction of social, mobile and cloud technologies has changed the way billions of people around the world com-municate with each other. more than 150 million social conversations are happening every day. more than 1.7 bil-lion touch devices were shipped in 2012. over half of Ceos surveyed in iBm’s 2012 study expect that social channels will be the primary way of engaging customers within the next five years. Companies now realise that they must con-nect with their customers, employees, partners and prod-ucts to become customer companies.

one of the important aspects about the growing popularity of building social networks is to have user-friendly interfaces.

As Sidharth malik, AVP india, Salesforce.com says, “The growing popularity of social networks like face-book and Twitter has made feed-based user interfaces the new standard when it comes to consumer applica-tions. When Salesforce.com started, we asked why couldn’t business applications be as easy to use as Amazon.com. Today, we are asking why business appli-cations can't be as easy to use as facebook. All of our enterprise applications, including the Sales Cloud, Ser-vice Cloud and marketing Cloud, have award winning, intuitive and easy to use user interfaces. each applica-tion also integrates with Salesforce Chatter, the number one enterprise social network.”

With Chatter, enterprises have the power to leverage the social features popularised by facebook and Twitter -- such as profiles, status updates and real-time feeds in a secure enter-prise environment. Chatter’s user-friendly, feed-based user-interface lets employees “follow” documents, people, business processes and application data, and companies can connect content and applications from any source, gaining valuable insight into what is happening across the entire business.

The results of providing employees with such a user-friendly interface are clearly visible. There is a new level of productivity that crosses departments and organisational barriers because the insights are pushed to users in real-time.

Today with more than 100,000 customers, salesforce.com is the only company delivering a next generation customer plat-form that enables companies of all sizes to revolutionise the way they sell, service, market and innovate.

Delhi-based company Crmnext's Ceo nishant Singh also feels that it is very important for vendors to focus on ease of use of enterprise applications.

he says, “i strongly believe that it is becomming increas-ingly important for vendors to provide user-friendly interface.

When we started our company eight years, we realised that 50 percent of Crm applications failed. We were adamant to

find the reason for the same. We did four years of r&D and concluded that one of the primary reasons for the failure was because the applications were very difficult to use. They lacked simplicity.”

“Another important factor is enterprise applications should have the ability to be accessed from remote locations. The legacy apps had to be accessed from inside the office. our product was designed keeping in mind the usability factor and needs of the employees,” he says.

Satisfied customersone of the biggest customer for Crmnext is hDfC Bank. four years ago, the bank was looking for a Crm applica-

“The growing popularity of social networks like Facebook and Twitter has made feed-based user interfaces the new standard when it comes to consumer applications”

Sidharth Malik, AVP India, Salesforce.com

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

28 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 31: The Finger-friendly Apps

The Cloud Is Here. Join Us To Secure It Now.Founded in 2011, CLOUDSEC summits are Asia Pacific's leading cloud security events for CXOs and senior managers. These events are vendor-neutral and features presentations by industry experts who will address a wide spectrum of real-world challenges and strategies in cybersecurity today.

Back by popular demand, CLOUDSEC 2013 will continue to inspire and direct our path towards the cloud, guided by the theme “Have A Safe Journey”. The events will be held in gateway cities in the Asia-Pacific region.

Date : Wednesday, 10 April 2013Time : 8:00am onwardsVenue : Grand Hyatt, Mumbai

CLOUDSEC 2013 INDIAMUMBAI

Date : Friday, 12 April 2013Time : 8:00am onwardsVenue : Inter-Continental Eros, New Delhi

DELHI

Turbocharge your cybersecurity today.

:rosnopS dnomaiD:yB detsoH Regional Supporters:

SIGN UP NOW SEATS ARE LIMITED

To Register call - +91 8452949090For more information, please visit

www.cloudsec.co

Page 32: The Finger-friendly Apps

2010-11. The quality of documentation improved from 60 percent to 97 percent in november 2011.

The effect of social mediaToday a brand gets mentioned in social media a lot more than we could have imagined. A single customer view about customer service or product benefit or organisation culture play a huge role in influencing prospective custom-ers or potential hiring candidates.

“Taking into cognizance the change of tide towards social media and its benefits, oracle has designed its cloud-based as well as on-premise applications with a social element incorporated. oracle’s Social relationship management (Srm) solutions are a good example of this. They help organisations transform their corporate business processes and systems, with innovative social collaboration, market-ing and insight services. it provides a complete platform to execute social media strategy for an enterprise,” adds Kayal.

oracle Srm suite is an integrated enterprise service that enables companies to listen, engage, create, market, and analyse interactions across multiple social platforms in real-time, providing a holistic view of the consumer.

oracle social network comes packaged with oracle fusion Crm for enterprise wide collaboration. oracle

social network is a secure private network that provides a broad range of social tools desaigned to capture and preserve information flowing between people, enterprise applications, and business processes. By connecting users with most critical applications, oracle social network provides contextual, real-time communication within and across enterprises. With oracle social network, users have the tools they need to collaborate quickly and efficiently, while leveraging the organisation’s collective expertise to make informed decisions and drive business forward. it is therefore, critical to have a user-friendly interface that is known to users and is simpler to collaborate on.

“oracle social network can be accessed anywhere and

tion that could manage its 55,000 users. The prior Crm application which the bank was using was not able to integrate different applications into one. The result was that it had become tedious for the bank employ-ees to work on.

“The mandate was to manage the customers of hDfC better. They were looking for a Crm product which could be positively evaluated on three key parame-ters. first, a product with architecture capable of managing over 55,000 users serving over 25 million customers. Sec-ondly, they needed a Crm solution with integration capa-bilities that was reliable and capable of managing complex and diverse scenarios while retaining traceability. lastly, the bank needed an implementation partner with banking domain knowledge and capability to execute the vision. Above all, the solution had to be user-friendly,” says Singh.

Crmnext created multi-wave process workouts to ensure unification and consolidation of all unstructured processes (that ran on excel) and semi automated processes. it phased out six applications such as lead tracking system, customer contact management, etc. Crmnext integrated with seven core systems to provide end-to-end status vis-ibility. Process T-A-T was guaranteed by alerts and multi-stage escalations across departments and channels by using mobile and two-way SmS capabilities to create leads, update status, request for customer offers, etc.

This resulted in a whopping jump in hDfC's customer base by 150 percent. Assets' business grew by 100 percent over 2008 levels. number of leads captured per month from September 2010 to march 2012 increased by 275 percent. There was an increase of 32 percent in lead con-version from the financial year 2009-10 to financial year

“I strongly believe that it is becomming increasingly important for vendors to provide user-friendly interface” Nishant Singh, CEO,CRM next

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

30 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 33: The Finger-friendly Apps

anytime from a variety of interaction points including a web browser, outlook application, or mobile and tablet devices. each client provides a rich experience through form factors specific to the devices they run on. outlook integration bridges the social experience between oracle social network participants and their email. oracle social marketing enables creation of social content and publish-ing. oracle social engagement and monitoring helps an enterprise track social activities around their brand and analyse effective roi on various social campaigns. our recruitment solutions help enterprise leverage the power of social media to source candidates,” adds Kayal

Social collaboration is absolutely integral for companies and malik also feels the same. he says, “in the midst of today’s computer revolution, we cannot afford to live and work in silos. Social collaboration in the enterprise breaks down barriers across departments and regions, improving transparency, productivity and engagement. Sales teams can collaborate close more deals faster. The C-Suite can have unprecedented transparency across their organisation to drive innovation. ”

Design and technologyDesign and choice of technology is extremely important for an enterprise grade application. no application can be developed without planning out the design archi-tecture of it. The design of user interface is the key to deliver a system of engagement.

“Design of oracle fusion applications user-interface relies on years of customer usage data, feedback and analytics. every step has to be considered in great detail to be able to build a successful and easy-to-use application. Choice of technology should also enable us to execute and deliver the designed application. for example our ADf mobile platform completely enable us build mobile applications once and render natively across multiple mobile operating systems. it’s a combination of design and technology which plays a significant role in delivering a user friendly application. We

embarked on the design principle and tech-nology choice for fusion applications quite a

few years back and good part is that the strategy remains unchanged. That means we have been

moving in the right direction,” said Kayal.

Security issues There have been concerns among enterprises that security features will get compromised if the vendor develops an application which is too simple and easy to use. Kayal feels that vendors are today working towards providing security and also offer a simple platform.

“it is definitely possible to develop secure enter-prise applications while keeping them simple and easy to use. That’s why the choice of technology and design framework is so important. While the design and technology layer enables us to deliver the desired user-experience, security is ensured across multiple layers from hardware, operating system, database to application layer. oracle owns the entire stack and hence we are most capable to offer secu-rity across the stack. oracle has a number of secu-rity solutions and suites that can be integrated into applications to make them secure and robust.”

oracle identity management is a complete and inte-grated, next-generation identity management platform that provides breakthrough scalability; enables organisa-tions to achieve rapid compliance with regulatory man-dates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Security does not only come from software capabilities. Physical security is also extremely important as well for cloud applications.

“Oracle social network can be accessed anywhere and anytime from a variety of interaction points including a web browser, outlook application, or mobile and tablet devices”

Hirash Kayal, Oracle

t h e f i n g e r- fr i e n d ly a pp s COVE R S TORY

31 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

Page 34: The Finger-friendly Apps

M3m india limited, a property development and real estate firm based in gurgaon, has evolved from a realty advisor to a designer of luxury

residential and commercial properties. m3m india owns more than 500 acres of land in gurgaon, Delhi and nCr. m3m india’s business has developed through three phases: acquiring and consolidating land and licenses; construction development and marketing; and maintenance. in 2010, the company began the devel-opment phase and decided its existing home-grown accounting system no longer met its requirements.

Challenges“We needed a simple enterprise resource plan-ning (erP) system to manage financials, sales, and projects across all of our locations,” said gaurav Jain, vice president – finance, m3m india lim-ited. “if we continued using our existing account-ing system, we would have required additional applications to manage key business processes.”

in early 2010, m3m india engaged oracle Partner filix Consulting to deploy oracle e-Business Suite release 12.1.2 modules: oracle financials, purchasing, property manager, inventory management, and Crm on demand.The integrated system streamlined financial and inven-tory management processes, improved sales lead man-

agement, and made it easier for staff to manage and complete property sales.

“oracle e-Business suite and oracle Crm on demand supported the expansion of our property portfolio across all locations. The best part of the application was its ease-of-use features, ” said Jain. “These applications provided us with the right financial, inventory, and sales data in real-time, ensuring our customers received a sat-isfactory level of service at all times.”

Improved Reporting with More Secure Datam3m india used oracle financials to process all transac-tions—including administrative expenses such as sala-ries and general office purchases—and project expenses, such as raw materials required for property construction and development, like cement, steel, and furnishings.According to Jain, oracle financials provided the compa-ny with security and data management capabilities that were not available with its previous accounting system.“oracle financials was capable of handling thousands of transactions, providing us with a system that will sup-port future growth,” said Jain. The system also offered a high level of data security. We can assign a staff member to only perform a certain task at a particular time and it meant connectivity in remote locations.

M3M India used Oracle financials to process all transactions, including administrative expenses and general office purchases

m3m ups sales by using oracle app

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

32 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 35: The Finger-friendly Apps
Page 36: The Finger-friendly Apps

“for example, if we have one staff member responsible for invoicing processing, i can restrict his or her access to certain parts of the system that are used only to pro-cess payments.”

oracle financials also enabled m3m india to gener-ate expenditure reports and reports related to indian tax regulations immediately, using clean and reliable financial data.

“We can now generate any financial report almost immediately,” said Jain. “Previously, we would spend two to three days gathering information from spread-sheets to generate any type of financial report.”

More Control over Purchasingm3m india uses the centralised oracle purchasing appli-cation to order raw materials used to construct proper-ties and purchase office products from various suppliers. The system enabled cost control by monitoring product orders, determining if purchases have been received, and processing invoices easily.

“As this business grows, oracle purchasing will become more and more beneficial,” said Jain. “We are hoping to get to the point where one less person is involved in processing each order.

“oracle purchasing ultimately provided us with peace of mind that the correct information is available to every-one involved in purchasing. The system also reduced the chance of unauthorised purchases across our business because we have control over the movement of packages from the time an order is placed to when it is received.”

Better Customer Service with Centralised Systemoracle property manager provided a central data reposi-tory that enabled m3m india to record customer infor-mation and more easily and effectively manage property sales. The web-based system provided sales executives at several locations with the latest stock information. This

ensured they can find relevant information immediately when customers call.

“for example, if a customer inquires about the status of their payment for a property, we can access the rel-evant information for that customer immediately,” said Jain. “This ultimately improves the service we provide to our customers.”

Solutions enabled accounts staff to generate financial reports

almost immediately rather than spend two to three days gathering data from spreadsheets Provided data security features

that restricted unauthorised staff from accessing certain financial information Prevented staff from making unauthorized purchases

by providing complete control over the procurement of office items and raw materials improved customer service levels by providing a cen

tral data repository to store client data and more effec tively manage property sales Provided insight into inventory at construction sites,

which ensured staff always had the right amount of stock and projects were completed on time ensured staff followed sales leads, which helped

increase property sales by 10 percent Saved 50 percent on software, hardware and mainte

nance costs with the hosted oracle Crm on Demand application.

Implementation ProcessDuring the first phase of the project, m3m engaged filix Consulting to deploy oracle financials, purchasing, proper-ty manager, and inventory management. filix also deployed oracle Crm on demand during the same phase. “We were india’s first real estate company to go live with oracle Crm on demand and oracle e-business suite release 12, achiev-ing this in only four months,” said Jain.

“we were india’s first real estate company to go live with

oracle crm on demand and oracle e-business suite

release 12, achieving this in only four months”

Gaurav Jain, VP, Finance, M3M India Limited

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

32-B 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 37: The Finger-friendly Apps

ask the expert

Dr Mahipal Sachdev Founder, Centre for Sight

Q: Centre for Sight is India’s second-largest ophthalmology chain with 44 centers across the country. We expect a turnover of more than ̀ 125 crore this fiscal. The company has successfully leveraged private cloud to achieve real-time multi-location, multi-business integration. We are now looking up to our IT team to further strengthen this initiative and make Centre for Sight a more resilient organisation. What solutions can I expect from my IT team when it comes to business intelligence, asset management and new-age disaster management?

A: There are many resilient and robust applications that are available on a cloud model including ERP, DW/BI and Disaster Recovery (DR). Disaster Recovery organisations can also look to deploying a public cloud, because they will not have to invest in trained manpower. As the DR datacenter can be owned by service providers to run these services, there will be no investment on the setting up of the DR datacenter. For the rest of the applications, the existing environment needs to be examined. If the current running applications have additional modules available, which are well tested and integrated for BI, CRM, SCM etc., they would enable easy integration. Many other standard applications are also available that can help get the datacenter upto speed on these aspects.

Ashish WattalNational Product Manager– UCS Cisco India & SAARC

ADVERTORIAL

ci sco c to f cu s tom s e r i e s

37 07 february 2013 cto forumThe Chief

TeChnologyoffiCer forum

ci sco c to f cu s tom s e r i e s

Next Gen UCS servers for Next Gen ComputingIn a series of interactive articles, Cisco will shed more light on its Unified Computing System (UCS), thereby enabling CIOs to better manage their IT infrastructure

How has Cisco made server I/O more powerful and

much simpler?Answer: One of the key differentia-tors of Cisco UCS (Unified Comput-ing System) with Intel® Xeon® processor is the way in which high-capacity server network access has been aggregated through Cisco Virtual Interface Cards and infused with built-in high performance virtual networking capabilities. In “pre-UCS” server system architectures, one of the main design considerations was the type and quantity of physi-cal network adapters required.

Networking, combined with comput-ing sockets/cores/frequency/cache, system memory, and local disk are historically the primary resources considered in the balancing act of cost, physical space and power consump-tion, all of which are manifested in the

various permutations of server designs required to cover the myriad of workloads most efficiently. Think of these as your four server subsystem food groups. Architec-ture purists will remind us that everything outside the processors and their cache falls into the category of “I/O” but let’s not get pedantic because that will mess up my food group analogy. 

In Cisco UCS, I/O is effectively taken off the table as a design worry because every server gets its full USRDA of net-working through the VIC: helping por-tions of bandwidth, rich with Fabric Extender technology vitamins that yield hundreds of Ethernet and FC adapt-ers through one physical device.

Gone are the days of hemming and haw-ing over how many mezz card slots your blade has or how many cards you’re going to need to feed that hungry stack of VM’s on your rack server.

This simplification changes things for the

better because it takes a lot of complication out of the equation.

There is also a need for higher processing power for bringing

new choices for design optimization. What is happening on this front?Answer: Cisco has been working hard making server networking better with improved and optimized efficiency.  With the advent and advance of multi-core pro-cessing, the workhorse two socket server has become a real performance monster. In fact, for some applications the amount processing power required, relative to the other food groups I mentioned in my previ-ous answer, is outstripped by the capabili-ties of the mainstream processor family, which in today’s incarnation is Intel’s Xeon E5 2600 series.

In response to this phenomenon, Intel subdivided the Xeon lineup to include a new “EN” class of processors, the E5-2400 series, which ease back on the gas pedal of Moore’s law for designs that don’t require as much processing power in relation to local storage and memory. This creates a new class of cost & performance optimized systems for lighter workloads or for stor-age heavy systems (think big data) at the entry end of the portfolio.

Three of our new UCS M3 series systems fall in this category:  the B22, C22 and C24.  At the same time, Intel has brought four socket server options, formerly the prov-ince of the mission critical, “EX” end of the spectrum, down into the mainstream.  An example of this is our new UCS B420 blade.  So if you want four socket core count and performance but don’t necessarily need the comprehensive RAS features of an EX class system, you now have a price/performance optimized solution for that need.

BROUGHT TO YOU BY

Intel, the Intel logo, Xeon, and Xeon inside are trademarks of Intel Corporation in the U.S. and/or other countries

For any queries regarding UCS, please send them to [email protected]

Page 38: The Finger-friendly Apps

What are your views on vendors developing applications/solutions that have a user-

friendly interface? How important it is for enterprises?Vendors are today concentrating on developing enter-prise applications that have a user-friendly interface. As per data available with gartner, eight out of 10 enterprise applications succeed only because they have a user-friendly interface. And the primary rea-son for their failing enterprises is because they lack an interface that is attractive to the user. Be it SAP, oracle, microsoft or Salesforce, the core idea is to pro-vide a platform that is as easy to use as is facebook or linkdin. enterprise users are increasingly demand-ing simplicity in their apps. So today the vendors are concentrating totally on improving the end-user expe-rience. i remember once SAP had to revamp an entire application just because it was not user friendly.

Why do you think there is demand among enterprises to use applications which have

a user-friendly interface?i think the demand is primarily because of the experience that users have by using social tools in their mobile. Today, there is a very thin line between office experience and personal usability. employees want the same look and feel when they come to work and they do not want to work on multiple platforms to complete a task. The vendors are working on developing enterprise applica-tions that can give on-premise access as well as mobile access. The idea is to optimise the license usage. earlier, enterprise used to buy licenses and they were left unused because of the cumbersome interface and this led to loss of productivity. But, now vendors are aware that usability is the key cri-teria for success.

Sunil Padmanabh, Research Director, Gartner India, talks to Atanu Kumar Das on the importance of developing apps with a simple interface

“making apps user-friendly”

COVE R S TORY t h e f i n g e r- fr i e n d ly a pp s

34 07 march 2013 CTO fORum The Chief

TeChnologyoffiCer forum

Page 39: The Finger-friendly Apps

What are the challenges in developing an application/solution which has a user-

friendly interface?The most important challenge that i feel is to make the application simple to use. Vendors try and bundle all the functionalities in one enterprise application. This makes the solution not just complex but also cumbersome for end users. meanwhile, corporates want applications that have modules, which can be accessed by specific departments. Today, users also want gamification experience in their applications, which also poses a challenge for the vendor. i feel a user-friendly app is one that is intuitive, content-specific, should designate appropriate business roles and should have dynamic analytical features. The need of the hour is to develop applications that can run on any and every platform, be it on the desktop or on a mobile device. employees today want flexibility to work from anywhere on any device and that should be the primary concern for vendors developing enterprise applications.

Can enterprise applications stay user- friendly if we implement strong security

features?one of the most integral part that enterprises look at is security but vendors should ensure that security features at the back-end should not be a deterrent in developing a user-friendly interface. The problem is that enterprise vendors mostly concentrate of application security as well as data security. The trick is to concentrate on the data security as that is the primary concern of the enterprises and keep the interface simple. Security is important but it should not be over engineered, there should be a balance between the functional needs. There have been many instances where enterprise applications have

failed primarily because vendors have tried to concentrate too much on security and less

on developing simple usability of the application. So there should be an equal mix of both security features and easy-of- use as both are integral for the applications success.

What are the key features that an enterprise looks for while deploying an application?Some of the key features that enterprises look for in an application is support for multiple mobile plat-forms. Be it Apple, Android, BlackBerry or Windows, the vendors should be developing applications that supports all these platforms. An enterprise applica-tion store should allow the applications to be down-loaded on the device from the browser via a url or through an enterprise market application which is similar to the google Play Store or iTunes App store. Another important feature is security and application with downloads happening on a secure VPn tunnel.

Where do you see enterprise applications heading in the future?

in the future, i foresee that vendors would concentrate on making enterprise applications more simpler to use. The idea would be to integrate with legacy as well as modern applications and provide a platform which is scalable and flexible. The vendors will concentrate on improving the user experience as this is the key to building a successful enterprise application.

“The problem is that enterprise vendors mostly concentrate of application security as well as data security. The trick is to concentrate on data security”Sunil Padmanabh, Research Director, Gartner India

t h e f i n g e r- fr i e n d ly a pp s COVE R S TORY

35 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

Page 40: The Finger-friendly Apps

'The Innovation Steeplechase'In his or her mind, each of us wants to be 'innova- tive'. Innovation is the new mantra for success for corporations and individuals within them. It is the answer to problems of growth, profitability, produc- tivity, and organisational logjams. It is also the ready response expected from 'leaders' - functional or otherwise.

But like leadership, innovation remains elusive and daunting.

How does innovation come about and how can you bring it about - across the organisation or within your department? Most CXOs feel constrained due to 'too much to do in too little time'... and therefore none left over to innovate or fight deeply entrenched systems that come in the way of change. Equally inertia could result from the feeling that what you do is too mundane to innovate. Misconceptions around innovation only make 'getting started' tougher!

Given how critical innovation is for raising the bar - every time, every day - the 9.9 Leadership Institute is launching a series of 'Innovation Workshops' to help with 'winning the innovation steeplechase' irrespective of where you are in the race - before the start line, in the uncertain middle, or closer to the finish line...

FOR MORE INFORMATION CONTACTEmail: [email protected]: +91-9999799614Email: [email protected]

What the '9.9 Innovation Team' can do for you...Companies and senior executives are grappling with answers to one or all of the questions below in the innovation context.

The HowHow do I execute and implement?Here we offer our Creativity & Innovation Toolkit to help you kickstart the process to:- Deliver specific outcomes- Sustain the process- Embed programmes to influence the DNA of the organizationIf you are unaware of the one right problem to solve that creates "unfair" advantage for your organization in the marketplace, then "The How" applies to you.We offer Initiation Workshops; Toolkits; Projects and Embedding Programmes - with durations ranging from 2 hours to 2 days to 2 months and beyond.

The WhyWhy should I innovate? Can I be innovative?This question is answered through awareness around innovation, including:- Addressing myths and

misconceptions- And why each one of us can be

'innovative'If you spend all your time making tiny process improvements and watching competitors steal your customers with innovative new products and services, then "The Why" applies to you.

The WhatWhat areas should you innovate for maximum benefit?We outline areas where innovation can deliver serious benefits and identify the most popular application areas across organisations. The most obvious approaches begin with a need for:- Topline growth- Bottomline improvementYour business is going fine, sales and profits are a bit flat perhaps but they will pick up... or will they? If this is your concern, then "The What" applies to you.

Depending on which of these questions dominates your thoughts around innovation, the 9.9 Innovation Team will design a workshop or programme for you and your team.

Page 41: The Finger-friendly Apps

'The Innovation Steeplechase'In his or her mind, each of us wants to be 'innova- tive'. Innovation is the new mantra for success for corporations and individuals within them. It is the answer to problems of growth, profitability, produc- tivity, and organisational logjams. It is also the ready response expected from 'leaders' - functional or otherwise.

But like leadership, innovation remains elusive and daunting.

How does innovation come about and how can you bring it about - across the organisation or within your department? Most CXOs feel constrained due to 'too much to do in too little time'... and therefore none left over to innovate or fight deeply entrenched systems that come in the way of change. Equally inertia could result from the feeling that what you do is too mundane to innovate. Misconceptions around innovation only make 'getting started' tougher!

Given how critical innovation is for raising the bar - every time, every day - the 9.9 Leadership Institute is launching a series of 'Innovation Workshops' to help with 'winning the innovation steeplechase' irrespective of where you are in the race - before the start line, in the uncertain middle, or closer to the finish line...

FOR MORE INFORMATION CONTACTEmail: [email protected]: +91-9999799614Email: [email protected]

What the '9.9 Innovation Team' can do for you...Companies and senior executives are grappling with answers to one or all of the questions below in the innovation context.

The HowHow do I execute and implement?Here we offer our Creativity & Innovation Toolkit to help you kickstart the process to:- Deliver specific outcomes- Sustain the process- Embed programmes to influence the DNA of the organizationIf you are unaware of the one right problem to solve that creates "unfair" advantage for your organization in the marketplace, then "The How" applies to you.We offer Initiation Workshops; Toolkits; Projects and Embedding Programmes - with durations ranging from 2 hours to 2 days to 2 months and beyond.

The WhyWhy should I innovate? Can I be innovative?This question is answered through awareness around innovation, including:- Addressing myths and

misconceptions- And why each one of us can be

'innovative'If you spend all your time making tiny process improvements and watching competitors steal your customers with innovative new products and services, then "The Why" applies to you.

The WhatWhat areas should you innovate for maximum benefit?We outline areas where innovation can deliver serious benefits and identify the most popular application areas across organisations. The most obvious approaches begin with a need for:- Topline growth- Bottomline improvementYour business is going fine, sales and profits are a bit flat perhaps but they will pick up... or will they? If this is your concern, then "The What" applies to you.

Depending on which of these questions dominates your thoughts around innovation, the 9.9 Innovation Team will design a workshop or programme for you and your team.

Page 42: The Finger-friendly Apps

38 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

Internet is a medium with which we fabricate a social contract to communicate with each other

POINTS5

Much hay has been

made over the use of

the term ‘Cyberspace’

The inTerneT was

born with the idea

of sharing data and

to connect systems

(nuclear weapons

primarily)

in gibson’s universe, people

‘jacked’ into the

internet and left their

bodies behind for a

digital domain

cyberspace is in

fact what is between

our ears

cyberspace is only a space in the

cognitive dissonance

t E cH f or G oVE r NAN cE cyb e rs paceim

ag

ing

BY

an

il.t

CyberspaCe: It’s a MedIuM,Not a plaCe

Page 43: The Finger-friendly Apps

39 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

lately i have been focusing more on the cognitive, social, and psychological issues surrounding the human animal and the technological interface that we have created for communicating with one another. The internet was born with the idea of sharing data and to connect systems (nuclear weap-ons primarily) during a time of war after regular infrastructure may be destroyed. it has morphed since then to encompass much more of our daily lives. not only from the methods we use to pay our bills but also sociologically by the invention of social media. Along the way we humans also created a mystique around this new technology that was futuristic and cool. The name that was coined for this ideal was put forth before the internet was born by Wil-liam gibson in his book “neuromancer” it was this presaging of the idea that not only would we someday in the future be able to communicate with people on a network of computers, but also that we would actu-ally live on the “net” in gibson’s universe people “jacked” into the net and left their bodies behind for a digital domain with imagery that felt real and technologies that could kill your physical body while you were linked to cyberspace. it was really from this coining of the term and it's cool factor that it began to catch on as we developed the technologies of the internet and the means to interface with it more graphically. hackers gravitated to the word as well as war fighters early on but it really did not

not the modern lexicon until more recent times with the advent of APT (Advanced Persistent Threats) and Stuxnet where mal-ware and espionage met and small conflicts were waged. Suddenly the sexiness of Cyber which really also more commonly was used with the term “sex” after it became the word of the day and once tagged with war became the de facto term for a new kind of warfare. …. But, lets go back to this notion of “cyber” being a place. is it in fact a place? Can one inhabit it? or is it just a medium by which data is passed between systems and people to communicate? i would say that both of the latter are the reality and that clothing the medium in a sexy terminology leads to too many misapprehensions about the realities of what exactly is going on when one goes to war in it. As if anyone really can.

Sociology & LinguisticsWhile the internet was originally con-ceived as a network to send data and com-municate between systems it has become much more societally today to us all. it is the primary means of communication for people via phones, computers, and other types of interfaces. it is this fact, that more-over the social aspects of the internet and its important to society have become the primacy that we need to investigate it as a mirror to our natures. it is our nature that is effecting the direction of the technology.

in the realm of the information security world i have been moving more and more

away from the strict notions of defense and offense via technological means alone toward a more comprehensive understand-ing of the why and the how of the adver-sary's aegis instead of primarily looking at the vulnerabilities and the outcomes of their being used.

This shift for me has widened the scope quite a bit and it became clear to me that by looking at the problem between the key-board and the computer is a key to a better 360 degree process that we could use to manage our vulnerabilities more effectively. By studying these new sciences (Cyber-Psychology & Cyber-Sociology) i think that we can get a much better handle on creating a more secure environment to start as well as a more holistic means to information security on the whole.

once again, the medium is just the means of communication though that does evolve the communication and lay the groundwork for social change. mores, ideas, and language all effect the society broadly. in this case the medium of the internet or “cyberspace” as a modality is having real world consequences due to the hyper connected nature of it all today. Ponder the future connectivity as we move from Web 2.0 to 3.0 as well. how much more will the medium, which now can effect our daily lives in good as well as terrible ways directly enable us to further or destroy society up to the physical in the case of infrastruc-ture (grid security etc.

Cognitive DissonanceThe key point that i want to make in this first of perhaps a few blog posts on all of these ideas is that the human behind the keyboard is just as important if not more important than the keyboard and CPu they wield. it is also important to set forth that cyberspace is only a place in the cognitive dissonance that we are all deluding our-selves into believing. in reality cyberspace is in fact what is between our ears and the internet is a medium with which we fabri-cate a social contract to communicate with each other, and potentially wage war. By understanding the tool user and their moti-vations you can understand the tool. —This article is printed with prior permission

from infosecisland.com. For more features and

opinions on information security and risk man-

agement, please refer to Infosec Island.

Much hay has been made over the use of the term “Cyberspace” since all this talk about cyberwar has been bandied about. i for one have also been one of the more vocal personages yelling online and off about the use of the term or more to the point its over-use and lack of real context. i consider it a bit of a pet peeve really but i started to think about it much more recently and think that it’s time to put down some ideas that have been in my head about cyberspace.

cyb e rs pace t E cH f or G oVE r NAN cE

Page 44: The Finger-friendly Apps

40 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

t E cH f or G oVE r NAN cE re g u l at i o n

It’s a common problem. A company learns that a former employee copied confidential computer files--proprietary source code, marketing plans, customer lists and pricing information--before leaving and has used the information to start a compet-

ing business or has shared it with a competitor. The first instinct is to challenge the conduct as a misappropria-

tion of trade secrets. After all, the company marked the files as confidential information and had a company policy requiring employees to keep such information secret. unfortunately, this may not be enough to prevail on a trade secret claim.

effective action to combat this threat includes the use of a full array of legal weapons. Copyright pro-tection, however, is often overlooked in the battle to defend corporate secrets. This oversight is a mistake, given the advantages under copyright law for challeng-ing information theft.

Proving the existence of a trade secret involves more than merely showing that work was designated as confidential. A party claiming a trade secret must show that the claimed work has value because it is a secret and that the claimant has taken reasonable efforts to maintain the work as a secret. Confidentiality designa-tions alone are not necessarily sufficient. An example of the diffi-culty of proving trade secret rights is presented in the illinois case of liebert v. mazur, in which the plaintiff was unable to protect its customer list. The dispute involved a former salesman for a heat-ing and cooling equipment distributor who copied customer files from the company’s computer system before leaving to work for a competitor. The court concluded that the list was sufficiently secret and had economic value to satisfy part of the test for being a trade secret. But the plaintiff failed to show that it took reasonable steps

to maintain the work as a secret. instead, it appeared that employ-ees and others had copies of the list without specific restrictions on its distribution. The owner of a trade secret must take affirmative action to protect a trade secret’s confidentiality. it is important that employees who have access to a trade secret take steps to prevent its unauthorized disclosure, whether on the internet, by word of mouth or otherwise. All proprietary materials should be marked as such, denoting that they should be kept confidential and are con-sidered proprietary. Access to the trade secret should be limited to

those individuals with a need-to-know. Procedures for maintaining confidentiality should be implemented and enforced. if disclosure to employees and third-par-ties is necessary, those who are granted access to trade secrets should sign nondisclosure and confidentiality agreements. These issues relating to a trade secret are fact intensive and can be difficult and expensive to prove at trial. A copyright claim, in contrast, is much easier to establish as it is based on objective facts. To prevail on the copyright claim, a company would merely need to show that it owns a valid copyright, that there was access to the original and that the allegedly infringing work is identical or substantially similar to

protectable elements in the original. in our experience, the test for creating a work protected by copyright — original, tangible expres-sion — is easily met by confidential business records. Similarly, the test for infringement is easily met when an employee directly copies files protected by copyright. if you are required to go to court to prove your claim, it will generally be much quicker and cheaper to prove a copyright case.—This article was first published in CIO Insight. For more stories please

visit www.cioinsight.com.

Legal Weapons to Fight Info TheftCompanies should use trade secret and copyright law to maximise their ability to protect confidential information By Mark V.B. Partridge

124%was the surge in

sales of windows

phones in q4 2012

Page 45: The Finger-friendly Apps

Ca d e n Ce c to f cu s tom s e r i e s

41 07 March 2013 cto forumThe Chief

TeChnologyoffiCer forum

Future-Proof

TE Connectivity’s superior cabling solutions helped Cadence not only make their datacenter expansion meet design specification at the right cost but also reduced its carbon footprint

Cadence's IT team, which provides sup-port to the San Jose-based company's offices worldwide, selected TE Connectiv-ity’s structured cabling solutions: Among other operational efficiencies, Cadence was looking for, speed and quality of installa-tion, port density, easy MACs (move, add, changes), superior cable management with optimum floor space utilisation.

Together with TE Connectivity Regional Manager, Neerav Kumar, Cadence designed a LAN on Distributed Network Architecture (DNA) that facilitated easy management. Fiber backbone redundancy was maintained to each hub room from the datacenter and between the hub rooms using MPO fiber optic cabling solution. The datacenter, however, used the Centralised Network Architecture (CNA) topology with the zone cabling approach to address the increasing operational costs of network administration. This would also help ease future migrations to high-speed LANs.

Managing DensityAnother challenge was density limitation that has a severe effect on the scalabil-ity and cost of the overall infrastructure design. This complex issue in design specification was addressed through TE Connectivity’s Hi-D cable management platform that increased port density by 50 percent and allowed all 720 ports to be correctly managed within a 42u cabinet, thereby reducing the real estate footprint of the telecom room and resulting in huge cost savings as well. This was further augmented with modular plug-and-go solutions on copper (MRJ-21 solution) and fiber (MPO solution) media, which was faster to deploy and easier to maintain and use. These factories pre-terminated and tested products brought in high density and speed, reliability and scalability to the Cadence datacentre.

Says Ashwin Rao, IT Group Director of Cadence, “With TE Connectivity’s state–of-the-art modular plug-and-go solutions for copper and fiber connectivity and Hi-D connect system in the datacenter facility; Cadence is able to use space optimally with reduced cable load. We are also able to plan better cooling in our datacenter with reduced power consumption.”

“The, award-winning datacenter has PUE, or power-usage effectiveness, a measure of efficiency, of 1.23,” Rao says. This means 81 percent of all the power fed to the datacenter is used by the servers.

The solutions used in the facility accrue multiple benefits for Cadence in the short and long run: the solution on pre-terminated plug-and-go MPO fiber system is ready to take on the constant growth of processor power inside the server farms as well as the demand for faster com-munication throughout the premises. The network is ready for future bandwidth-hungry applications at today’s cost with flexibility, scalability and reliability that is warranted for the next 25 years.

When the semicon-ductor design firm Cadence Design Systems was look-ing to expand their

operations to accommodate a new, larger development center, it needed to simplify its datacentre topology to cut costs and create a network infra-structure that was secure, easy to manage, always available, and capable of adjusting to unpredictable workloads and changing business needs. The construction and setup of state-of-the-art 4000 sq ft datacenter at Noida has consolidated all servers that were earlier kept at 11 small computer rooms scattered over three buildings.

The expansion meant building a future-proof, high-speed network. An essential part of the requirement was infrastructure cabling that would sup-port bandwidth-hungry, highly available, and scalable network devices.

BROUGHT TO YOU BY

DatacentresSolutions for

Page 46: The Finger-friendly Apps

42 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

N o H o LDS BArr E D A l b e r t Ku o

In a conversation with Atanu Kumar Das, Albert Kuo, GM and VP, Field Operations, Blue Coat, Asia Pacific, discusses the numerous security threats confronting enterprises in India and Asia Pacific

DoSSier

Company:Blue Coat Systems

EstablishEd:

1996

hEadquartErs:

California, US

produCts:

Proxy SG, MACH5,

K9 Web Proxy,

PacketShaper,

CacheFlow

EmployEEs:

1,250+

Addressing modern security issues

Page 47: The Finger-friendly Apps

43 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

A l b e r t Ku o N o H o LDS BArr E D

What are the key security threats that Indian enterprises are facing

today? How is Bluecoat helping them in tackling these threats?Today, enterprise customers are at a risk when it comes to network security. Cyber criminals are always on the prowl. it is, therefore, imperative for oragnisations to ensure that they deploy security solutions to keep their infrastructure safe. Some of the key threats confronting enterprises are phishing, advanced persistent threats (APTs) and malware.

We, at Bluecoat, believe that enterprise security should be held upfront, and towards this end we have developed several innovative solutions. The most important thing for the enterprises is to realise the difference between normal and abnormal behaviour when they go to the web. it is also integral that they deploy filtering technol-ogy as the first layer to detect malware at an early stage.

How should Indian and Asian organisations gear up to tackle

the modern security threats in a cloud environment?enterprises in india and Asia alike are star-ing at numerous threats. The first step in the fight against such threats is to be proac-tive and deploy the best of breed security solutions. This will help protect critical data and infrastructure.

The Blue Coat cloud service is a flexible security-as-a-service (SAAS) offering that leverages the same protection and policy infrastructure deployed by the largest com-panies around the world and extends the corporate security perimeter to all devices in any location.

The cloud service can be seamlessly deployed within an existing security infra-structure and can scale on-demand to sup-port new user requirements.

As an enterprise-grade offering with a fully meshed global network, the cloud service delivers a 99.999 percent SlA guar-antee. Customers can seamlessly direct all traffic to the cloud service through a variety of deployment and connection methods, including iPSec VPn, proxy chaining, explicit proxy and client agent, to ensure consistent protection and control for all devices, regardless of location.

How is Blue Coat helping CIOs in securing their enterprise network?

one of the most important thing is to begin early. This allows the organisation enough time to conclude whether or not it has deployed the right security solution. At Blue Coat, we leverage on our core strength, which lies in addressing vulnerabilities in the web platform.

We help enterprise technology decision makers Cios by making them aware of the need to implement a fool-proof solu-tion that can protect the various enterprise applications.

Today, consumerisation of iT is a big issue in enterprises, and Cios are doing their best to address it. At Blue Coat, we regularly develop security solutions for bet-ter protection of enterprises. With Bring your own Device (ByoD) proliferating in

this region, unfortunately there has been a matched increase in the risk factors. our strategy is to develop innovative securi-ty products which Cios are yearning for. We are working towards developing solutions that can take care of all the security needs for the enterprises.

Blue Coat Ceo has publicly stated our unchanged strategy across two highly strong markets —web security and WAn optimisa-tion. We will continue to focus on these two areas in the Asia Pacific market in the com-ing months.

founded in 1996, Blue Coat provides products to more than 15,000 customers worldwide, including 88 percent of the for-tune global 500 companies.

There are CIOs who believe that offence is the best defence. What

are your thoughts on the issue?Should citizens attack criminals before the criminals get a chance to attack them? Should we arm our citizens with guns and weapons so they can shoot the criminals? it is probably not a good idea. The same is true in cyber security.

first, so many websites get spooked, there are so many botnets but there are very few companies that carry out a counterattack. Second, doing so is illegal and it is always good to follow the law.

But you are not wrong in one sense – we need a better capability to anticipate an attack to better recognise it.

So we need to share information such that if ‘A’ gets attacked and is able to see the attack we can use his experience to save ‘B’. The best defence is the thorough under-standing of the attack methodologies and information sharing for getting the ability to see the attacks.

ByoD has brought about a lot of change in enterprise working experience. We all know that ByoD has increased productiv-ity quite a bit but there are also numerous concern areas.

Some of the concerns identified by Blue Coat are ByoD device oS updates and upgrades; app downloads; photo and video uploads and downloads; ByoD backup to cloud storage or a company-issued laptop or desktop; watching recreational video on youTube; facetime and Skype video/audio conferencing; and guest wireless.

“We, at Bluecoat, believe that

enterprise security should be held

upfront, and towards this end

we have developed several innovative

solutions”

enterprises, it has opened the gates to secu-rity breaches. on his part, therefore, a Cio needs to provide selective access to enter-prise applications. This was not the case five years ago. The job of the Cio is therefore becoming more challenging. We have been in constant touch with Cios and are offer-ing customised solutions on the cloud so that the security issues can be addressed at different platforms.

What is Blue Coat's strategic vision for the Asia Pacific region in tandem

with the new market shifts?We understand that Asia Pacific is the fast-est growing market for Blue Coat. While there has been a tremendous improvement in security of enterprise applications in

Page 48: The Finger-friendly Apps

NEXTHORIZONS

44 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

illu

st

ra

tio

n b

y m

an

av

sa

ch

de

v

Browsing industry newsletters, i noticed that Automation World had two related stories on new technologies. Both articles indirectly point to an

issue that industry needs to come to terms with quickly if we are ever going make our plant floors secure.

The BYOD Iceberg?let’s start with the Tablets and Smart Phones story. it is about the issue of mobile devices, especially personal mobile devices, showing up on the plant floor. never going to happen you say? i wouldn’t be so sure.

first, a definition. The topic of personal mobile devices is referred to in the corpo-rate iT world as “Bring your own Device” or ByoD. if you haven’t heard of ByoD, Wikipedia defines it as:

Bring your own device (ByoD) is a busi-ness policy of employees bringing person-ally owned mobile devices to their place of work and using those devices to access privileged company resources

A common example is using your per-sonal iPhone to access your company’s email system. And as i will explain later, the iPhone is only the tip of the iceberg. The

IT is changing constantly and we need to work from general principles By Eric ByrEs

iPhones Are Coming to the Plant Floor

Page 49: The Finger-friendly Apps

45 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

mo b i l i t y N E X t H or I Zo N S

whole “Bring your own Device” (ByoD) phenomenon is a major concern through-out the corporate world.

like icebergs, mobile technology has become an unstoppable force of nature. They have invaded the corporate office – is the plant floor the next frontier?

The iceberg is a good metaphor for the onslaught of this technology. When dealing with an iceberg, pushing against it or ignoring it generally aren’t effective options. it is bigger than you are and will go where it wants. The best you can do is to try to manage it.

Bring Your Own Devices to the Plant Floor?most iT departments are beginning to accept the inevitability of ByoD. According to arecent study, the majority of companies surveyed said they are now adapting their iT infrastructure to accommodate employee’s personal devices, rather than restricting employee use of personal devices.

“Dear mom, Today is my first day pro-gramming the filling line.”

What about the plant floor? Will tablets soon be standard equipment in the refinery? or will they be banned from moving outside the corporate office. The first sentence of the Tablets and Smart Phones article says it all: industrial iT teams are likely to rail against the use of mobile devices, but many equipment makers feel they are fighting against the tide to ignore them. Productivity will determine which side will win.

#1 on the Engineer’s Wish List?next read the industrial networking Desires revealed article. you will notice that when engineers are asked to identify their unful-filled industrial networking desires, the num-ber #1 item is: “Connecting to the factory with a smart phone”.

i have discussed in past blogs that in any war between security and productivity, security will lose. The situa-tion is no different here. Smart phones are coming to the plant floor. The only question is “Will we adapt to this new world in a secure way or will it be another source of insecurity”?

What is a Mobile Device Anyway?one option for the mobile device question is to just ban them outright. There are cases when this might be appropriate (explosive environments for example), but generally outright bans rarely work the way people want them to.

one of the reasons is that we have a ten-dency to see technology only in terms of what is available today or what is popular. This results in narrow definitions of a spe-cific technology that lets other technologies slip through. for example, an iPhone is clearly a mobile device, but what about a personal uSB keyboard or mouse that an employee brings in, perhaps for health rea-sons? (if you don’t think that a mouse can be a security issue then see: hackers pierce network with jerry-rigged mouse). Some-times a “mobile device” isn’t even a device at all. Consider a CD that contains a Stuxnet-infected S7 ladder logic file.

or an automated forklift that moves from site to site. At the extreme end, many people know we have been working with Boeing for the past few years – they have large mobiledevices called 787s. What is important to remember is mobile devices can range from a CD with what appears to

be an innocent document file, to the obvious iPhone, right up to entire mobile platforms.

The only way to address this range of evolving “mobile” tech-nology is to use the Zone and Conduit concepts promoted in the iSA/ieC 62443 standards. Properly done, zone and conduit security can result in operational requirements that define a securi-ty process, rather than proscriptive

requirements like “mobile Devices should not be used on the plant floor”. restricting devices seems simple and comforting, but since this is so narrow, restrictive and inflexible, it encourages inventive staff to find ways around the rules so they can do their job.

recently i talked to a customer with a very innovative way to manage Wi-fi-capable mobile devices on his factory floor. instead of banning wireless technologies (something that is hard to enforce if you have a lot of contractors), he actually set installed Wi-fi access points throughout the manufacturing areas.

Then he routed all the access points into a “Captive Portal” – one of those locked down web pages you run into in hotels and airports. This Captive Portal strategy had multiple benefits – first he immediately had a record of who was trying to use Wi-fi in his factory. Second, by forcing all employees and contractors to log in, he could track exactly what they were doing and when. Then, based on each user’s log-in creden-tials, he could restrict network access to specific systems in his factory. for example, a contractor working on the finishing line could be restricted to only seeing the finish-ing line PlCs.

Who Knows What Tomorrow’s Mobile Device Will Look Like?information technologies are changing constantly. Trying to manage them with pro-scriptive rules is a hopeless task, because we can never keep up. instead we need to work from general principles. —This article is printed with prior permission

from infosecisland.com. For more features and

opinions on information security and risk man-

agement, please refer to Infosec Island.

One option for the mobile device question is to just ban them outright. There are cases when this might be appropriate, but generally outright bans rarely work the way people want them to

5.5%will be the

growth of it

spending in

middle east in 2013

Page 50: The Finger-friendly Apps

46 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

N E X t H or I Zo N S m a n ag e m e n t

Technology 2013: The Script UnfoldsThe market indicators highlight the need for solutions-oriented approach By NarayaNa mENoN

Most technology has the shelf life of a banana.” Scott McNealy. We have always been at a cross road in terms of technology. The advent of almost anything as a service provides another dimen-sion in terms of choices in deploying iT. Amidst

all these, as iT has matured as a critical business enabler, iT leaders in organisations shoulder responsibilities of positively contribut-ing to the organisational growth through optimal Capex/opex and roi, innovative resource deployment and utilization, tighter process controls and reporting mechanisms. iT heads act as headlights by providing actionable business intelligence and analytics.

in this context lies the need to cope with exponential data growth, particularly in the semi-structured and unstructured realm. A planned data management strat-egy includes effective Disaster recovery (Dr) manage-ment (considering the criticality of business continuity from a financial, regulatory and reputation perspective at a time of increased outages owing to both man-made as well as natural disasters). Strategic big data, mobility/ByoD solutions, cloud computing (personal and hybrid clouds), XaaS (anything/everything as a service), mobile and smart device applications for the enterprise, effec-tively harnessing the power of social media and compre-hensive, actionable Bi & BA are now key and immediate tech priori-ties, while integrated ecosystems, enterprise app stores, in-memory computing and internet of things and appliance models would be viewed more strategically over the next five years.

Emerging technologiesA recent gartner survey indicated that 48 percent of enterprises

surveyed expect to invest in a private cloud owned and maintained by themselves on premises in 2013. on similar lines, 68 percent of the respondents indicated that they would invest in private cloud but would have a service provider maintain it for them in-house. A modest 36 percent of the respondents indicated that they will invest in public cloud computing within the next year. A spurt in cloud deployments will follow as technology and standards evolve.most indian enterprises seem to have implemented the first phase of their virtualisation strategy and are now looking to take it to the next level to facilitate business agility and efficiency along with cost sav-

ing. it is also interesting to see a growing base of SmB customers deploying virtualisation in various forms purely from a cost reduction perspective.The indian iT services market is forecast to reach $10.2 billion in 2013, which is a 12 percent increase over the previous year as per various industry analysts, indicating a clear growth expected within the XaaS/hosted services purview. TCo, flexibility and SlA based pay-as-you-go pricing models contribute to these technologies being looked at more favourably – also indicative of the thinning gap between XaaS and the cloud models to form a more inclusive model of service delivery.

Growing Indian Marketgartner has recently raised its estimates for global information tech-nology spending this year to $3.7 trillion, representing a 4.2 percent growth over 2012. They also estimate that iT spending in india is projected to total $71.5 billion in 2013, of which enterprise iT spend-ing is estimated at $42.5 billion.

it is also interesting to note that according to ABi research, the

25% of enterprises

will have app

stores by the

year 2017

Page 51: The Finger-friendly Apps

47 07 march 2013 cto forumThe Chief

TeChnologyoffiCer forum

m a n ag e m e n t N E X t H or I Zo N S

global business continuity and data disaster recovery market will exceed $39 billion by 2015. Disaster recovery has a high potential in india. respondents to the forrester Q2 2010 iT budget survey rated BC/Dr as the number one priority for small and medium busi-nesses and the second highest priority for enterprises.

Where are enterprises investing?The industry predicts near double digit growth on spending around services, software and hardware (to include client devices). We see a clear indication of services led models being the flavour of the hour and this is where i feel most investments would be closely followed by the others. Products, processes and people form the corner stones on which successful organisations and consequently industries are built on. i would divide this in to twoviewpoints – the vendor perspective and the consumer perspective: from a vendor perspective, innovative products that offer flex-ibility and can easily integrate into complex existing environments would be the need of the hour. While providing superior standards and business edge, the technology needs also to have a clear road map in terms of adapting to the physical, virtual and cloud environments and catering to interoperability with incumbent technologies, at the same time allowing access via a variety of both old school and new age devices. Vendors will primarily invest in process clarity, in skilling human resource and in growing distri-bution networks to reach end customers.

from an end-customer perspective, choosing the right technolo-gies to suit their business objectives and deploying best fit models of iT (cloud, XaaS, hosted etc) to facilitate the same along with data management and business continuity would be of prime importance. in terms of process – with multiple technologies coexisting in a typical iT environment, it is important to integrate and set an SlA driven model with clear metrics.

SMBs: No longer behindAccording to advisory firm Zinnov, as against about 5,000 large enterprises there are over 10 million SmBs ready to consume iT. This represents a tremendous market potential. in my view, SmBs in india are uniquely placed as they have a wide choice with respect to the iT path they can embark on. They could choose to jump straight in to a XaaS model with minimal in-house investment, sav-ing infrastructure, space, power and cooling requirements to name a few. free of operational hassles in setting up and running their iT, SmBs are able to look at it with a more strategic approach to tie-in with their growth and business ambitions. As mentioned earlier, business continuity is emerging as a key focus area for SmBs and based on the business impact analysis they can opt for the most appropriate Dr option. for instance, Sanovi Cloud Drm offering is the specific product offering that enables service providers to offer Dr as a service. Sanovi’s cloud product enables service providers to scale and deploy Dr offerings at the service level and values that are attractive to SmB customers for its subscription-based fee and asso-ciated SlA. Apart from business critical applications, data manage-ment, business continuity and appropriate analytics, SmBs would embrace XaaS in conjunction with or as a prelude to the Cloud, mobility and ByoD solutions with fervour in the months to come.

Opportunity for the ChannelsSolutions integrators and resellers are looking at Sanovi to provide the key differentiator for customers’ comprehensive Dr strategy with Dr management as the fulcrum. At Sanovi, partners are our growth engine, an integral part of our business strategy. Today, 90 percent of our business is with and through our channel partners. True to our emphasis on partners, we have built an exten-sive channel network spanning across india, as well as parts of the Asia-Pac and middle east regions. We at Sanovi, enable our partners to identify and fulfil new opportunities, creating a win-win situation for all involved.

The market indicators clearly highlight the need for solutions oriented approach with a services led option (XaaS) to choose from. Partners should re-orient themselves to go to market as enablers of technology solutions rather than mere facilitators. Channels need to invest in developing service and solutioning capabilities around a combination of key pull and some strategic push technologies in the market as these in turn will work out to be profitable growth and revenue models for them.

“Gartner has raised its estimates for IT spending to $3.7 trillion, representing a 4.2 percent growth over 2012”— Narayana Menon, Lead-Marketing, APAC & Middle East, Sanovi Technologies

Page 52: The Finger-friendly Apps

VIEWPOINT

48 07 march 2013 cto forum The Chief

TeChnologyoffiCer forum

twenty five years ago netapp became the modern day bellwether of this metric — they acquired real paying customers at a clip heretofore unheard of. for the last 20+ years they maintained that bar.

not anymore. yesterday nimble announced they reached 1000 cus-tomers in only 2.5 years. not free software downloading customers - paying SySTemS customers.

That is an astounding rate of suc-cess. There are others. Actifio has hundreds of customers in two years of gA. There are a bunch on the horizon that will break soon - legi-ble, nutanix, Whiptail, Data robotics (50,000+ units shipped or something crazy like that), etc., just to name a few. five years ago it was unthink-able. A company simply couldn’t acquire a thousand real customers if it was in the systems business (where stuff costs a lot, and requires a real commitment from a customer to install, learn, and use a product) no matter what size VC investment it had.Why? Because the big guys controlled the market - and the infor-mation flow. god bless the internet

brilliant enough to claim a market have had the almost anointed right to maintain that status forever (even if their stuff sucks). no more.

This wave has just begun. not only will the biggest have to contend with the other big guys to fight over share loss - they will soon have to pay very serious attention to “those on the cusp of global legitimacy” - who actually may end up a bigger threat to market supremacy than the tradi-tional major players.

if getting to 1000 customers in just 2.5 years is the STArTing point, what happens in a few more years? remember when the uS only wor-ried about one big threat? The rus-sians!!! Protect against them and we’ll be safe! Throw that out the win-dow. now we have to protect against little packs of unrelated (seemingly) random threats/psychos. A whole different ball game.

This is kind of the business equiva-lent. not that the little guys are ter-rorists, mind you - but they intend to steal the the money the market gives the big guys. metaphorically it’s the same principle.

and the social aspects of knowledge dissemination.

The barriers to “smart” are no lon-ger controlled by big brother (except in China, of course) - so a little guy with a better mousetrap can bring their story to the masses - and if that story resonates with a real life issue, customers will find you.

it’s awesome to watch. i think people take it for granted but they shouldn’t - it’s as big a sea change business/market wise as anything to hit the systems business in, well, for-ever. it forces the big guys to compete at a pace and level they have not had to deal with since they were the little guys. And they don’t like it much. Why would they care about little Actifio stealing 250 customers when they have 250,000? Because an epi-demic starts with 2. And their ability to contain and control as they could in the not too distant past is gone. So now not only is it near impossible to become a big giant company that becomes the market leader in a big giant market - it’s become just as hard to hold on to that position. for 50 years those who have been lucky/

The New Measuring Stick Time To

Legitimacy ima

ge

by

xx

xx

xx

About the Author: Steve Duplessie

is the Founder of

and Senior Analyst

at the Enterprise

Strategy Group.

Recognised

worldwide as

the leading

independent

authority on

enterprise storage,

Steve has also

consistently been

ranked as one of

the most influential

IT analysts. You

can track Steve’s

blog at http://www.

thebiggertruth.com

Steve DupleSSie | [email protected]

Page 53: The Finger-friendly Apps

WHEN YOU RUN THE NUMBERS, DUBAI MEANS BUSINESS.

[email protected]

SEE THE FILM AT VISION.AE/VIDEOS/NUMBERS

EXPO2020DUBAI.AE

MILLION* PEOPLE VISITED DUBAI WORLD TRADE CENTRE LAST YEAR

SQUARE METRES OF EXHIBITION SPACE IN ONE BLUE-CHIP VENUE

PER CENT OF THE REGION’S SHOWS HAPPEN IN THE UAE. WELCOME TO THE WORLD’S EVENTS HUB

1.65100,00050

*Source: DWTC, 2011 figures latest available.

FalconDubaiEvents_CTOForum_290x220_AW.indd 1 12/02/2013 22:17

Page 54: The Finger-friendly Apps