Search This Blog

Thursday, 19 February 2015

Migrating Enterprise Apps to AWS? Standardize your software estate

More and more CIOs and enterprise IT managers are under pressure to get some portions of their IT landscape onto public clouds, notably AWS. Typically, the first step in their journey is an assessment of the existing app landscape, and to segment and classify apps that are feasible for cloud migration. The actual migration may be simple lift and shift, a minor re factor, or a complete re architecture, depending upon the application technology and the benefits of moving it to cloud. These approaches are becoming common, with lots of cloud migration vendors and professionals adopting it. However, the migration itself offers an opportunity for the IT to streamline and standardize their application landscape. Aspects of driving standardization, base lining criticality, redefining development/QA usage and revisiting security guidelines are worth considering prior to migration of the application landscape, as it will ensure that the cloud move is robust, stays relevant and delivers the expected benefits. These aspects are over and above the business, technical and operational related facets that IT professionals consider while assessing cloud migration feasibility.
One such aspect is standardization of the software estate. Large enterprises often have offices in many geos, with IT resources being provisioned and managed by local IT teams or local datacenter providers. This tends to cause a sprawl in the software estate, with different versions of operating systems, databases & middleware being used. This is normally dictated by the applications run (typically supported by local vendors), vendors selected (both of infrastructure as well as support) and the preference of application teams to refresh to the latest versions.
While migrating such scores of applications to cloud, it is worthwhile to take stock, define and restrict the versions to a minimum, especially when moving to AWS. One approach is to define a recommended software stack version and a minimum software stack version. The idea is to push application teams to conform to the recommended software stack version, and give an exception to fall back to a minimum software stack version.
For example, a recommended software stack version can be Windows 2012 with SQL 2012, while the fall back version may be Windows 2008 with SQL 2008. The advantage here is that AWS offers all these versions at the same cost. Hence it encourages application teams to look at application upgrades and refreshes, without worrying about the base software upgrade costs. And it makes it easier for the enterprise IT to ensure upgrades and security patches are completed on time with the ongoing support for the current versions.
The standardization exercise is best done after analyzing a significant part if not the entire estate. This is to ensure that the standardized estate is small and manageable, and does not have many variations that will make manageability difficult. The standardization should be done with an aim to publish a catalog of software’s to the various application teams that they can use for existing and newer applications. This is an important step for Enterprise IT towards delivering IT as a Service.

Wednesday, 11 February 2015

Mobility: Smarter, Faster and Closer, and Safer

Smart devices are increasingly becoming indispensible, especially in the enterprise environment. According to a recent report by Gartner, mobile applications are fast overtaking enterprise applications, so a largely mobile workforce with grey areas between professional and personal workspace, is the biggest reason to have a mobile strategy in place, for every company.
A clearly defined strategy for mobility not only lays down the round rules but also leverages the advantages of mobile technologies to create an inclusive work culture for the enterprise. The next step is BYOD which grants employees freedom to work on their personal devices allowing the freedom of flexibility, increased collaboration and productivity and a better work life balance to them. Enterprise IT needs to encourage the productivity advantage that mobility assures, without being restrictive, while having the policies to monitor and control in place.
Most enterprises have policies and strategies to deal with the risks that BYOD brings. The current trends in technologies and tools ensure an increasingly higher level of support to leverage the advantages of mobility while fighting the risks it entails:
  • While in most organisations MDM tools, endpoint security and device management are used to ensure a secured environment for BYOD, their inconsistent implementation across disparate mobile platforms may create breach- able loopholes. This is one trend that enterprises need to collaborate with users as well as business managers to create strategies that neither restrict nor negate freedom, but ensure data security.
  • Most enterprises deploy WLANS that are utilised for both enterprise and personal devices, and these may already be overburdened with bandwidth or performance issues. Adding personal devices to them can only lead to more congestion, hence inefficiencies, if no extra network capacity or bandwidth is added.
  • Access management is highlighted in terms of relevance of resources that are authenticated a users. An adaptive access control that adds contextual information like location to the user identity is increasingly being used for identity assurance and reducing ID risk. But this has some inherent risks of privacy as well.
  • Isolating corporate applications on a personal device is one way of creating boundaries, or what is referred to as secure workspaces. So while essential business applications like email is allowed, access to more critical corporate data is not.
  • Mobile devices security is the next focus, and CISOs need to define stronger strategies on application configuration and mobile testing. New technologies like applications sandboxing and digital signing are on the anvil, while contextual identification may create the much needed walls to user access.
It is inevitable that mobile technologies will become the centre stay of enterprise over time. Devices are only growing and as Gartner predicts, through 2014, more focus will be given to developing better UI than enterprise applications. This trend cannot be reversed so enterprises need to keep up with technologies that will make this new disruption advantageous for everyone, the users as well as the enterprises.

The Internet of Things – Is this the Sci- Fi we saw a decade ago?

A phenomenon that is predicted to fuel an industry worth $8.9 trillion by end of the decade, a whopping 212 billion connections, pegged to change the future of how most enterprises function—the Internet of Things (IoT)—is here to change the world.
In a world of heterogeneous entities seamlessly and securely integrated with each other and the internet, nothing will be impossible. Driven by M2M communication, wireless sensor, and actuator networks (WSAN), ubiquitous computing, and web-of-things (WoT), IoT will offer many advantages in terms of technologies and functionalities in an enterprise context. It will facilitate a number of technologies – simplifying environment sensing, proximity triggering, automated sensing and actuation to name a few. This will lead to higher adoption and easier utilization of applications. So there will be a much better track rate for automated home appliances, smart grids and high-resolution asset and product management apps.
M2M applications will drive business that will generate approximately 714 billion Euros by the end of 2020. Industry experts see IoT facilitating a double digit growth in some verticals – consumer electronics, automotive, and healthcare, as well as assuring a much faster adoption of intelligent buildings and utilities in the consumer market. Of course, this rapid adoption will depend on the connectivity requirements of all applications, affecting the feasibility of some technologies.
Despite the unlimited opportunities it presents, IoT faces certain limitations, the biggest being the risk of incompatibility between applications, legacy or otherwise. Components by disparate vendors are rarely compatible, and the need of the hour is to have interoperability standards so that these entities can work with each other.
As IoT gains ground, there will emerge a whole range of business ecosystems, comprising organizations which will compete and complement each other through their offerings in hardware, software, platforms, standards & connectivity. There will be needed a whole range of services focused on provisioning, assurance, and billing of the application services, in the new business environment.
The emergence of Internet of Things is expected to create new service lines by IoT application vendors and services providers, platform providers and integrators, or technology system integrators. The growth of the IoT market will hence be dependent on common platforms, standards and interfaces which match the requirement of specific domains.
The number of connected devices in use is expected to grow almost threefold by the end of this decade – from 9 billion in 2011 to 24 billion in 2020. In these, the fastest growing segment is M2M devices, growing form 2 billion to 12 billion in the same period, and the vertical that has zoomed ahead due to this growth is the automotive sector, followed by digital homes and healthcare. Some examples are in-vehicle infotainment, eCall, parking meters, information sharing about road conditions and traffic density, toll collection, taxation, pay as you drive (PAYD) car insurance, digital consumer electronics, home automation with Smart Home solutions, automated meter reading (AMR), residential security and of course, monitoring solutions to support wellness, prevention, diagnostics or treatment services.
There is huge potential for Technology support organizations to play important roles in the mainstream acceptance of IoT when. mature business models and market players emerge.

Monday, 2 February 2015

My two cents on mobilizing the enterprise


As we all know Mobile computing is transforming the way people interact with each other. It is no surprise mobility is transforming the way we live and work. It is also transforming the enterprise work environment. Employees have started using smart phones and tablets for personal as well as official use. As per research reports over 80% of employees see improved productivity with mobility and 72% employees demand personal device enablement for work.
With this mobility no longer remains an option but has become a necessity for organizations to enable their environment by investing heavily on employee mobility. So organizations require the right strategy and solution to mobile enable their environment based on their business requirement to facilitate remote and mobile productivity, without compromising on security and personal privacy concerns.
Organizations need to fully understand and utilize the benefits of mobility to innovate, increase employee efficiency & satisfaction without falling prey to threats like data security loss, privacy encroachment, policy mismatch etc.
Enterprise IT needs a solution to simplify device management, applications, users’ content & policy management for every device and OS type entering and exiting its premises.
According to a global survey 53% of employees bring personal devices to work. Around 90% of them connect to corporate networks through mobile devices. It is very important to draw lines between personal and official space, manage user profiles, secure shared resources and at the same time enhance user experience. So a comprehensive device management solution will enable the employee workforce to be more productive and without obfuscating user experience.
IT organizations will dedicate at least 25 percent of their software budget to mobile application development, deployment, and management by 2017. The number of enterprise applications optimized for mobility will quadruple by 2016, driven both by competitive necessity and rapidly evolving technologies that support faster and more secure enterprise applications.
Enterprises have to ensure that data is accessible to mobile employees without worrying about data being lost or stolen by accident or intent. It must be protected against all forms of security breaches. Estimated $400 Million being lost in US annually due to poor data protection practices. Data cannot be recovered when devices are lost (11.9M out of 70M devices).
Enterprises are also looking to ensure quality of service and quality of experience for business critical mobile apps. These are required to protect revenue, end-user productivity and customer satisfaction.
Thus, an adaptable, end-to-end mobility strategy and solution helps enterprises achieve a significant uplift in workforce productivity and collaboration, along with enhanced operational agility.