Date post: | 23-Mar-2016 |
Category: |
Documents |
Upload: | manan-mushtaq |
View: | 227 times |
Download: | 3 times |
BIZGROWTHIGNITESIT8 Trends that will drive
enterprise investments Pg 14
REVIEW: RHEL 6 handles virtual workloads seamlessly
INSIGHT: Dell Streak updated with Android 2.2
INTERVIEW: Didier Jaubert on cloud
offerings from OBS
BOSS TALKHonesty pays dividends Pg 04
38 22 34
IT N
EX
T
BIZ
GR
OW
TH
IGN
ITE
S IT
V
OLU
ME
02 | IS
SU
E 0
1
FEBRUARY 2011 / ` 75VOLUME 02 / ISSUE 01
EDITORIAL
1F E B R U A R Y 2 0 1 1 | ITNEXT
In January 2010 we launched IT Next with a cover story titled, “Are you the Next CIO?” The premise was simple. Provide insights and advice that could help IT managers prepare to take on the mantle of a CIO. Even while we received accolades from the community, there were many who felt that that we had set the bar too low. Why CIO, not a CEO? It was a view that intrigued us—and led to considerable introspection.
Before we come to that let’s examine why is it hard to be a CEO? To answer this question, we need to look at what a CEO does. As the captain of an enterprise a CEO is responsible for all functions, be it finance, administration, production or marketing. Even if he is not a decision-maker in everything, he needs to be privy to all significant decisions that are made in the organisation. Since the buck stops at his desk, the CEO needs to know all that happens—inside and outside the organisation. Who else in the organisation has this around visibility? The CIO, but of course. He is the only C-Suite besides the CEO, whose job is to keep a tab on everyone’s job. This is one reason why CEOs are coming to increasingly rely on the views and insights from the CIO, especially when big decisions have to be made.
Little wonder then, CIOs are best suited to assume the CEO role and there are scores of examples of the same. In fact, as a result of the changing business environment, CIOs are becoming less of technocrats and more business oriented, who talk and breathe spreadsheets. This trend is expected to increase as CIOs transition from a support and advisory function to manage greater operational responsibilities.
If expectations from a CIO are changing, then those in line to assume this responsibility need to be prepared. They need to be able to talk business—and handle technology. That is one reason why this issue of the magazine features important business trends that are likely to shape the future. The Next Generation CIO needs to be ready to don the role of the Next CEO as well. And at IT Next we are committed to help and support you through this journey—through print, online and face-to-face interactions.
“The Next Generation CIO needs to be ready to don the role of the Next CEO as well.”
Why not a CEO?
S H A S H W AT D C
Blogs To Watch!Emotionally Intelligent Signage:http://www.danpink.com/
Execupundithttp://www.execupundit.com/
Three Star Leadership Bloghttp://blog.threestarleadership.com/
Leading Answershttp://leadinganswers.typepad.com/leading_answers
Your views and opinion matter to us. Send your feedback on stories and the magazine at [email protected] or SMS us at 567678 (type ITNEXT<space>your feedback)
2 ITNEXT | J A N U A R Y 2 0 1 1
CO
VE
R D
ES
IG
N: A
NI
L T
CONTENTFEBRUARY 2011
14Page
FOR THE L ATEST TECHNOLOGY UPDATES GO TO ITNEXT.IN
INSIGHTS
22 Dell Streak This 5-inch tablet has been updated with Android 2.2.
24 Information Management Sophisticated pan-enterprise search is a smart approach for ef-fective information management and compliance
26 The Managed Services RouteBe vigilant and careful while dealing with your MSP
30 Socializing in the EnterpriseWhat’s the best way to use collaboration tools?
26Page
04 I always teach my col-leagues to be honest | Sudhir Arya, Senior Vice President Corporate (IT), Amtek Group
BOSS TALK
34 We are in negotiation with a top IT partner for the French and international markets for collaborative applications | Didier Jaubert, VP-Global Services, Orange Business Services
INTERVIEW
Facebook:http ://www.facebook.com/home.php#/group.php?gid=195675030582
Twitter :http : //twitter.com/itnext
LinkedInhttp://www.l inkedin .com/groups?gid=2261770&trk=myg_ugrp_ovr
BIZGROWTHIGNITESIT8 Trends that will drive
enterprise investments
Content Page.indd 2 2/2/2011 8:11:26 PM
3J A N U A R Y 2 0 1 1 | ITNEXT
OPINION13 Privileged Information | by Dhananjay Rokde, Practice
Head–Information Security,
Arcon–Risk Control
15-MINUTE MANAGER41 Cyber Law and Order | A thorough knowledge of cyber laws is essential for IT managers responsible for safeguarding enterprise assets
45 7 Steps to Outsourcing | Here are suggestions to help make certain that your next outsourcing project is succesful
46 Training Calender | Career booster courses for you
OFF THE SHELF50 Trendnet Launches Mobile 3G Router | A sneak
preview of enterprise products, solutions and services
CUBE CHAT48 Karma and Creativity| “Doing innovative things and being the best in everything keeps me motivated” - Jatinder Aggarwal, Project Manager, HCL
38Page
ITNEXT.IN
REGULARSEditorial _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 01
Industry update _ _ _ _ _ _ _ _ _ _ 08
Tech indulge _ _ _ _ _ _ _ _ _ _ _ _ _58
Open debate _ _ _ _ _ _ _ _ _ _ _ _ _59
My log _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 60
PLEASE RECYCLE
THIS MAGAZINE
AND REMOVE INSERTS BEFORE
RECYCLING
MANAGEMENTManaging Director: Dr Pramath Raj SinhaPrinter & Publisher: Vikas Gupta
EDITORIALGroup Editor: R GiridharAssociate Editor: Shashwat DCSr Correspondent: Jatinder Singh
DESIGNSr Creative Director: Jayan K NarayananArt Director: Binesh SreedharanAssociate Art Director: Anil VKSr Visualiser: PC AnoopSr Designers: Prasanth TR, Anil T, Joffy Jose & Anoop VermaDesigners: Sristi Maurya & Charu DwivediChief Photographer: Subhojit PaulPhotographer: Jiten Gandhi
SALES & MARKETINGVP Sales & Marketing: Naveen Chand Singh (09971794688)Brand Manager: Siddhant Raizada (09990388390)National Manager-Events & Special Projects: Mahantesh Godi (09880436623)National Manager -Print , Online & Events: Sachin Mhashilkar (09920348755)South: B N Raghavendra (09845381683))North: Deepak Sharma (09811791110)West: Hafeez Shaikh (09833103611)Assistant Brand Manager: Swati Sharma Ad co-ordination/Scheduling: Kishan Singh
PRODUCTION & LOGISTICSSr. GM Operations: Shivshankar M HiremathProduction Executive: Vilas MhatreLogistics: MP Singh, Mohamed Ansari,Shashi Shekhar Singh
OFFICE ADDRESSNine Dot Nine Mediaworx Pvt LtdA-262 Defence Colony,New Delhi-110024, India
Certain content in this publication is copyright Ziff Davis Enterprise Inc, and has been reprinted under license. eWEEK, Baseline and CIO Insight are registered trademarks of Ziff Davis Enterprise Holdings, Inc.
Published, Printed and Owned by Nine Dot Nine Mediaworx Private Ltd. Published and printed on their behalf by Vikas Gupta. Published at A-262 Defence Colony, New Delhi-110024, India. Printed at Silver Point Press Pvt Ltd, D-107, TTC Industrial Area, Shirvane, Nerul, Navi Mumbai 400706.Editor: Vikas Gupta
© A
ll rig
hts r
eser
ved:
Repr
oduc
tion i
n who
le or
in pa
rt w
ithou
t writ
ten
perm
ission
from
Nin
e Dot
Nin
e med
iawor
x Pvt
Ltd i
s pro
hibit
ed.
This index is provided as an additional service.The publisher does not assume any liabilities for errors or omissions.
ADVERTISER INDEX
Netmagic IFC
Airtel 2,3&29
Digilink 05
Red Hat 08,09 IBM (Insert) 24
PTC 59
Sigmabyte IBC
Tata communications BC
41Page
RHEL 6 HANDLES VIRTUAL
WORKLOADSThe latest Linux-based OS offers a strong foundation for hosting virtual workloads,
complete with distinctive capabilities
CorrigendumIn the January 2011 issue, it was wrongfully mentioned that Dr. Muthumaran B has been the alumnus of IIT-Kanpur and IIM-Calcutta. The misrepresentation is deeply regretted.
Content Page.indd 3 2/2/2011 8:11:31 PM
4 ITNEXT | F E B R U A R Y 2 0 1 1
“When dealing with vendors, straight-talking is what earns respect ratherthan spinning the wheels”
Today, as I approach the final stages of my professional career, I con-tinue to be inspired by my father’s teachings. He is a freedom fighter and in life has always done more
for others, expecting very little for himself. He has an unshakeable belief that honesty is the best policy. This appear to be totally unrealistic in today’s era. I am not naturally honest myself, but oftentimes I am by chance. I sincerely try to be honest to myself first and then to others as well. Though, I often face criticism for being so straightforward in my approach, it remains my mantra of life.
So, one of the things that often cause me pain are the false claims people make in their resumes—about their achievements, beliefs, etc. Many aspiring candidates, in their quest to grab higher designations and salaries, write about accomplish-ments they actually never achieved. Having sieved through hundreds of such resumes, over a long period of time, I easily can evaluate where some-one really stands. And the moment I question the achievements mentioned in the resume, many are unable to justify their claims.
It even goes beyond aspiring for jobs; Some-one I know took credit for things he never did and received an award based on that, which turned out to be a turning point in his career. I know this for a fact because he took credit for work done by me and my team. A bigger shock came when the editor of the magazine instituting the award never responded when I countered the claims and the award.
Some dossiers that I received for evaluation for Next 100 awards are yet another example. One applicant falsified facts and sadly, I had no choice but to reject his nomination. Then, there is the case of a former member of my team (at a previ-
Honesty Pays
P E O P L E M A N A G E M E N T
ous workplace) who had resigned but he used his old visiting cards for a whole year to claim he still worked there. On two occasions, he met interview-ers known to me, who called me to verify his cre-dentials; to my utter surprise I found that he had also claimed credit for a project that was started after he had resigned.
I always teach my colleagues to be honest when writing their resumes, and while dealing with vendors. One can have momentary glories but they don’t last. You can get temporary satisfaction or advantage by fooling others, but not respect. Using impressive language in a resume is good but leave out the false achievements. Similarly, when dealing with vendors, straight-talking is what earns respect. And finally remember, as Walter Anderson said, “Our lives improve only when we take chances—and the first and most difficult risk we can take is to be honest with ourselves.” So enjoy your career with pride and your head held high, with a proven and factual track record. Wish you all the best!
Sudhir Arya is Senior Vice President Corporate (IT), Amtek Group
SUGGESTED READ
BOSS TALK | SUDHIR ARYA
The book tells you how to mobilise people and accelerate execution speed to implement strategic decisions.
WRITER: JOCELYN R. DAVIS, HENRY M. FRECHETTE AND EDWIN H. BOSWELLPUBLISHER: HARVARD BUSINESS PRESSPRICE: INR 995
1 2 ITNEXT | F E B R U A R Y 2 0 1 1
OPINION
I joined ITC after passing out of IIM–Ahmedabad in 1987. This was when PCs were still 386 machines with Lotus 123, and expensive to boot. I will always
remember J Narayan, one of the most progressive directors at ITC, who in 1987 ordered that every ITC manager should have a PC at his desk. We have clearly come a long way since, into the era of Web 2.0 and cloud computing.
To borrow from football parlance — does IT keep score or does it score goals? In today’s IT-enabled world, the IT function scoring goals all the time. However, the questions around the right IT strategy and appropriate investments continue to be fundamental to most of the companies.
Given that most of you will be in the middle of the budget process, this may be a good time to talk about positioning and approach of IT spends in your oraganisation.
What I believe is central to the problem is a lack of alignment on what the IT strategy should be like. For most of us, understanding the business strategy and dovetailing IT strategy as a key enabler proves to be extremely critical, once we decide on a project. According to me there are two broad buckets of IT strategy — those that impact the operating model and those that define business strategy.
The operating model is the relatively easier part, even though 90 per cent of organisations struggle to get it right. Its impact is seen through enhanced efficiencies and lower costs. For example: A simple payroll outsourcing process does away with internal payroll
are changing every day. And hence, customer feedback forms have given way to data mining social networks on social platforms like Twitter and Facebook to understand what they want to say and do.
The role of IT in being the innovator within the organisation to help the business stay close to the consumer is a whole new ball game. In this space, the IT manager is not someone at HQ designing a system, but is required to work in the trenches, and be a part of the buzz, so that innovative solutions emerge. Getting closer to suppliers is another challenge — where EDI is getting transformed.
The challenges of measuring the cost-benefits of IT can be quite different In the operating model, improvement and productivity-driven IT, the key to selling good IT budgets, is to have great metrics and less chunky investments. The more variable and milestone-driven, the better.
In business strategy, where innovation is required, this is harder to measure. The role entails managing information (being the organisation’s Google) and managing interactions with the outside world (customers for instance). For a retail company, it’s about getting the consumer to spend more at its stores. Data mining customer spends to tailor-make offerings to customers is an example. These applications usually sit on top of the underlying transactional systems in enterprises and therefore are relatively less expensive. These innovations also help maximise revenues — hence IT managers need to work with business managers to help quantify the additional revenues that these innovations bring in.
In a growing complex world, it is extremely imperative to recognise that your IT guy is a business partner, rather than just an employee. I am quite sure that with this mind-set, selling an IT budget to even the most hard-nosed CFO shouldn’t be a problem!
“ In strategy, where innovation is required, metrics are harder to measure. What is required is a balancing interactions with both inside and outside world”
Justify IT or Business of IT
teams, brings in best practices and lowers costs through an outsourcer. Cloud computing, with all its newness, is an example of making the operating model more efficient.
The business strategy part is the difficult one. Getting closer to the consumer — what his changing needs are, the feedback, and the interactions,
MONEY WISEGIRI GIRIDHARChief Financial Officer , Spandana
PH
OT
OG
RA
PH
Y: J
IT
EN
GA
ND
HI
1 3F E B R U A R Y 2 0 1 1 | ITNEXT
PH
OT
OG
RA
PH
Y: J
IT
EN
GA
ND
HI
OPINION
It is no secret now that among all threat vectors acting on an organisation, the insider threat is the most potent. The Ernst & Young 2009 Global Information
Security Survey identified that autho-rised users and employees pose the greatest security threat to an organi-sation. The 2010 SAPS crime statis-tics also show that a total of 84,842 white-collar crime cases were reported between April and March 2009/10, marking a 56 per cent increase from 2006. It has been proven time and again that a harmless change or mis-take can have colossal repercussions. Most access provided to users in any organisation is role-based. However, most organisations often forget to consider crucial factors like data clas-sification and data ownerships. And consequently, a network administra-tor gets complete access to the network segment that s/he is responsible for. It is the same case when it comes to system and database administrators. Some of the questions that need to be asked here are:
Why should administrators have access to areas in the infrastructure beyond what is needed?For example, in the case of a bank, a database administrator should be able to initiate backups and execute the cor-responding scripts to get the task done. Why should they be able to snoop on the users’ database and their cell phone
ture to make sure that such actions of snooping or privilege abuse are logged and audited.
Why will the existing auditing fea-tures in the infrastructure compo-nents fail to capture this information?The existing auditing procedures can be manipulated or even stopped with the right privileges. What this needs is an additional (privileged identity manage-ment) layer over the infrastructure in question, which requires authentica-tion and maintains its own authorisa-tion. Hence all administrative users will need to authenticate themselves into this layer using ‘named ID’s’ and not their administrative or super user credentials.
So, what do we do with the adminis-trative or super user credentials?Since the users are required to login into this layer, the privileged identity man-agement infrastructure will change the administrative and super user credentials to a random password which will not be revealed. The passwords will need to be stored in a vault that is hardened, using an acceptable encryption mechanism.
What are the advantages of an effec-tive privileged identity management framework?An effective privilaged identity man-agement helps in numerous ways to an organisation. Some of the advantages of the system are:1. By implementing this total account-ability for insiders can be established2. It has an automatic ability to audit suspicious activities3.It has the ability to respond to these activities4.It helps prevent next crime in your organisation
So how much access is too much? While the answer can be debated, the use of privileged identity management systems can make it easy.
The author is an expert in managing Security Opera-tions, Managed Security Services, Remote Infra-structure Support Services & Identity Management
“A Privileged IdentityManagement system is an additional layer that imposes authenticationand maintains its own authorisation .”
numbers? The problem lies with the privileges that the administrator has been given to execute routine tasks.
Can we simply take away these privileges?The simple answer is no. However; what we need is a watchdog in the infrastruc-
TECH TALKDHANANJAY ROKDEPractice Head–Information Security, Arcon–Risk Control
Privileged Information
IL
LU
ST
RA
TI
ON
: A
NI
L T
1 4 ITNEXT | F E B R U A R Y 2 0 1 1
COVER STORY | TECH TRENDS
Cover Storyl.indd 14 2/2/2011 8:21:02 PM
Alvin Toffler, in his book Future Shock, argues that the society is under-going an enormous structural change; changing from an industrial society to a “super-industrial society”. This will overwhelm people, accelerated rate of technological and social change, leaving them dis-
connected and suffering from “shattering stress and disorientation” — a state of future shock With the rapid pace of change, where technology and customer pref-erences change in few quarters rather than years, future shocked is a grim reality faced by everyone, from an unsuspecting individual to an ill-equipped enterprise. One instance of disruptive change is the decline of General Motors. Untill a few years ago it was the largest producer of cars not only in the US, but also across the globe. But after 101 years in existence, the company filed for Chapter 11 Bankruptcy on June 1, 2009. The chief reason why GM folded, in spite of being a world leader for so many years, is because of it was unable to cope with change, or innovate.
BIZGROWTH
IGNITINGITBY SHASHWAT DC
8 trends that will
drive enterprise
investments
1 5F E B R U A R Y 2 0 1 1 | ITNEXT
TECH TRENDS | COVER STORY
Cover Storyl.indd 15 2/2/2011 8:21:10 PM
Innovation is disruptiveThe oxford Dictionary defines the verb “innovates” as make changes in something established, especially by introducing new methods, ideas, or products. Innovation differs from invention it is more about adaptation and not creation. For instance, Apple did not create MP3, nor a music player. Neither did it invent touch technol-ogy. Yet, it was the first one to put it all together and create the iPhone, which in a matter of years became the hottest selling product from its stable. Thus, innovation is very disruptive and can be a game-changer very quickly.
At times, change can be a big smack across the face; take the case of Kodak. Founded as Eastman Kodak in 1892, the photo and imaging company literally defined the whole industry single-handedly. For man decades, film print and cameras from Kodak were the only ones that were sold in the market. But, the advent of affordable high imaging digicams in the early-90s nullified the need for film rolls, getting it developed, etc. It’s possible that because it had heavy investments in allied industries, Kodak shied away from digital cameras. The result? In a matter of a few years, film-roll cameras were history, as people across the globe grabbed digicams off the shelves. Kodak that had been at the top of the game, found its market disappearing from under its feet and business turned into a negative of a different kind. By the time it jumped on to the bandwagon, the game had already
changed and Kodak would no longer set the agenda for the photography business, but simply followed them.
History is littered with a myriad examples of companies that have withered away simply because they would not cope up with change. And this does not hold true not only for developed countries; but also at home.have instances of Hindustan Motors (of the hitherto ubiquitous Ambassador cars), or MTNL and Indian Airlines. Think of any segment and you’ll find companies that have lagged behind, because of their inability to change.
Tech the driverBut what has all this got to do with tech-nology or IT? A lot, if you pay attention. With technology underpinning all the functions of a company, IT can play a sterling role in ensuring the relevance of the company in a new world order. Not only does technology help mitigate the impact wrought by changing times and scenarios, it can also be used as a
strategic tool to stay ahead of the pack, when the chips are down. Nevertheless, a lot depends upon how wisely you col-laborate the efforts.
Gati is a an illustration of how to use technology to stay relevant. A logistics company that started operations in 1989, it’s still a force to reckon with, even with all the upheavals and new entrants, solely because it embraced technology, thereby bringing down costs and increasing productivity (read the case study).
The State Bank of India (SBI) is another example of the same. Towards the end of the 90s, when it started feeling the heat of competition, the bank decided to port all its systems to a core-banking solution. After much back and forth, the bank finally settled for TCS’. Because of the core banking solution, SBI can now handle about 35 million transactions a day as compared to just 10 million earlier. In fact, it is estimated that there has been as much as a 60 per cent growth in customer accounts, post 2003, when the core banking technology was implemented.
Both these examples, demonstrate how firms can remain relevant even in challenging times by adoption of technology. The key is to figure out the operations and then invest accordingly. So, for instance when Gati discovered that there was no relevant solution available, it went ahead and developed it. But that was not the case with SBI, it has not only customised and used off-the-shelf solutions but also outsourced
While size can be a big advantage for any company, it also has
its drawbacks. Agility is usually the biggest victim of size, the
thumb rule being that the larger you are the lesser nimble
you will be. It’s not as if this rule is cast in stone, though. The
success of Gati, a national logistics player seems to prove this
point. The company has offices at over 400 locations in India
and connects nearly 600 districts in the country through its
vast fleet of vehicles, Yet manages to remain on its toes.
Gati, which started as a cargo management company
in 1989, has grown into a logistics supplier that caters to
many verticals. Back in 2000, overheads were increasing
disproportionately and efficiency had slackened considerably.
Given its spread of operations, it was a evident that use of
technology could effectively redress such issues. But no sooner
had the company agreed on the need to ‘computerise’ the
infrastructure that they faced a major road-block, a solution
that suited their needs.
After evaluating of several available solutions, the company
concluded that there wasn’t a single ‘off the shelf’ solution that
“With technology underpinning all
functions of a firm, IT heads are no
more outsiders to the decision making process, but active
participants”
Stitching the systems at home ensures a right fit and instills pride
CUT TO FITCASE STUDY 1 / GATI
COVER STORY | TECH TRENDS
1 6 ITNEXT | F E B R U A R Y 2 0 1 1
Cover Storyl.indd 16 2/2/2011 8:21:14 PM
much of its mundane stuff to third-party vendors, thereby bringing down costs and improving efficiency.
And it all boils down to how IT is used and deployed for the same. And it is critical that a detailed study is conducted, and the IT function dovetails the business function. The IT department can no longer function in a silo and needs to act as a strategic partner. This is increasingly reflected in the way the CIO viewed in the corporate hierarchy. He is no more an outsider to the decision-making process, but an active participant.
Reimagining ITGartner recently published a report, based on a survey of over 2,000 CIOs across the globe, outlining the agenda for the coming year. One of the prime recommendations of the report is rei-magining IT. The report observes that, “As enterprises concentrate on growth, they remain vigilant about costs and operational efficiencies. Growth requires IT to raise its strategic impor-tance to the business rather than focus on delivery of generic business plans. Combined with continued tight IT budgets, these factors call for CIOs to engage in ‘creative destruction’— taking what they have now and reimagining it to build IT’s future.”
This process requires the IT function to view IT as a strategic catalyst and begin leading from that perspective. They have known for years that they need to deliver business results.
And yet, operational concerns, budget constraints and business expectations have limited their ability to act. This need not be the case any longer. Lighter-weight technologies have changed resource requirements, letting IT meet the increased demand for innovation and offer solutions that support growth.
The message is simple, one needs to revamp the belief that IT is an enabler and understand that it is a key component in any firm’s tryst with destiny. The key is to think of IT like a CEO, as a business case. Thus, when a decision needs to be made to add new infrastructure, consider technologies like the Cloud with an open mind and then weigh the recommendations, based on the gains made in terms of monetary savings and the losses in terms of security threats. Any decisions that are to be made need to be examined from the business perspective rather than just a functionality. IT Managers
should see the tools of Information and Technology as a driving force to change the needs of business for change, innovation and growth.
The Business ConnectionTo help you prepare for the future, IT NEXT presents eight key business trends that will have significant impact in the days to come. Ranging from ubiq-uitous mobile telephony to better work-force management the work-force, each of these business trends are analysed, based on the kind of impact they will have on the enterprise. Subsequently, these challenges are then analysed from a technological perspective, as to how they can be handled from an IT point of view. These trends, selected by numerous experts, are meant to provide a vision to the IT manager on how to prepare for the future.
In addition to these trends there are 3 case studies presented herein that detail how different companies, like Gati, MMFSL, and Makemytrip have not only used technology as enabler but also as a key business driver. These case studies range from across the spectrum, from how a Gati used technology to bring down costs to how MMFSL uses IT to reach out to the rural audience.
Toffler has one bit of daring advice to offer all managers — technology feeds on itself. It’s technology that makes more technology possible. Thus, don’t fret and fume over an issue, business or otherwise, be assured, if there is a problem, technology has the answers.
could cater to its business needs. The processes in logistics
companies differ from company to company. There is no best-
practice template that can be used. After a thorough study, Gati
discovered that customising available solutions would take as
much effort as building one and costlier to boot. Ravi Kumar,
CIO of Gati got cracking, and together with the internal team,
created a solution that completely mapped the needs and
requirements of Gati. Dubbed as Gati Enterprise Management
System (GEMS), the solution is Web-enabled and links all the
offices on the same platform.
It took two years and a half to design, develop and roll out
GEMS. The company also achieved many other benefits from
the computerisation drive; for instance, the productivity of
employees went up substantially. At the same time, agility was
enhanced. Finally, the development of the GEMS solution in-
house not only saved costs in terms of licensing and consulting
fees but has also instilled a sense of pride. “Developing the
software internally has given us complete control on the way
we scale or tweak it to match our requirements,” says Ravi
Kumar. “This would not have been necessarily possible with an
external solution,” he adds.
“At Gati, IT investment is not a cost but an instrument for controlling costs,” GS RAVI KUMAR, CIO, GATI.
“Growth requires IT to raise its strategic
importance to the business rather
than focus on delivery of generic
business plans”
TECH TRENDS | COVER STORY
1 7F E B R U A R Y 2 0 1 1 | ITNEXT
Cover Storyl.indd 17 2/2/2011 8:21:18 PM
A ccording to several estimates, there are close to 700 million cell phone users in India, and the number continues to grow. The fact that in the
past 15 odd years, telephony has grown with such leap and bounds. Indians, be it the slick city-goer using a BlackBerry or the poor fisherman in Kochi checking out the rates on his ‘sasta’ Chinese handset, have really taken on to the cell.Little wonder, many enterprises are keen to exploit the plat-form for their benefit, not only as a tool for their workforce but also as a mechanism for survival and growth.
Today, a number of sales force automation tools are available in the market that help companies take their enterprise solutions on the cell phone. There are various solutions on offer from Checkpoint, Cisco, IBM, RIM, Salesforce, etc., that can aid the transition. These days, most
of the enterprise solutions come with in-built mobility features, which can be easily used. For instance, ERP solutions from both SAP and Oracle have such functionality.
The explosion of mobility is also an opportunity for many companies to reach out to their customers, through the use of innovative means.
Thus, having a WAP-enabled site is now a must, as
well as having a mobile-payment gateway. Depending on the service offered, companies can even look to having their custom apps for the smart phones like iPhones and Android.
Much like a magician’s wand, globalisation is a phe-nomenon that makes everyone equal, well almost. For instance, the average ‘Anna’ who makes and
sells yummy dosas on a cart in the neighbourhood, is not only competing with other such ‘Annas’ but also with behemoth companies that hail from places like Illinois and Louisville in the US, namely, McDonalds and KFC, respectively. But globalisation is a two-way street. With a systematic and proper usage of technology, a company can now find newer markets and customers in different geog-raphies. One of the popular way is by having a website. But even if you don’t have one, there is no reason why your company product can’t be present on third party shopping sites, like eBay or Amazon. Many companies are able to test the water for their products in different geographies through such mechanism.
Like the ‘Anna’, one needs to gear up for the challenges of having well-entrenched global players in the same space. One of the things to notice here is that, almost all of these global behemoths use technology and IT extensively in their operations; this not only reduces cost but also helps them turn things around quickly. For instance, McDonalds has various operations, from procuring raw material to taking customer orders Hence, the only way to compete with MNCs is through automation, be on the lookout for solutions and services that help you automate.
Reaching out to the ‘bottom of a
pyramid’ is a fanciful phrase often
heard at seminars and conferences, but
when it actually comes to putting it in
practice many companies balk at the
prospect. The dichotomy is all the more
conspicuous in India, where even though
more than 70% of the population lives
in the villages, there are just a handful
of companies that service the needs of
this section. Fortunately or unfortunately,
Suresh Shanmugham, had joined a
company that was indeed keen to deal
with this ‘pyramidical bottom’.
TECH TREND #1/ MOBILITY TECH TREND #2/ GLOBALIZATION
For decades, Mahindra & Mahindra
has been making and selling millions of
tractors across the length and breadth
of India. When the corporate entity
decided to venture out in setting up
a financial organisation, its goal was
closely aligned with the needs of these
very farmers. And so was born Mahindra
& Mahindra Financial Services. The aim
of the company was simple and straight
forward: provide loans to farmers and
other rural individuals at affordable and
easy rates. Shanmugham was given the
Spreading operations in rural India while ensuring integrity of transactions
OUT IN THE FIELDSCASE STUDY 2 / MMFSL
Mobile Telephony Makes Waves
The World is a Village
1 2“Solutions and services that help
organisations automate will be
high on demand ”
“In a growing era of social media,
enterprises need to put in place pro-cesses that should
solve customer issues faster”
COVER STORY | TECH TRENDS
1 8 ITNEXT | F E B R U A R Y 2 0 1 1
Cover Storyl.indd 18 2/2/2011 8:21:21 PM
M any decades ago, Mahatma Gandhi remarked that India lives in the villages. Even today, this is true. According to certain estimates, close to
70% of our population resides in villages. As many mar-keting gurus have proclaimed, the next big thing in India will come from the villages. For instance, it is this part of India only, which taught marketing lesson “small is big” to many global companies. Yet, there are many chal-lenges faced by the enterprise when it comes to tapping this source of revenue. For instance, when Mahindra & Mahindra Financial Services Ltd, decided to reach out to its customer in the rural hinterland, it was faced with an issue of how to reach out to them. The biggest challenge, technologically speaking, is simplicity. Conversing in a different language can be a big issue. Thus whatever solu-
tion that is designed for the rural markets needs be simple and easy to manage.
The other big factor that needs to be borne in mind is the power or energy issue. Electricity is still very erratically supplied in rural areas, if at all it is.
Thus, you need to design your system and architecture keeping these issues in mind. For instance, when Bank of
India had opened its branches in rural India, it had to opt for renewable power sources like solar energy to be to run its branches. So, while going rural might sound daunting, it can also have sweet rewards.
Did you notice that the winters this year were colder or that the previous summers were much hotter? If the answer is yes, well then you are now one of the
many people who are worried about how climate change will impact them. Thanks to the doomsday movies from Hollywood and the dour prognosis of the various expert panels, the climate change paranoia is fairly pervasive.
The trend is evidenced by how companies like Infosys, TCS and Wipro are now not only talking about their sustainable practices but also highlighting them. Green in the years ahead will be a differentiator and companies are perceived to be having ‘unsustainable’ practices will have few takers.
Not only that, adopting green practices can be of tremendous economic value, since, most of them are concerned with reducing the consumption of power. For instance, companies that deploy video-conferencing solutions thereby reducing intra-office travel are said to be going green. Thus, any activity that reduces energy consumption is green. We are witnessing a surge of cost efficent technologies that ranges from generators to laptops and even cellphones.
The way to go green is not that hard. The first step is to measure the consumption of power precisely and then working out a detailed and elaborate plan on how to reduce the consumption. .
mandate to make this possible.
Keeping in mind the needs and
requirements, MFConnect came into
being. Customer agents use this easy-
to-operate handheld device as they go
from village to village collecting data
or installments. Besides being easy to
operate, the device effectively perrforms
the three main functions of MMFSL,
namely, receipt generation, customer
commitment recording and capturing
data pertaining to customer visits. Since
the device had been custom built on an
open source platform, it is very cheap.
Over the years, 3000 such devices have
been distributed. The results have been
“With the effective use of IT, we were able to quickly ramp up our operations in rural hinterland in years, what could have otherwise taken decades,” SURESH SHANMUGHAM, HEAD-BUSINESS IT SOLUTIONS,
MAHINDRA & MAHINDRA FINANCIAL SERVICES.
TECH TREND #3/ RURAL EXPANSION TECH TREND #4/ GREEN PRACTICES
good, gauged from the fact that MMFSL
is the largest NBFC (non-banking
financial company) in rural India with
over 450 branches spread across the
country. Through these handhelds,
MMFSL has been able to reach out to
customers in far-flung areas, which
otherwise would have been tough. The
company has already set its eyes on
the next goal: its second generation of
handhelds, which are currently being
rolled out, will collect biometric data, as
well as video recording.
4“IT Managers should sensitise
the management on the economic benefits of green
computing”
India Lives in the Villages
Growing awareness of climate change
3“In 2011, busi-
nesses will focus on targeted mes-saging to the web
visitors and secure high rankings for
key search terms”
TECH TRENDS | COVER STORY
1 9F E B R U A R Y 2 0 1 1 | ITNEXT
Cover Storyl.indd 19 2/2/2011 8:21:25 PM
Customers Demand More
Managing Attrition, Attracting Talent
The first Online Travel Agency in India that has revolutionised travel and tourism
USING THE ONLINE MEDIUM
CASE STUDY 3 / MAKEMYTRIP
Till some years back, if you advertised and oper-ated a help line number, you would be considered customer-friendly. But then the world’s changed
a lot since then. In fast evolving hyper-connected world that we live in now, a customer who needs a problem reso-lution, not going to call your helpline number for the same, in all probability would be tweeting about the issue or put-ting it up on Facebook.
Enterprises now need to be on alert at all times, trying to resolve customer issues on the fly. They need to put in systems and processes in place that will enable them solve such issues before they balloon into big problems. Take the case of the Gulf of Mexico Oil Spill, Within a few weeks of the disaster, a Facebook group called “Boycott BP” sprung up, urging a worldwide boycott of all BP brands and
services. It drew more than 836,000 fans. Meanwhile on Twitter, an anonymously managed account – BP Public Relations (@BPGlobalPR) – that made glib comments, purportedly on BP’s behalf, had 185.000 followers. And if you thought, such kinds of issues happened overseas only, think again.
To guard against such a scenario, a policy needs to be
in place, and a senior person needs to be given charge of managing the community. Also, provide a direct link to the customers, through phones or emails, whereby they have the problems redressed..
In many ways, HR managers prefer recession over growth. The reason is fairly simple. In times of reces-sion, when the company is looking at shedding extra
weight, HR managers’ just need to focus on a few individu-als that are crucial and let the others leave. In times of constant growth, they need to be on the toes all the times trying to fill positions. But if this was tricky, coping with growth after a lull can be all the more challenging, as com-panies that were so far retrenching need to start recruiting. This is where technology comes in.
Between, managing attrition and recruiting new talent, the former is much tougher and more critical. Every employee that leaves an organization takes with him or her valuable IP. Also, he or she poses the biggest threat to the organization in terms of data security and integrity. To forestall such dangers, robust IT systems need to be put in place that provides accessibility to the users based on their roles and requirements. A a good Intranet often helps in ensure that all the IP is not lost with an exiting employee. Another way to manage attrition can be to set up an email id and encourage employees to share their problems anonymously, this can go a long way in resolving small issues. To be able to manage the employees better it is imperative that a good HRM solution is implemented and good policies are not only formulated but even shared with the employees.
Not many could have imagined the
original Internet boom and the
subsegment crash. The Bust, as many
call it, made online business seems like
a misnomer. And the messiahs of brick
and mortar were rubbing their hands in
glee, with an “I knew it would not work”.
The faith in online was its nadir at the
turn of the century in 2000. Around the
same time, Deep Kalra, Rajesh Magow,
and other friends decided to venture out
from their cushy jobs, and start up a new
venture. After much deliberation they
figured that travel and tourism would be
their calling and Internet their platform.
Makemytrip.com was born.
In its earlier avatar, Makemytrip
catered to the US India travel sector,
providing options to the many NRIs
that keep flitting between the India and
the US. Within a few years Makemytrip
TECH TREND #5/ CUSTOMER CARE TECH TREND #6/ PEOPLE MANAGEMENT
65“Market study and demographic analysis will hold the key to derive the best possible
selling price”
“Talent scarcity will force organi-sations to explore services from con-
tractors, remote workers and part
time workers”
COVER STORY | TECH TRENDS
2 0 ITNEXT | F E B R U A R Y 2 0 1 1
Cover Storyl.indd 20 2/2/2011 8:21:28 PM
Reducing costs, Making gains
Everyone is connected
While many may assume that recessionary tendencies are a thing of the past, the lessons learned from it are certainly not. Cost cutting
that became a norm during the lull in the economy still continues to be a dominant force as companies need not want to repeat the mistakes made before the downturn. But then, even while reducing costs most firms are now changing gears to move into a growth trajectory, thereby need to scale up their operations and put the systems in place. Both these factors, offer an unique challenge for the IT manager, namely, prepare for growth while cut costs.
This dichotomy offers a unique possibility for the IT manager to not follow a brow-beaten path and test new ideas. For instance, many companies were quick to evaluate their functions and then ship non-core work to
third-party vendors. Thus, we saw companies going in for remote infrastructure management or even moving their IT operations lock, stock and barrel to a vendor. Like everything, outsourcing has its two sides. Thus outsourcing needs to be a well-thought out decision. Many companies can now shift opt to a pay -per- use model over the
Internet and access services and software that is critical for the company. Hence, cloud is perfectly suited for an organization that is looking to grow, while wanting to keep the costs low.
According to Internet World Stats, an online research firm that tracks net users across the world, there are 81 million Internet users in India.
This represents a penetration of just 7% of the population, but makes ber India, the 4th largest country in terms of net users and Internet users. And the numbers are bound to grow rapidly.
One of the biggest factors that is driving Internet usage in the past few years is social networking. For instance, Indians comprise the second largest chunk in the Orkut universe after Brazil. Indians have also adopted to Facebook in a major way. With such trends on the rise, and the number of youngsters increasing demographically, online and Internet is the place to be, even for the enterprise.
To be able to make gains from the Web, a strategic and comprehensive policy needs to put in place regarding how the platform will be used. Based on the objective or a set of objectives, appropriate actions need to be taken. Another important factor to bear in mind while formulating the new media communication strategy is that much of the online explosion is coming through mobiles. The future could very much be dictated by the tastes and likes of the mobile web user. Thus, sites and pages need to be designed keeping in mind the requirements of the mobile.
became popular. A few years later, in
2005, when the low cost airlines arrived
in Indian skies, Makemytrip, decided it
was time for the Indian traveler to make
use of its offering and the local version of
the site was launched.
Needless to say, it is technology that is
powering the solutions from Makemytrip.
The company has invested heavily in
the latest hardware, be it datacenters or
contact center solutions. The company
also uses renowned international IT
platforms like Amadeus (a global travel
distribution system) for stacking fares of
different airlines. All these have made it
possible for the Makemytrip customer to
view all the options.
The company is also uses BI solutions
to keep a track of its customers and their
likings.
“More IT investments should go into building strategic solutions that can drive business growth,” RAJESH MAGOW, CO-FOUNDER AND CFO, MAKEMYTRIP INDIA. In fact, Makemytrip isstepping up
the technology blueprint. According to
reports, the company plans to spend
$2-$3 million on technology upgrades
in the next 18 months. It has already
spent close to Rs 700,000 on technology,
including hardware, software and
website development.
Recent technology enhancements to
the platform have enabled customisation
of flight plus hotel and bus plus hotel
packages and instant ticketing.
TECH TREND #7/PRODUCTION EFFICIENCY TECH TREND #8/ONLINE EXPLOSION
7 8“ Enterprises are
swiftly evaluating cloud models, to grow, while
maintaining the costs under
control
“Use of web as a medium to
promote services will gain continue
to gain traction among all sectors”
TECH TRENDS | COVER STORY
2 1F E B R U A R Y 2 0 1 1 | ITNEXT
Cover Storyl.indd 21 2/2/2011 8:21:30 PM
Dell’s Streak 5-inch tablet has been updated with Android 2.2, offering a more refined experience to users
BY NICHOLAS KOLAKOWSKI
DELL STREAK WITH ANDROID 2.2
Dell intends its 5-inch Streak to be the first of many tablets rolling out over the next sev-eral quarters. In a September 2010 presentation at Oracle
OpenWorld, CEO Michael Dell offered a sneak peek at a 7-inch tablet, while indicat-ing the market segment was in a state of constant change and evolution.
That makes the Streak, already some-thing of an artifact. In a market as hot as tablets, any model’s relevancy will drop precipitously as months go on—and the Streak’s already been on store shelves
since early August 2010.However, Dell is replacing the
Streak’s Android 1.6 OS with an Android 2.2 (Froyo) update.
Although the Streak is intended as a hybrid between a
tablet PC and smartphone, with the ability to make phone-calls, the
company neglected to include a SIM card in the model sent for review to us. That lim-ited testing to the Streak’s capabilities as a tablet, using WiFi.
HardwareAt 7.7 ounces, the Streak certainly feels hefty in comparison to 4.5 ounces for some Android smartphones. Weighed against the 3G-enabled Apple iPad at 1.6
INSIGHT | REVIEW
2 2 ITNEXT | F E B R U A R Y 2 0 1 1
pounds, of course, the Streak feels light. However, with a 5-inch multi-touch screen, the first impression is more “This is a phone by Dell” as opposed to “This is a tablet.”
The mechanical buttons along the upper frame of the device (Camera, Power, Volume) felt small and sharp and metallic. In the first few hours with the device, I found myself repeatedly hitting the Power button when I meant to use the Camera, and vice-versa. On the Streak’s front, the Back/Menu/Home buttons seemed nicely responsive to touch.
The screen is Gorilla Glass, and the Streak survived 3-foot and 5-foot drops onto a hardwood floor with no visible cracking, chipping or performance dam-age. As always, dropping your expensive mobile device is not recommended.
The touch-screen is responsive, with nary a need to jam a thumb into an icon in order to activate it. That being said, after months of staring at Samsung’s Super AMOLED screens for both the Samsung Galaxy S smartphone line and the Galaxy Tab, as well as Apple’s high-resolution Retina Display, the Streak’s screen came off as somewhat dim.
One of the Streak’s prime advantages seems to be battery life. Over two days of moderate use on WiFi networks—which included Web browsing, video, email, navigating, instant messaging, and pic-ture taking—the device merely sipped power. Those who find themselves aggravated over plugging in their mobile devices by afternoon could find this a pleasant surprise. But the full picture of the Streak’s battery life, alas, can’t be offered thanks to the inability to test in 3G.
The Streak’s 5.0-megapixel camera is pretty standard-issue for Android devices. In low-light conditions, the flash seemed short-range and weak. The Streak’s size makes it slightly cumbersome as a camera, and the device often needed to be stabilized in both hands or against a flat surface in order to take a non-blurry shot. The camcorder was the bright spot here, shooting in 720p.
The Streak also offers a front-facing VGA camera. Unlike Apple’s iOS, with its comparatively easy access to the com-pany’s FaceTime video-conferencing application, Android users will likely need to wait until third-party developers start exploiting the hardware for their own video apps; at the moment, there’s a decided lack of ways to use the front- and rear-facing cameras in combination.
SoftwareDell seems to have trod lightly when it came to skinning Android 2.2. When you startup the device, you’re presented with a default set of home screens, accessible by swiping: Home, Contacts, Email, Social, and Music. From the home screens, users can use the icons along the bottom to access the phone, browser, or applications screens. With its 1GHz Snapdragon processor, applications sped along with nary a stut-ter. The Streak also supports Adobe Flash 10.1, which remains a competitive dif-ferentiator for non-Apple tablets. Those who operate a Dell ecosystem will likely appreciate the ability to sync their multi-media and contacts with their PCs, while those with Google accounts will have the
usual Android-enabled access to Gmail and messaging.
Early reviews of the Streak complained about user-interface bugs. During a week’s worth of testing, few of those quirks made themselves known, although the testing device froze for a few minutes on two occa-sions (with no running apps). Both times, it returned to life after a liberal and repeated smacking of all mechanical buttons.
For enterprise users, the default Streak offers Quickoffice, calendar, integrated GPS leveraging Google Maps for on-the-road navigation. Syncing Exchange with the Streak is an exercise in hair-tearing aggravation, not entirely unexpected given Android devices’ inconsistent record in that area. The Streak’s virtual keyboard was another positive experi-ence. It includes Swype, for whose who want it. The keys seemed responsive and right-sized.
ConclusionIf you’re in the market for an Android smartphone, the Streak’s 5-inch screen and weighty form-factor might prove a bit too cumbersome for your needs. If you want a tablet, that same 5-inch screen may prove a bit too small in comparison to the Apple iPad or host of 7-inch tablets now hitting the market.
That being said, a subset of the tech-buying population will probably appre-ciate a smaller tablet, capable of being carried in one hand, which can also make phone calls. For those users, the Streak offers a solid, and fairly standard-issue, Android 2.2 experience.
FEATURES: PRICE: Rs. 34,550
BATTERY LIFE: 2 days (Moderate Use)
Gorilla Glass Screen
5.0-megapixel camera
Compact, 6-inch wide x 3.1-inch
high x .4-inch thin dimensions
1GHz Snapdragon processor
Expandable 32GB Memory
Supports Adobe Flash 10.1
THE POSITIVES:Replaces streak’s Android 1.6 OS with an
Android 2.2
The Back/Menu/Home buttons seemed
nicely responsive to touch
Virtual keyboard includes Swype, for
whose who want it. The keys seemed
responsive and right-sized
Front-facing VGA camera
THE NEGATIVES:The first impression is more “This is a
phone by Dell” as opposed to “This is a
tablet.”
Early reviews of the Streak complained
about user-interface bugs
At 7.7 ounces, it feels hefty in comparison
to 4.5 ounces for some Android
smartphones
IM
AG
IN
G: S
HI
JI
L N
AR
AY
AN
AN
REVIEW | INSIGHT
2 3F E B R U A R Y 2 0 1 1 | ITNEXT
With a pan enterprise search infrastructure in place, a company can access all its systems to quickly uncover vital information pertinent to a special project
HOW TO MEET UNIQUEINFORMATION MANAGEMENT
A sophisticated pan-enterprise search solution is a smart approach for effective information management
and compliance, especially in highly-regulated industries that have little room for error. With a pan-enterprise search infrastructure in place, a company can access all its systems to quickly uncover vital information pertinent to a specific project. Carol Fineagan shares how the right pan-enterprise search solution has fulfilled her company’s unique knowledge management and compliance requirements.
AND COMPLIANCE CHALLENGESBY CAROL FINEAGAN
IL
LU
ST
RA
TI
ON
: PH
OT
OS
.CO
M
INSIGHT | INFORMATION MANAGEMENT
2 4 ITNEXT | F E B R U A R Y 2 0 1 1
that data about disposal projects must be maintained indefinitely. While we keep thorough records, the baby boomers have over 40 years of nuclear science knowledge, and they have cre-ated specialized indexes in existing systems that we don’t want to lose. We needed a solution that worked on employee desktops to allow our newer recruits located around the globe to essentially harvest the knowledge in people’s heads. Plus, we needed to make sure we didn’t lose critical intel-ligence as employees retire.
There are a range of solutions that have attempted to deliver on the promise of enterprise-wide search. We looked at the major vendors and selected a solution from Autonomy for the unique way it could find the mean-ing within, and the inter-relationships between and among, disparate pieces
of content, regardless of the data type or location within the enterprise.
With our new solution, in only 30 days, we were able to put into place a pan-enterprise search infrastructure that could access all systems to uncover specific information, including older documents and file types. With the new system and in reaction to a regulatory inquiry, we can now quickly search
all enterprise information across all offices and systems to find information pertinent to a specific project.
For example, if the U.S. Nuclear Regulatory Commission is looking into a shipment, we can produce the required information by searching for project information saved in an e-mail, on a desktop, or in an accounting, transportation, records management or processing system.
By selecting the right partner for information management and compli-ance, we have enabled legal, regula-tors, engineers and anyone else in the company to access enterprise infor-mation in a meaningful way—without needing to learn proprietary systems or taxonomies. The solution we chose also ensures that the right people have access to the right information because it honors the security infrastructure we have in place. For example, if legal can’t find something, it’s either a rights issue or the data does not exist.
Sophisticated pan-enterprise search is a smart approach for effective infor-mation management and compliance, especially in industries that are highly regulated with little room for error. Intelligent search speeds knowledge transfer of culture and people to newer employees, creating a brain trust of tal-ent for competitive advantage. More-over, we can now match engineers with one another so they can leverage best practices and expertise for the betterment of the projects on which they work.
Carol Fineagan is Senior VP and CIO of Ener-gySolutions, Inc. She has served for eight years as CIO for Duratek in Maryland,
SOPHISTICATED PAN-ENTERPRISE SEARCH IS A SMART APPROACH FOR EFFECTIVE INFORMATION MANAGEMENT AND COMPLIANCE, ESPECIALLY IN INDUSTRIES THAT ARE HIGHLY REGULATED WITH LITTLE ROOM FOR ERROR.
LOWER CALL CENTER COSTSWith enterprise search implemented on your external web site, customers are able to find answers to technical or sales questions easily, so they don’t need to call. And when they do call, you spend less on call center costs when when your representatives are able to find information quickly.
HIGHER PRODUCTIVITYAn enterprise search solution can reduce the time your employees spend looking for information by 15 to 30 percent*
BETTER COMMUNICATIONWith the rise of telecommuting and outsourcing, you may have workers in different time zones and on different continents. When your London office needs an answer, and it’s 3:00 am in NY, calling the manager in NY may not be the best option. Wouldn’t it be better if that answer was available through internal search?
REGULATORY COMPLIANCEReduce the cost and the time invested in complying with government or industry regulations.
WEB BASED REVENUEWhether you profit by selling information, ads or bungee cords, enterprise search can help.
PROVEN ROIA recent IDC study showed that “an enterprise with 1,000 knowledge workers wastes $48,000 per week ($2.5 million per year) due to an inability to locate and retrieve information.”* $2.5 million is a lot to pay for lousy search. (Finding Information, Susan Feldman and Chris Sherman, April 2003, IDC #29127)
Source: TNR Global Search Solutions
ENTERPRISE SEARCH BENEFITS
INFORMATION MANAGEMENT | INSIGHT
2 5F E B R U A R Y 2 0 1 1 | ITNEXT
THE MANAGED SERVICES ROUTE Managed services hold
significant potential for enterprises to save costs and reduce complexity of managing IT systems.
BY IT NEXT BUREAU
Better management with less investment, is what every business looks for. Managed ser-vices is one such tool, that can help business achieve this goal. Man-
aged services, refers to outsourcing the management of networks, systems, stor-age, applications or the entire IT infra-structure to a service provider. As aptly put by S Krishnan, Technical Director, Kaybee InfoTech, “A key benefit of man-aged services is that CIOs have some-one to share the responsibility of the IT infrastructure. It is an extremely viable option for them.”
INSIGHT | MANAGED SERVICES
2 6 ITNEXT | F E B R U A R Y 2 0 1 1
Insight_managed servises.indd 26 2/1/2011 5:25:31 PM
IL
LU
ST
RA
TI
ON
: PC
AN
OO
P
Outsourcing has come a long way in the past few years. Managed network services are becoming more common as well. “The scope is great for this line of business and more and more people are entering this field,” says Viren Reshamwala, CEO, Millennium Business. Slowdown has made businesses more conscious about their IT spending thus accelerating the growth of managed services. “Companies are now more cognizant about the way they spend on their IT infrastructure. The management of such an environment is quite expensive. This model makes business sense for start-ups with limited funds. If these start-ups have an option to spare the investment cost for particular technology needs, it will readily adopt managed services”, adds Reshamwala.
These services also make a lot of sense for enterprises that lack the funding to create a high-end technological set-up. At times such businesses also lack the technical know-how to handle such complex environments. Also, if a company requires an IT set-up in another state or city where it does not have any kind of support, these services are a boon to them. These companies can now make use of managed services on a project-based time frame. For example, if a company in Delhi needs to set-up a temporary base in Mumbai, then having a managed service provider take care of its infrastructure is a better and a more economic option.
Small and medium-sized businesses often find that growing their business, using new technology, raising employee productivity, and improving responsiveness to customers all at the same time can be challenging. MSPs help solve these business challenges with a comprehensive managed services portfolio tailored for the small and medium-sized business.
Road blocksFor every line of business to grow and gain acceptance, it has to go through many trials. So, what are the challenges facing the growth of this industry? We interviewed a few system integrators
and they unanimously agreed that changing the mindset of the customer and to convince him of the channel partner’s capability is a bottleneck. Second is the low availability of talent in the industry. “The in-depth knowl-edge of the technologies involved is extremely important for the people handling managed services. They should have the technical know-how and should be able to take decisions on their own. “To get people who will be skilled enough to take care of such complex environments are hard to find,” says Reshamwala.
“Although most companies are aware of managed services, many are do not know of the full potential and cost-savings such services can provide
enterprises,” said Girish Trivedi, Co-Founder, Shape Foundation.
Managed services model is a new entrant in the market. Customers are a little skeptical about it. The mind-set of the business community to keep everything within the range where they themselves can monitor everything is yet to change. Especially with something that is so important for their business and an area that comprises major investments. Krishnan says, “Awareness about managed services is extremely low in the industry. People are still unaware about the facets of such services. Therefore they have a problem accepting it as a trustworthy solution to their IT management problems. Selling a new concept has always been an issue. This one is no different”.
Executives were willing to spend a large portion of their IT budgets — between
10% and 20% — on network-centric managed services
The majority of enterprises — almost 60% — already use a managed service
and have been doing so for between one and four years.
Europe has the highest adoption of managed services — driven in large part by
the challenges of managing and maintaining business across multiple borders
Emerging markets, such as those in Africa and Latin America, are preparing for
managed services -- especially as broadband network access becomes more
established.
Multinational corporations and large enterprises have the greatest uptake in
network-centric managed services, with SMEs now also looking for proven
solutions that lower their costs.
IT managers are applying a significant portion of their budget to managed
services.
The types of managed services that MSPs are providing are growing at a
phenomenal rate. They manage everything from unified communications (UC)
applications, to network security, to network connectivity and telepresence
video collaboration services.
Growth is expected to continue throughout the U.S. and Europe — especially in
Eastern European countries, over the next 18 months.
Latin America and Asia will provide continued expansion of these
managed services.
PYRAMID RESEARCHON MANAGED SERVICES
MANAGED SERVICES | INSIGHT
2 7F E B R U A R Y 2 0 1 1 | ITNEXT
Insight_managed servises.indd 27 2/1/2011 5:25:31 PM
Agrees Jayesh Mehta, CEO, Future Businesstech, “People talk a lot about managed services. However, the fact that their knowledge about the service is extremely low, keeps them from stepping forward and applying it to their business”.
The brighter sideHowever, as we all know, there are two sides of a coin. If there are inhibitors, then there are drivers of growth as well. According to Joslyn Faust, SME market analyst at Gartner, IT departments at smaller companies are stretched thin, and as the infrastructure and applications become more complex, companies are finding it difficult to effectively manage them.
She notes that this lack of expertise in the staff means there may only be one person responsible for a critical piece of infrastructure such as networking, requiring that individual to be always on call in case of emergency. Such virtual house arrest can quickly lead to job burnout should a more complex
environment create an onerous burden of after-hours calls. Businesses in this situation find outsourcing advantageous merely to gain access to all-hours support.
Topping the list of the many plus points is the fact that managed services helps a company to reduce the total cost of ownership and increase the
productivity as well. It helps customers to concentrate on their core business activity, taking the burden of the additional responsibility of managing the entire IT system, off their shoulders. “In today’s time the clocks in the office do not run only from nine to five.
People work around the clock and therefore the systems need to be up and running every hour of the day. With managed services, higher availability of IT becomes much more feasible and cheaper, which helps with the 24/7 work culture demanded these days. The level of automation is also quite high,” says Rajesh Aggarwal, IT Manager, Jindal Pipes.
Vikram Sharma, Vice President, Cisco says, “The emergence of new data technologies, the convergence of voice, video, and data, and the explosion of e-business across many industries, have resulted in corporate networks dramatically changing and becoming increasingly complex”. This trend has led to a complex spectrum of managed services offerings with managed network services (MNS) forming the foundation.
“Businesses keep growing and so does the IT infrastructure. The management of the same takes a lot of time and money. With the help of managed services, a company can now direct those resources to better their core competencies,” adds Mehta..
Managed services also provide the operators with new revenue streams. “Managed services can also help service providers in customer retention, since customers are not likely to change operators managing their entire IT infrastructure”, adds Bedi of Tulip Technologies. However if the system is ready to break down at a moment’s notice, then the service provider will have to shoulder the responsibility of it. Nevertheless, as the customers though good in numbers are not abundant, the enterprises do not really have a choice of choosing the kind of environment they would like to handle. The choice is limited and all that can be done is to tell the customer to improve their infrastructure before the responsibility is taken on. .
What would happen if my service
provider goes bankrupt?
Can I still access my data?
What is the economic condition of
my managed service providers?
Will my service provider
be engaged in a merger or
separation soon?
What are the consequences of
that in regard to the integration
and separation of IT systems?
While dealing with your Managed Service Provider (MSP) be vigilant and careful about these points or else be ready to get friendly with sharks.
Watch for co-mingled user information: There needs to be a very clear understanding of what infrastructure is shared, what technical resources are shared, and what processes (and technology) are in place to ensure that data does not get co-mingled across clients at the end of your MSP’s information infrastructure.
Does your MSP know you well: Teams handling data offsite/offshore should have good understanding of the criticality of the data/system to the user-business. They should also be aware of the security/privacy policies of the organisation they are supporting.
Are you communicating your expectations assertively: Communication of expectations is a crucial step. As a user of a fully managed hosting provider, you must transmit all security requirements to the potential hosting provider before committing to their service.
Keep the relationship going: As there are disgruntled employees that pose serious internal risks, there are MSPs - who with your IT environment in their hands - can cause as much or even severe harm.
Is your MSP explicit: The vendor needs to make clear to the client what all is needed
MANAGED SERVICES CHECKLIST
QUESTIONS TO ASK5
INSIGHT | MANAGED SERVICES
2 8 ITNEXT | F E B R U A R Y 2 0 1 1
Insight_managed servises.indd 28 2/1/2011 5:25:33 PM
PH
OT
OG
RA
PH
Y: J
AY
AN
K N
AR
AY
AN
AN
BY CAMERON STURDEVANT
SOCIALIZING IN THE ENTERPRISESocial media tools that mimic Twitter and Facebook promise to bring team collaboration to corporate users. Getting users and applications connected can mean the difference between leading and being left behind in an increasingly social world.
BY CAMERON STURDEVANT
INSIGHT | COLLABORATION
3 0 ITNEXT | F E B R U A R Y 2 0 1 1
IL
LU
ST
RA
TI
ON
: P
HO
TO
S.C
OM
Status update services, sometimes called microb-logging, took off in 2010. A Pew Research Center study released revealed
that 8 percent of American adults who use the Internet also use Twitter. Using social media tools in the enterprise pits open sharing against corporate con-trols. It also opens questions about how best to connect people and applications in an activity stream that is immediately relevant, secure and collaborative.
IT vendors, including Salesforce.com, Socialtext, Socialcast, Yammer and a host of others, have taken notice of the social media explosion by releasing a new wave of social media tools for the enterprise. The big bang that is the birth of social media platforms includes the initial formation of specifications and integration tools that seek to ease interconnection problems, while maintaining the fast-flowing nature of social media interactions.
It’s fair to say that business users aren’t looking for another place to search for the information necessary to do their job. And IT managers in larger enterprises may encounter multiple social media platforms inside a single organization.
What’s the best way to use social collaboration tools with partners? Is there a better way to integrate social media and back-end systems? The answer today is that a tangle of integration tools and a dearth of standards mean that IT managers must pay careful attention to a wide range of integration tools to curtail client creep. To this end, there are some emerging efforts that are worth watching.
Connecting social systems Jonathan Green, vice president of infor-mation technologies at Den-Mat, a dental-care products company, imple-mented Chatter as part of a broader Salesforce.com rollout. “We chose to implement Chatter to support our new direct-to-consumer product Snap-On Smile and to collaborate quickly with our vendors, partners and ultimately customers,” he said.
Green implemented Salesforce to replace an aging CRM management application running on its IBM AS400. The Salesforce installation was also integrated with a manufacturing component that is still run on premise. Chatter is used to facilitate communication between sales and accounting. Green indicated that Chatter adoption has been successful enough that he may migrate off an existing intranet and use Chatter to support internal collaboration.
To connect social media systems to your key applications, vendors such as Cast Iron and a host of others use custom-coded templates and REST (Representational State Transfer) APIs. The good news is that social media tools are no strangers to the integration process. On the consumer side, Facebook, Twitter, LinkedIn and other social platforms can share posts and status updates across platforms.
The not-so-good news is that specific integration tools that are built to
support specific platforms are the norm today. For example, there is a specific Salesforce.com integration that links Salesforce’s Chatter social collaboration tool with Facebook and Twitter. And Socialtext provides SocialPoint to interoperate with Microsoft’s SharePoint intranet software.
IT managers have choices when it comes to “socializing” the non-human elements of a social media platform. Unlike classic enterprise process integration, in which data is taken from one application and given to another, social integration takes specific types of events and places them into an activity stream that will be read by a person.
One example of this is the integration provided by Cast Iron, which uses templates to capture noteworthy events from a back-end system (such as an SAP inventory management system) and releases the data (such as a ship date) into an activity stream that a salesperson will read—all in near real time. This bypasses the batch-process reporting process that
Major Enterprise Communicators:Lotus is a collaboration solution from IBM that
provides rich chat (IM, audio, video), online meetings, and group collaborations
Enterprise Collaboration Platform enables teams and knowledge workers to quickly and securely create, share, and scale content and expertise. Companies can invite their customers to participate and collaborate.
A software platform developed by Microsoft for collaboration and web publishing combined under a
single server. It has capabilities for developing web sites, portals, intranets, CMS and BI tools.
Founded in Dec 2007, Yammer is a Twitter like tool for improving workplace communication
Chatter is a real time cloud based collaboration tool for enterprises that enables employees to share the status of
important projects and deals instantly.
IBM’sLotus
Cisco’s ECP
Yammer
Microsoft Sharepoint
Salesforce Chatter
COLLABORATION | INSIGHT
3 1F E B R U A R Y 2 0 1 1 | ITNEXT
traditionally would have been used to present this information.
People who need peopleTwo standards are emerging to manage the tension between widespread partici-pation and the need for corporate data control. To be clear, these specifications are still piping hot from the forge.
One specification is ActivityStreams, an effort to enrich data feeds between social platforms by standardizing the format used to exchange information. In the consumer world, this means making it easier for platforms such as Foursquare to exchange status, comments, bookmarks and news with other sites such as Identi.ca. The specification has been unevenly adopted among enterprise social media tools, but it’s useful as an indication of the work needed to ease information sharing between platforms.
OStatus, is another open specification for distributing status updates between different social networks. The goal is to enable disparate social media hubs to route status updates between users in near real time. As is typical of the social media space, both of these specifications are at version 1.0.
Further, some of the security protocols that enable social systems to talk with one another and the back-end systems are also fresh from the oven, including OAuth (tinyurl.com/26y9lh8). Thus, IT managers who lean heavily on standards when making technology decisions could get left behind when it comes to implementing social media projects.
Securing the socialitesAs the consumerization of enterprise social collaboration pushes forward, the commercial-grade social platforms distinguish themselves from consumer platforms by wrapping security policies that protect corporate secrets around the activity stream. For IT managers, this means that some of the most basic infrastructure— including the directo-ries that hold authoritative data about employees and contractors—must be in order for a social collaboration project to succeed.
Almost as important is directory information, which is essential for populating user profile data. In a nod to the importance of easing employee adoption through simple profile creation, Salesforce.com’s Chatter recently gained the ability to pull in a user’s Facebook profile information.
After ensuring that the IT basics are up to snuff, IT managers who are considering a social media integration project must consider the security technology used by each of the platforms. According to Sean Whiteley, senior vice president of product marketing at Salesforce.com, the Chatter platform explicitly prohibits OpenID as a user authentication method at this time, although he thinks the standard is a good one for consumer and “prosumer” applications.
Conversely, Matt Wilkinson, the vice president of products at Socialcast, said that OpenID is used by Reach, Socialcast’s flagship microblogging tool.
Related to the authentication methods used to govern who and what has access to the activity stream is the question of single sign-on. IT managers should take care to ensure that any social media platform they consider has support for the single sign-on solution already used in the organization.
One of the best ways to prevent a social media platform from being orphaned is to ensure that users can easily access the activity stream with-out being burdened with another set of credentials.
THE COMMERCIAL-GRADE SOCIAL PLATFORMS DISTINGUISH THEMSELVES FROM CONSUMER PLATFORMS BY WRAPPING SECURITY POLICIES THAT PROTECT CORPORATE SECRETS AROUND THE ACTIVITY STREAM
0
500
1000
1500
2000
ENTERPRISE SPENDING IN SOCIAL NETWORKING (IN US $MILLION)
of all the marketers who use social media said it generates
more exposure for their business
81%Source: Social Media Marketing Industry Report, 2009
2010 2011
YEAR
2012 2013
199715141063701
INSIGHT | COLLABORATION
3 2 ITNEXT | F E B R U A R Y 2 0 1 1
INTERVIEW | DIDIER JAUBERT
3 4 ITNEXT | F E B R U A R Y 2 0 1 1
Interview.indd 34 1/31/2011 6:22:55 PM
DIDIER JAUBERT | INTERVIEW
3 5F E B R U A R Y 2 0 1 1 | ITNEXT
“STITCHING A COMPREHENSIVE CLOUD”
You have announced a host of ‘as a service’
offerings like UC, backup, etc. What are the USPs, and how will enterprises benefit from them?Some of our solutions are pack-aged and based on a shared infrastructure to better address SMEs, while others can be highly customised and fully use dedi-cated infrastructure to suit large enterprises. But, for all our cloud computing solutions, we aim to provide two major benefits: per-formance and security. The USPs common to our entire cloud com-puting portfolio that enable us to provide these benefits are:n Our extensive private network coverage worldwide allows cus-tomers to access cloud computing services via their intranet from the highest number of locations;n Our ability to provide secure solutions and end-to-end perfor-mance SLAs when we provide both the private network and the cloud computing services;
n Our strong and efficient opera-tions. We have strong manage-ment processes and expertise, including the management of security solutions, and data cen-tres worldwide. Our customers can be sure of dealing with a sin-gle point of contact, available 24x7, who will provide a consistent level of support globally. We also have years of expertise and the highest certifications testifying that our people, data centres and processes abide by the strictest standards. The France Telecom-Orange group is a serious and stable com-pany that will partner its custom-ers for the long-term.
One innovation from Orange Business Services is the Busi-ness VPN Galerie. How does it actually work? How do you intend to get other service pro-viders on board?Each application supplier is con-nected via a dedicated line to Orange, which then distributes the applications on demand, mak-
ing it a seamless part of the cus-tomer’s VPN.
With Galerie, cloud services providers can deliver their appli-cations in a cloud mode to achieve an outstanding customer expe-rience. This provide them the capability to focus on their core business, while Orange manages the connection complexity in totality. As a hub, Business VPN Galerie also provides a simpler and more cost-effective solution to deliver cloud services than ded-icated lines. In a nutshell, Galerie allows cloud providers to deliver better customer experience to the customer base. Given our mar-ket share in the French business market, and among international large accounts, we are confident we’ll convince them.
We are in negotiation with a top IT partner for the French and international markets for collab-orative applications (email, doc sharing), business applications (CRM, finance, HR) and produc-tivity applications.
He prefers the term ‘IT Operator’ and says Orange Business Services is not just a company providing cloud-based services. Didier Jaubert, VP-Global Services, in a conversation with Shashwat DC says what sets Orange apart from the crowd is that it is a cloud aggregator and an end-to-end cloud service provider.
Interview.indd 35 1/31/2011 6:23:00 PM
INTERVIEW | DIDIER JAUBERT
3 6 ITNEXT | F E B R U A R Y 2 0 1 1
“WE ARE CURRENTLY INVESTING IN BUILDING UP AN INTEGRATED SALES ENGINE THAT IS TARGETTED TO REACH OUT ACROSS DIFFERET VERTICALS AND POSITIONS”
Can you describe your part-nership with Microsoft and the service offering for unified communication? How does it solve the collaboration issues faced by companies?For more than 15 years, Orange Business Services (OBS) and Microsoft have offered messag-ing and collaboration solutions to global enterprises. I would like to point one specific point that, by combining Orange consulting, inte-gration and managed services with products from Microsoft, we imple-ment messaging, unified com-munications and cloud solutions that enable better collaboration, security, operational efficiency and productivity through a single global point of contact. Together with Microsoft, we are committed to developing and delivering the next generation of unified commu-nications and collaboration tools, accelerating the way companies conduct business.
Orange Business Services continues to enhance its unified communications and collaboration services based on the latest versions of Microsoft Exchange, SharePoint and Lync 2010, as well as Microsoft Online Services (now known as Office 365). Microsoft recognises Orange Business Services as a leader in providing enterprise-ready unified communications solutions based on global network reach, flexible hosting capabilities and a Microsoft Gold Certified Partner status.
Our unified communica-tions solution helps businesses work smarter across locations and time zones. An employee can seamlessly collaborate with another person on a project or sale, even if the two users are in separate locations. The user can quickly locate the right person based on skill or loca-tion through their UC client. Subsequently, through pres-
ence, determine the person’s availability and the best way to reach them. Then, the user could engage in an instant messaging (IM) session, saving time and voice calling costs. The IM ses-sion can be escalated to a voice call or even a conference with a third person—all within sec-onds. This solves the major collaboration issues facing com-panies—finding the right person at the right time to avoid human delay in business processes.
By using this solution, an enterprise will find productiv-ity increasing, improvement in business processes and saving on costs.
One of the hardest tasks for an IT manager is to convince
the boss about the ROI from moving to the cloud. Do you provide any tools to help them?We have a well-practiced meth-odology for determining likely cloud ROI, but our experience has taught us several things:n Except for very simple situa-tions, which there are very few, all clients are different. The exist-
Interview.indd 36 1/31/2011 6:23:03 PM
DIDIER JAUBERT | INTERVIEW
3 7F E B R U A R Y 2 0 1 1 | ITNEXT
ing IT portfolio and cost base tends to be unique. So, the solu-tion will also be unique in terms of applications, users, geography, timing, etc.n Not everything can be ‘clouded’ yet either—it’s an extra tool but unlikely to be the sole basis for a future IT solution. Therefore the ROI case for any individual cus-tomer is also likely to be unique and require considerable effort to define. This is why we have defined several useful consult-ing modules: the Cloud-Ready Assessment and the Cloud Busi-ness Model and SLA.
Considering your small foot-print in India, how do you plan to reach enterprises with your offerings?
We have a significant focus, investment, and footprint in India. OBS currently employs over 2,000 people in India, across various functions. We are also uniquely positioned in the Indian enterprise marketplace: the abil-ity to provide transport, access and connectivity solutions to Indian and global MNCs; as well as fulfil their needs in the areas of systems integration, unified com-munication solutions, and remote infrastructure management ser-vices. We are currently investing in building an integrated sales engine that is targeted to reach different verticals. We are also strengthening our partnerships with OEMs, telco operators, and SI companies to effectively address joint GTM activities.
Enterprises are still con-cerned about where their data is stored. How do you address that?Sensitivity over data centre location stems from three main considerations:n Data placement, as you cor-rectly point out. Country, regional (e.g. EU) and sector regulatory and data privacy requirements vary widely;n Application performance—some applications are very latency sensitive;n Cultural—organisations will often have strong preferences anyway, whether there are strong regulatory requirements or not.
First, our cloud strategy will be based on a small number of hubs, where we will invest in cloud platforms and infrastructure for scale. In the Asia-Pacific region, the first of these is likely to be Singapore, as we already have a regional operation there, and it is geographically positioned for the maximum coverage of markets. However, we often have to fulfil
specific requirements, for which that hub will not be adequate. Our approach is to work with partners offering data centre accommoda-tion. We can bring new facilities on stream rapidly by leveraging our existing relationships.
All our data centres are managed through three global support centres, using our man-agement network infrastructure. So, it is easy to add another facil-ity. Where local physical activities are required, we can use either the services of the partner or our field operations team.
Also, we can use our portfolio of business acceleration capabili-ties to deliver applications with minimum latency, using moni-toring and analysis, compression and caching to the network edge, to minimise the situations in which local data centre capacity is needed for technical reasons.
There are many companies offering cloud-based ser-vices. What distinguishes you from the rest? We have tried to find a concise way of describing our value, and we favour the expression ‘IT Operator’. Our differentiation can be summarised in two points: cloud aggregator and end-to-end cloud service provider. Not everything can be ‘clouded’ yet either—it’s an extra tool but unlikely to be the sole basis for a future IT solution. Therefore the ROI case for any individual customer is also likely to be unique and require considerable effort to define. Our ambition is to make it easy for customers to access the IT resources they need, by providing a one-stop-shop to a range to our services and those from selected partners. By taking an integrated approach, we can deliver business applications and IT infrastructure-as-a-service with an end-to-end service level agreement consulting.
Find other inter-views online on
the website www.itnext.
in/resources/interviews
Interview.indd 37 1/31/2011 6:23:06 PM
RHEL 6 HANDLES PHYSICAL
AND VIRTUAL
WORKLOADSThe latest Linux-based OS from Red Hat offers a strong
foundation for hosting virtual workloads, complete with distinctive capabilities such as security
features rooted in SE Linux.BY JASON BROOKS
INSIGHT | REVIEW
3 8 ITNEXT | F E B R U A R Y 2 0 1 1
Insight_RHEL.indd 38 2/1/2011 5:26:57 PM
IL
LU
ST
RA
TI
ON
: PH
OT
OS
.CO
M
Red Hat Enterprise Linux 6, the latest version of Red Hat’s flagship Linux-based operating system, began shipping December 2010,
boasting a bevy of core improvements around scalability, resource management and virtualization. What’s more, the sys-tem ships with a slate of updated open-source software components that stand to make life easier for developers and system administrators who wish to take advan-tage of recent features without leaving Red Hat’s support and certification umbrella to do so.
Red Hat Enterprise Linux has long been a trusty go-to operating system option for most server roles, if not in its official Red Hat branded form, then in one of its respun incarnations, such as the fee-free CentOS or the Oracle rebrand Unbreakable Linux. Based on my tests of RHEL 6, I expect this new release to continue in that tradition—the new release performed as solidly as ever, and benefits from a support term that’s been lengthened from seven to 10 years.
At sites that rely on Xen for virtualization, or that wish to host .NET applications from Linux, Novell’s SUSE Linux Enterprise Server will offer a better fit, as Red Hat has transitioned completely away from Xen support in RHEL 6 and has consistently turned a cold shoulder to Mono, the open-source implementation of Microsoft’s .NET. Mono is, however, available through the volunteer-based Extra Packages for Enterprise Linux project that rebuilds certain software packages from Fedora for use (albeit unsupported) with RHEL.
Also, while RHEL offers a strong foundation for hosting virtual workloads, complete with distinctive capabilities such as security features rooted in SELinux, it doesn’t, on its own, offer as well-integrated a virtualization management experience as do purpose-built virtualization products such as VMware’s vSphere. However, I’ve yet to try Red Hat’s separate virtualization management product, which has remained uncharacteristically proprietary in its licensing pending the completion of an effort to port the
application to Java from C+.While aimed primarily at server
roles, RHEL 6 can also perform well as a desktop operating system, as it ships with recent versions of all of the usual suspects of the Linux desktop, anchored by Version 3.2 of the OpenOffice.org productivity suite and Version 3.6 of Mozilla’s Firefox Web browser. RHEL
includes fewer software packages than do some of its less buttoned-down Linux relations, but the EPEL repository I mentioned can fill some of these gaps in a desktop setting.
Red Hat has shifted its pricing around a bit for RHEL 6, most notably by increasing the starting cost of a supported edition of the product from $349 per year to $799 per year. Red Hat still offers a $349 edition of the product, but that edition is now “self-supported”. The Production Support SLA page on Red Hat’s Website still lists the “basic” support tier alongside the standard and premium tiers, but Red Hat doesn’t offer any RHEL SKUs with basic support, nor is basic support available on its own.
RHEL 6 is sold by annual subscription, on a per socket pair basis. An x86-64 server with two physical sockets running RHEL 6 will cost $799 annually with standard support, and $1,299 with premium support, each with an allowance for one virtualized RHEL guest instance. Red Hat also sells editions with allowances for four guests, and for unlimited guests. Red Hat charges separately for “Add-on Functionality” such as high availability, load balancing and scalable file system support. The Power architecture and IBM System z editions of RHEL 6 are priced separately.
I tested the 64-bit version of RHEL 6 on a dual-core AMD tower server with 4GB of RAM, which I used as a virtualization host, and on a handful of guests running on that machine. I also tested RHEL 6 on a Lenovo ThinkPad, which I used as a desktop system.
In all cases, RHEL 6 was easy to install—on my server machine, I was able to choose a “virtualization host” option from one of the installer screens, which took care of installing everything I needed for the headless host role I had in mind for that machine. I’ve looked for a similar option in my recent tests of RHEL’s freely available sibling, Fedora, and haven’t found it.
From my test client system, I used RHEL’s virt-manager tool to connect to my host machine over an ssh tunnel and begin installing some guests instances.
A highly optimized application
platform for large-scale,
centrally managed enterprise
deployments.
Enhanced efficiency with the
latest generation of highly
scalable hardware systems.
Industry-leading virtualization
performance, flexibility and
security for both host and guest
environments.
Extensive support for features
designed to minimize ecological
impact and carbon footprint of
IT systems.
A platform suitable for long-
term, stable deployment
while able to incorporate new
technologies for physical, virtual
and cloud deployments.
KEY FEATURES
“RED HAT HAS TRANSITIONED COMPLETELY AWAY FROM XEN SUPPORT IN RHEL 6 AND HAS CONSISTENTLY TURNED A COLD SHOULDER TO MONO, THE OPEN-SOURCE IMPLEMENTATION OF MICROSOFT’S .NET.”
REVIEW | INSIGHT
3 9F E B R U A R Y 2 0 1 1 | ITNEXT
Insight_RHEL.indd 39 2/1/2011 5:27:01 PM
For storage, I stuck to the local disks on my test server—I could use RHEL’s regular storage tools to hook up to some shared storage, but the process for this is far from the point and click matter it is with VMware’s tools. Fortunately, RHEL 6 benefits from excellent documentation.
I hit my first snag after I’d installed a RHEL guest on my virtualization host and set about registering with Red Hat Network to pull down additional software and updates. I didn’t have enough unused RHN entitlements to give my guest its own entitlement, and RHN, apparently, wasn’t recognizing my guest as a guest.
After more searching than should have been necessary, I found that I had to install a pair of “rhn-virtualization” packages on my host to make the RHN link work. I’d like to see these included among the packages installed through the virtualization host install option. These are the sorts of entitlement-related annoyances that make the freely available CentOS such a great option for testing out (if you’re able to self-support, deploying) Red Hat technologies.
I outfitted my guest instance as a Mediawiki server, tapping the newly updated PHP 5.3, MySQL 5.1 and Apache 2.2. The current version of Mediawiki will run under the PHP 5.1 version that ships with RHEL 5 but recommends Version 5.2 of higher. My guest server performed as expected, so I turned toward testing some of RHEL’s resource management options, starting with the product’s new support for Control Groups (cgroups), a means of grouping particular processes together and applying resource limits to them.
I created a control group to contain the libvirt daemon that manages virtual instances on RHEL 6 to ensure that virtual instances never consumed more than 3.5GB of the RAM on my host machine to guard against making my host inaccessible by committing too much RAM for my guests. To make things work, I cloned my guest instance
several times, committing a good 2GB beyond the amount of RAM available on my server, and what I found that the guests stuck to their overall physical memory allotment, rather than turning to swap space for their overall needs above that amount.
This arrangement also gave me a good opportunity to check out the RHEL 6 implementation of Linux’s Kernel Samepage Merging, a sort of deduplication for memory. The KSM service in RHEL 6 is switched off by default, with a separate tuning service running to activate KSM if needed. My guest cloning activity triggered KSM, and I watched as the tally of memory pages shared among my guests grew. In future tests, I’ll be interested to see how KSM performs with a greater diversity of guest instance types.
“WHILE RHEL OFFERS A STRONG FOUNDATION FOR HOSTING VIRTUAL WORKLOADS, IT DOESN’T, ON ITS OWN, OFFER AS WELL-INTEGRATED A VIRTUALIZATION MANAGEMENT EXPERIENCE AS DO PURPOSE-BUILT VIRTUALIZATION PRODUCTS SUCH AS VMWARE’S VSPHERE”
RHEL 6 benefits from excellent documentation
The KSM service in RHEL 6 is switched off by default, with a separate tuning service running to activate KSM if needed
INSIGHT | REVIEW
4 0 ITNEXT | F E B R U A R Y 2 0 1 1
Insight_RHEL.indd 40 2/1/2011 5:27:03 PM
4 1F E B R U A R Y 2 0 1 1 | ITNEXT
Leadership Cyberlaw & order THIS PAGE
Healthy Habits Exercises in the office PAGE 42
Strategy Seven steps for outsourcing PAGE 45
Training Calendar Career booster courses PAGE 46
IT laws are often ignored by the best of IT managers. It does not matter whether you are head-ing IT for a large or small cor-porate house: in this day and
age, an IT manager can ignore this area only at his or her peril. IT has evolved over time, and along with that there has been an increase in risks, threats and associated crimes. In such a scenario, while IT managers need not be lawyers, they must be aware of the multidisci-plinary approach that cyber law has adopted over time.
Let us consider some common e-crimes that can be committed by employees (including IT personnel) and outsiders involving your organisation and how you could possibly tackle and deal with such instances. In SMEs, the IT manager is generally the custodian of data. In such organisations, the IT manager also has access, direct or indirect, to most of the organisation’s confidential data, whether financials, marketing plans, business strategies, etc. As part of their daily routine, it is not unusual for IT managers in such organisations to devote more time to helping users and business heads with their daily IT-related problems. But, sadly, with all this routine work, security is generally put on the backburner and, as a result, an employee’s handling of the
TRAININGEDUCATIONWORKPLACE
COMPENSATIONWORKFORCE TRENDS
SKILLS DEVELOPMENTPERSONAL DEVELOPMENT
COPING WITH BACK PAIN
PAGE 42
LEADERSHIP
CYBER LAW AND ORDERA thorough knowledge of cyber laws is essential for IT managers responsible
for safeguarding enterprise assets
15MINUTEM A N A G E R
BY BERJES ERIC SHROFF
IL
LU
ST
RA
TI
ON
: PH
OT
OS
.CO
M
15-MINUTE MANAGER
4 2 ITNEXT | F E B R U A R Y 2 0 1 1
PH
OT
OG
RA
PH
Y: P
HO
TO
S.C
OM
Suffering from back-ache, stiff neck or sore
shoulders. Here are some stretching and warm
up exercises you can do at the office that hardly
take much time but help you stay fit:
Upper Body Stretches: Sit firmly on the
edge of your chair, gripping its back. Straight-
en your arms, and then, keeping your back
straight, let your upper body pull you forward
to stretch your shoulders, upper back and
chest. Repeat a few times.
Shoulders and Back Stretch: Sit erect
with your hands clasped behind your head.
Now, gently pull your elbows as far back as
you can, then hold them firmly in position.
Repeat a few times.
Leg Stretches: Sit and grip the seat of your
chair and raise one leg while you flex your foot.
Slowly move the leg outward and then back
toward the center and down. As you stretch,
straighten your shoulders and relax your neck
and hands. Hold each stretch for 15 seconds to
a minute then repeat with the other leg. Raise
the number of repetitions as you progress.
Spinal Stretches: Sit on your chair with
your spine erect and both feet flat on the
floor. Pretend there is a cord attached to the
crown of your head gently tugging you up. Di-
rect your gaze in front of your nose then bring
your hand to your chin. Now gently press
your chin in to your neck. Do 4 or more sets.
Ear to shoulder exercises: Sit on your
chair with your spine erect and both feet
flat on the floor. Now, inhale deeply. As you
exhale, slowly roll your left ear towards your
left shoulder.
Austrian researchers found
that the group listening to
relaxing music reported 40
percent less pain than those
given the silent treatment.
EXERCISES IN THE OFFICEHEALTHY HABITS
IT systems may lead to a breach of some IT law.
Above all, in such organisations, the IT manager’s PC/laptop is usually never audited. He is often deemed omnipotent. To make matters worse, some SMEs rely totally on IT support through a vendor, and the vendor’s engineer is based on the premises to administer the network and assist the users. It appears that his role requires him to have full access to all the company’s data.
In such an instance, IT managers have the potential to damage or steal data. But do they always get away with it? As IT personnel we may perhaps not realise the ‘value’ of the data, or be unaware of the ‘laws’ related to deleting, gaining unlawful access or stealing data, nonetheless, damage and theft of company data for personal gains can definitely land us behind bars.
The latest well-known case is that of Edwin Vega Jr., an IT manager with the Consuegra Law Firm in Tampa–Florida, who deleted files from a computer that belonged to the human resources manager. Edwin Vega Jr. was sentenced to 18 months in prison for this act. An IT Manager of another law firm was recently caught using the confidential information of the law firm’s clients, who were mainly major corporations, for insider trading.
While these are examples of actions taken by the US courts, one should not mistakenly think, that India is far behind. Nowadays, multinationals, larger Indian conglomerates and even SMEs are taking action against employees and IT managers who damage, steal or unlawfully gain access to data. My recent visits to the Cyber Cells in Mumbai and Pune were eye-openers—a number of small companies have lodged complaints against their employees and even IT personnel, for actions similar to the ones cited above. In most case, in order to protect the reputation of the company, these complaints are not made public by the organisations.
In my opinion, these organisations should do the opposite as this would have a two-fold effect. Firstly, the employees (non-IT personnel) and IT
Women, aged 35 to 50, spend a lot of time on social networking sites, finds a poll conducted by a UK-based firm Deep Pain.
FACTS
78 per cent are in agony because they
spend too long sitting at a desk or on the Net. Nearly one in five, endures backache
every day, reports The Daily Express.
15-MINUTE MANAGER
4 3F E B R U A R Y 2 0 1 1 | ITNEXT
personnel would become aware that one cannot get away by committing acts of theft, damage and unlawful access to data. Secondly, the external stakeholders of an organisation, be it customers, business partners or shareholders, would realise and appreciate the fact that the organisation is serious and taking action against erring employees. From an IT personnel
perspective, earlier such acts would be simply considered unethical and the matter might have been overlooked. But not anymore. The law is catching up and culprits are being booked.
To aid the prosecution process, the IT manager should carefully retain security and audit logs and any other evidence. The executive management of an organisation, irrespective of the
size of the organisation, should ensure that the IT manager is maintaining and retaining the logs as required. If the executive management fails to evince interest in this area, the doors may be wide open for IT personnel to commit such transgressions.
Turning our attention to the threats posed by outsiders, how can the IT manager help his/her organisation book people who damage the reputation of the organisation through electronic means, be it through hacking, spreading defaming or false messages or through other electronic means such as SMS (text messages) using mobile phones. Phishing emails, received in the name of banks and other websites have become commonplace: these try to con people into revealing usernames, passwords and personal and credit card information. What about the numerous emails regarding false job offers? Sadly,
TO AID THE PROSECUTION PROCESS, THE IT MANAGERS SHOULD CAREFULLY RETAIN SECURITY AND AUDIT LOGS AND ANY OTHER EVIDENCE.
“Mobile growth has opened new avenues for attacks, especially on new networked platforms with personal data attached.” — Jose Nazario, Sr. Manager, Security Research, Arbor Networks
“Wikileaks would force organisations to act better. Now they know that their own employees will expose them if there is corruption”— Mikko H Hypponen, Chief Research Officer, F-Secure
TOP EXPLOITS OF THIS ERATop exploits representing different
eras of cybercrime:
1) “I LOVE YOU” Worm’s False Affec-
tion: Estimated damage $15 billion
This infamous worm cost companies
and government agencies $15 billion to
shut down their computers and remove
the infection.
2) MyDoom’s Mass Infection: Estimat-
ed damage $38 billion
This fast-moving worm first struck in
2004. Due to all the spam it sent, it
slowed down global Internet access by
10% and reduced access to some web-
sites by 50%, causing billions in dollars
of lost productivity and online sales.
3) Conficker’s Stealthy Destruction:
Estimated damage $9.1 billion This
2007 worm infected millions of com-
puters and was designed to download
and install malware from sites control-
led by the virus writers.
15-MINUTE MANAGER
4 4 ITNEXT | F E B R U A R Y 2 0 1 1
With the iPad gaining popularity in the enterprise, here are 5 must-have business
applications for the iPad.
BOX.NET: This application helps break down all traditional barriers between
you and the elusive content. You need not worry whether you are at work or
not, behind a firewall or not, what OS are you on, one can access content anywhere,
anytime as needed. The application helps you leverage the best of CCM (Cloud
content management) whether you have the right desktop applications to view docu-
ments, spreadsheets, images and other types of content.
GOTOMEETING: The best of things in life are free. So is the application
that can keep you virtually at work even if you are absent physically. With
GoToMeeting all you need do is TAP to attend online meetings. Also, through the
application you can view slide presentations, design mockups, spreadsheets, reports –
whatever meeting presenters choose to share on-screen. Get started for free.
DRAGON DICTATION: We all have used umpteen voice recognition ap-
plications for Windows PCs. There’s one for the iPad as well, powered by
Dragon Naturally Speaking. It allows you to easily speak and instantly dictate
small text or lengthy email messages.
DESKTOP CONNECT: A desktop viewer that allows you to view and control
Windows, Mac OSX and Linux computers as if you were sitting in front of them, or
observe others as if you were watching over their shoulder. Get started at Rs 675.
KEYNOTE: While this presentation application for the Mac needs to be
redesigned to suit the iPad’s requirements. The application has retained its
basic feature to help you build an appealing presentation, complete with animated
charts and transitions. One could use Apple-designed themes, custom graphic
styles, and animations and effects to add glitter to the presentations. The applica-
tion is also PowerPoint compatible. Get started at Rs. 450.
-— Compiled by Anoop Chugh
very few organisations are taking any action against such violators. Most are turning a Nelson’s eye to such acts.
The Cyber Cells set up in India are there to help in this regard. However, before approaching them, it is advisable that IT managers do some groundwork and investigation on their own. For example, in the case of emails luring the public with job offers that do not exist, the IT manager should first try and trace the origin of the email. Of course, one needs to be able to analyse the header of the emails to do this. This would speed up matters and make it easier to take the case to the Cyber Cell.
Approaching legal representatives, be they internal or external lawyers, and seeking their help to take such issues to the Cyber Cell would definitely be advantageous and beneficial. The IT Act 2000 depends on the IPC (Indian Penal Code) and this is where a lawyer or legal representative will add value in convincing the Cyber Cell to take action.
Of course, in such instances, the IT manager must think on his feet and ensure that the recipient of any defaming or false emails does not delete the original email. This would be disastrous, as invaluable evidence would be destroyed.
An IT manager must also be aware of the laws and cases cited under the IT Act 2000, including Cyber Squatting of domain names, intellectual property, copyright law, trademark law, data protection and privacy laws, among other things. Although most would be tackled by the legal representatives of the company, the IT manager can add value with his knowledge of such issues.
So where does the buck stop for the IT manager? It would be worthwhile to either take up a course on cyber laws or to educate yourself by reading books on cyber laws and the IT Act 2000. This will definitely add value both to the manager and the organisation.
The author is the head of IT for Tata Services and is responsible for IT security of the head office of the group.
5 BUSINESS APPS FOR THE IPAD
FASTER & STRONGER
1
2
3
4
5
15-MINUTE MANAGER
4 5F E B R U A R Y 2 0 1 1 | ITNEXT
Suggestions to help make certain that your next outsourcing project will be successful. BY DAVID STROM
Outsourcing isn’t new, but, by now, many IT shops have accumulated enough experience to use this service more
effectively. According to Houston-based consultancy TPI, even though the overall outsourcing market is down 13 percent from last year, growth remains strong for U.S.-based contracts.
Certainly, the cost-saving motivation is still significant: The cost for programmers and support services overseas can be less than half of what their domestic equivalents can be.
Nevertheless, to achieve those savings, you have to know how to work with the outsourcing vendor.
We spoke with several managers who have used outsourcers to build and augment their systems, and we came away with seven suggestions to help ensure that your next outsourcing contact—and contract—will be successful.1. Make sure there is a strong cultural fit between your two organizations. This involves both the country of origin of the outsourcer and your own corpo-rate culture. “The Dutch are very direct
at telling you when you have done something wrong, but in India, that can backfire and shut things down imme-diately” says Scott McDonald, the CTO of FCI USA, a manufacturing company with French headquarters that has used a number of outsourcers all over the world.
“The French like to have a lot more interaction than we do, and in Asia they like more structure and to understand the various components of a process. We hired an external consulting firm to help us understand the differences among the various cultures and how we operate.”
Google calls this culture fit “Googleyness,” offering “an environment that inspires original thinking, encourages people to take the initiative, is guided by data and user experience, has a flat management hierarchy, and is willing to take risks and be innovative,” says Patrick Chanezon, a Google developer relations manager in charge of outsourcing initiatives, who has worked with Globant in Argentina.
“We interviewed Globant as if they were going to be hired by Google internally,” says Chanezon. “We tried
7 STEPS TO OUTSOURCING
STRATEGY
IL
LU
ST
RA
TI
ON
: PH
OT
OS
.CO
M
15-MINUTE MANAGER
4 6 ITNEXT | F E B R U A R Y 2 0 1 1
to understand not just if they had the right knowledge level, but also how they worked—such as their use of agile programming methodologies and if they knew how to do appropriate software testing. We wanted an outsourcer that works on open-source projects in their daily practice.”2. Top-to-top commitment. Senior-level management at both organizations should meet regularly and understand what success means in each other’s terms. “We have a joint innovation council with the CTO of Xerox and our management,” says Kim Kehling, the director of global business services for Procter & Gamble (P&G), who manages an outsourcing relationship with Xerox. “We meet quarterly to review our business needs and look each other in the face. We review our key projects and any outstanding opera-tional issues together.”
Just because your top execs meet, don’t expect them to be mind readers. “Don’t expect that your outsourcer has intimate business knowledge about your own operations,” says FCI USA’s McDonald. Spell it out in terms they can understand.3. One plan, one goal. Make sure that your outsourcer has the same mea-surements for success that you do. And make these assessments honestly and with full disclosure. Be open with the outsourcer if the arrangement isn’t working out, and figure out what is needed to fix things.
“The quality of the software code that our outsourcer produces depends greatly on the quality of the specs and requirements that we supply to them,” says McDonald. “We began by being much too casual about the requirements, and we suffered as a result. If you don’t have clear specs, you aren’t going to get good code.”4. Putting the right work with the right partners. “When we first started outsourcing, we thought we’d have one partner for everything we outsourced, but we learned that wasn’t a recipe for success,” says P&G’s Kehling. “Now we find a best-in-class provider for a partic-ular project—facilities is different from
PROGRAMME VENUE DATES
Managing IT Projects IIM Ahmedabad 07-11 Feb’ 11
Enhancing Managerial
Effectiveness
Fore School of
Management 09-11 Feb’ 11
Operations Strategy IIM Kozhikode 10-11 Feb’11
Strategic Thinking XLRI Jamshedpur 14-15 Feb’11
Enhancing Sales Force
Performance IIM Ahmedabad 14-17 Feb’ 11
Advanced Analytics for
Management IIM Ahmedabad 21 - 25 Feb’11
Entrepreneurial Skills Fore School of
Management 21-23 Feb’ 11
Personal Growth through Self
Exploration IIM Lucknow 14-18 Feb’11
Effective Communication for
Managers IIM Indore 07 - 11March’ 11
Strategic IT Outsourcing IIM Ahmedabad 14-17March’11
TRAINING CALENDARCareer booster courses for you!
15-MINUTE MANAGER
4 7F E B R U A R Y 2 0 1 1 | ITNEXT
print management and so forth—and hire our outsourcer accordingly.”
Part of this effort involves rightsizing your outsourcing needs, which means making adjustments when it’s time to add or subtract resources as your business grows or contracts. “We wanted a more flexible solution than Oracle on Demand offered us,” says Larry Campbell, vice president of information management and technology for Development Alternatives Inc., DAI has used Navisite for its outsourced hosted Oracle applications and Virtustream for outsourced data center business-continuity purposes. The company picked Navisite and initially cut its costs in half.
Part of rightsizing is understanding what your actual needs are—whether you are outsourcing your infrastructure or your technical skills. “Some managers find it difficult to delegate anything to somebody down the hall, let alone in another state or overseas,” says Campbell. “These probably aren’t the right people to manage projects, especially projects that use outsourced offshore technical resources.
“Outsourcing a custom application development project, for example, can be challenging. You need clear instructions throughout, and you must have developers with more than just the ability to code.
“We have found that DBAs [database administrators] and consultants who support our Oracle EBS [E-Business
Suite] applications have worked very well when outsourced overseas. I believe it’s the result of the defined set of tasks required to support those systems and technologies. When we need creativity and flexibility, that’s when we run into problems.” 5. Allow your outsourcer to fail
often and quickly. Part of this process involves putting in place checkpoints that are frequent enough to evaluate progress, and ensuring that the out-sourcing team is on the right track. “Make sure you can learn from your failures, too,” says Google’s Chanezon.
“When we were building the test for our Checkout API with Globant, they could have done a very lengthy design process of a few months. Instead, we had daily discussions, and it took them just a week to put together a basic prototype of the testing framework that we could build every day. When P&G hired Xerox to manage its enterprise printers, Xerox was in the process of building its Enterprise Print Services management tool so that any employee could print a document to any printer across the enterprise. “Xerox assumed that all our printers had to be on the same physical network, but we pushed them to make their tool work across multiple networks,” says Kehling. Since implementing this tool, P&G has printed 8 million fewer pages and cut costs by 21 percent by replacing desktop printers with more efficient workgroup printers.
DAI also has frequent checkpoints with its outsourcer, Navisite. “My team does weekly status meetings with them to make sure that the right things are happening, and there are daily e-mails and phone calls,” says Campbell.6. Find the win-win. “We have to make the entire pie bigger, but not at the expense of my outsourcing partner,” says P&G’s Kehling”7. Is the A-team in place? Do you have your best people managing the out-sourcer, and do they have the outsourcer’s best team working on your project? “Four years ago, we had some issues with our outsourcer,” says FCI USA’s McDonald. “They were losing about a third of the team supporting us each year.
“We couldn’t attract and keep the talent. We kept 10 or so from the beginning, but the rest of the organization was turning over rapidly. We couldn’t develop them quickly enough, and, by the time we finally did, they would leave and go elsewhere.”
“Outsourcing is like keeping a part of your organisation in another body, and a mismatch could lead to failure”— S ilango, Sr. Manager, Aditya Birla Group
Short term Reduction in costs (e.g. through factor arbitrage) Acceleration of outsourcing scope, func-tions and geography
Long term Increase in speed of innovation (e.g. number of new products per year) Reduction in time-to-market (e.g. new product development/enhancement cycle time)
Reduction in time-to-volume (e.g. project cycle time for increasing capacity within and across markets)
Reduction in hurdle rate or opportunity cost of capital demanded by shareholders gained through:
- Increased focus on strategic activities lead-ing to sustainable competitive advantage
- Shifting of risks of a function from the service provider when the function is outsourced
Enhancement of cash flows
Enhancement of shareholder
valueAcceleration of cash flows
Reduction of risk
Source: Ernst & Young
BENEFIT MEASUREMENT FRAMEWORK
CUBE CHAT | JATINDER AGGARWAL
“The thought of doing something new, innovative and the best in everything is what keeps me motivated,” says Jatinder Aggarwal, Project Manager at HCL Technologies
A staunch believer in both God and the power of good karma, Jatinder Aggarwal, Project Manager at HCL Technologies lays emphasis on making quick
decisions, even in crises situations. To him, time is one of the most precious elements of life, and ensuring delivery on schedule, a priority.
In a complex world, where chasing goals is often treated as a primary obligation, Aggarwal sees no substantial value in achieving a high without the blessings of friends and family. “Success should be measured in every aspect of life, including social respect, professional growth, friends and family. There is no excitement in holding a trophy if you are standing alone, with no family or friends in your side to celebrate that magical moment of success,” he asserts.
Measure your success
in every aspect of life,
including social respect,
professional growth,
friends and family
MY SUCESSMANTRA
BY JATINDER SINGH
It was his passion for work and good people management skills that led this Next100 winner to where he is at today. Nevertheless, the journey so far, has not been without its challenges.
“I have always come across challenges in every assignment I have done. But building an online interface for Citibank’s Trade Finance System with an OLECA System using the MQ Series in 2002-03 is the one I will always remember,” he says. Since no one in the team of 100+ associates had ever worked on the MQ Series before, and the organisation did not have the budget, to train the IT team, it was quite a big challenge to understand the technology without any help. “I read nearly five books on it, and implemented it end-to-end, starting from the requirements to making the implementation successful,” Aggarwal recalls.
KARMA AND CREATIVITY
4 8 ITNEXT | F E B R U A R Y 2 0 1 1
PH
OT
OG
RA
PH
Y:
D. R
. LO
HI
A
Among the new technologies around, cloud computing excites him. “It’s a combination of many technologies that have evolved recently. I feel over a period of time the way we use software and hardware is going to change dramatically. And concepts like HaaS and SaaS will be more popular in the future, especially for SMEs,” he predicts.
But it’s not just work that keeps him busy for hours, he also devotes an equal amount of quality time to family get-togethers and partying with friends on weekends. Going forward, this creative Project Manager intends to become an entrepreneur one day. He draws inspiration from the likes of Mukesh Ambani, Sunil Mittal, Bill Gates and Steve Jobs. Hard work, for him, is the only way to accomplishing a dream. He believes that the daily grind gets a person polished.
FACT FILE
NAME: JATINDER AGGARWAL
CURRENT DESIGNATION: PROJECT MANAGER, HCL TECHNOLOGIES
CURRENT ROLE: SERVICE DELIVERY MANAGER
EXPERTISE: MANAGING MULTIPLE PROJECTS, SETTING UP DELIVERY PROCESSES,
FAVORITE BOOK: NOT AN AVID READER, BUT LIKES ‘RICH DAD POOR DAD’ AND CHETAN BHAGAT’S BOOKS
FAVORITE QUOTES: ‘FIGHT TILL YOU DIE’, ‘BELIEVE IN THE BEST’ AND ‘LIVE LIFE KING SIZE’
WORK EXPERIENCE DEC 2010 – NOW: PROJECT MANAGER, HCL TECHNOLOGIES
2006 – 2009 PROJECT MANAGER, SAT YAM COMPUTER SERVICES LTD
2004 – 2006CONSULTANT, IBM INDIA
2000 – 2004ANALYST, CITICORP OVERSEAS SOFTWARE LTD
ACHIEVEMENTS RECEIVED NEXT100 AWARD IN 2010
RECEIVED MANY AWARDS IN CITIGROUP
WAS PART OF HIPOT (HIGHLY POTENTIAL) EMPLOYEES LIST IN POLARIS (COSL) IN 2004
“EVERY TIME I ACHIEVE ONE TARGET,I DEFINE ANOTHER TARGET FOR MYSELF
AND KEEP RAISING THE BAR”
The thought of doing something new, innovative and the best in everything keeps him motivated. “Every time I achieve one target I define another goal for myself and keep raising the bar,” he states. According to him, understanding various IT delivery models, having a clear business roadmap and excellent people management skills are the key ingredients for a successful IT Manager.
However, he doesn’t place much importance on fancy designations, or even being labelled as a CIO. “After a while, nobody actually cares whether you are the skipper or the wicketkeeper, it’s your performance on the field that counts. I am quite happy to have a no designation but more responsibilities, new challenges, and a free hand to drive the business as a mentor,” he says with candour.
4 9F E B R U A R Y 2 0 1 1 | ITNEXT
UPDATE
5 0 ITNEXT | F E B R U A R Y 2 0 1 1
Trendnet Launches Mobile 3G RouterWireless encryption feature helps protect user data
OFF THE SHELF A sneak preview of enterprise products, solutions and services
WIRELESS | Trendnet has launched its 150Mbps Mobile Wireless N Router – TEW-655BR3G, which connects to the internet either using a traditional hard wired con-nection or by cutting the cables and connect-ing with a compatible wireless mobile USB dongle from a 3G Internet service provider such as Tata, Reliance, AirTel, etc.
Designed for portability, the router has a rechargeable and replaceable 2.5 hour lithium ion battery. Compatible with USB dongles from every mobile provider, this router connects to the internet anywhere there is a 3G mobile connection.
The user can simply plug the 3G USB adapter into the router to share a single internet connection. Its wireless encryption features enable protection of user data.
Wi-Fi Protected Setup (WPS) integrates other WPS supported clients at the touch of a button. An on/off switch on the back of the devices saves battery life. For long trips, the user can power the router with Trendnet’s Car Adapter, model TA-CC.
STORAGE | Kingston Digital, the Flash
memory affiliate of Kingston Technol-
ogy Company, has announced the re-
lease of SDHC UHS-I memory cards
in the India market. These cards have
a speed of 60 MBPS
According to the company, Kingston’s
UltimateXX memory cards are ideal
for the high data users. For instance,
with the help of these cards, photog-
raphers can easily capture sequential
shots that were once a challenge due
to the speed limitations of memory.
The UltimateXX also makes it easy to
capture HD video.
The performance of SDHC UHS-I
memory card is optimized when
paired with a UHS-I device, although
the card is backwards compatible
with Class 4, 6 and 10 equipment.
“Kingston is pleased to be one of the
first manufacturers to offer SDHC
UHS-I memory cards to our custom-
ers,” said Nathan Su, Flash Memory
Sales Director, APAC Region, Kingston.
“Being a member of the SD Associa-
tion enhances our ability to bring new
technology to market,” he added.
Kingston launches memory cards
PRODUCT FEATURES
Capturing sequential shots is easier.
Kingston’s UltimateXX line meets the SD Associa-
tion standards for the UHS-I speed class with
speeds up to 60MB/sec. read and 35MB/sec. write.
The product line will offer capacities of 8GB, 16GB
and 32GB.
KEY FEATURES* Wi-Fi Protected Setup
* Anywhere connectivity to the
Internet
* 2.5 hour lithium ion battery
* Compatible with USB dongles
* Easy in operation
UPDATE
5 1F E B R U A R Y 2 0 1 1 | ITNEXT
KEY ADVANTAGES* Intel Pentium processor
T4500, supporting 45nm tech
* Storage capacity of 320 GB
* 8X DVD double layer drive
* Integrated webcam
* Integrated multi- in- one
card reader
Dell Launches Inspiron M101z Laptop
HARDWARE| VIA Technologies
and Simmtronics Semiconductors
have launched green computing
products, including the sub-
Rs10,000 SIMM PC and a wide
range of power-efficient VIA pc-1
mainboards. In addition to India,
Simmtronics will also distribute
the products through its channel
partners in a total of 15 other
countries, including Pakistan,
Bangladesh, Sri Lanka, Dubai,
UAE, Turkey, Iraq, Algeria, and
Ghana. Simmtronics is offering
a selection of energy-efficient
green motherboards featuring a
choice of VIA C7 and VIA Nano
processors. The company also
plans to introduce the forthcoming
VIA VX900E green motherboard in
the first quarter of this year
Simmtronics, VIA Unveil Budget PC
Acer Uncovers New NotebookNOTEBOOK | Acer has announced the launch of a new notebook, eMD725, under its eMachines series. As the latest offering for consumers, the new notebook is priced at Rs. 18,499.
The eMD725 is populated by the latest Intel Pentium Processor T4500, supporting 45 nm technology, with 1 GB DDR3 RAM, which can further be upgraded to 4 GB DDR3 Memory.
The 14” HD screen comes with 1366x 768 pixel resolution and a storage capacity of 320 GB hard disk along with 8X DVD-Super Multi double-layer drive. Additional features include integrated webcam for chatting and multi in one card reader.”
LAPTOP | Dell has announced the Inspiron M101z laptop, which as per the company, is the ideal on-the-go, easy-to-use lap-top PC for today’s mobile population. The new laptop can fit easily in a handbag or backpack, according to Dell.
The Inspiron M101z laptop is built around a hinge-forward design that moves the display closer and keeps the body rigid to help enhance strength and durability. It features a full-width keyboard that simplifies typing and navigation.
It is powered by AMD Athlon II Neo Mobile processors and integrated ATi graphics and achieves up to 6 hours and 36 minutes of operation with its standard 6-cell rechargeable battery.
According to Mahesh Bhalla, General Manager, Consumer & SMB, Dell India, “The ultraportable Inspiron M101z is an affordable, on-the-go companion with complete functionality and can be easily customized to handle individual needs from simple e-mailing and Web surfing to HD video playback and editing or watching a favorite TV programme.”
The Inspiron M101z is available for a price of Rs 20,900
FEATURESPowered by AMD Athlon II
Neo Mobile processors
Achieves up to 6 hours and
36 minutes of operation
The company claims that e-machines are one of the most economically priced computing device s available in the in the market presently. S. Rajendran, Chief Marketing Officer, Acer India, comments ,“Through this series, we aim to bridge the gap between the mainstream and the budget category in the value PC segment.
UPDATE
5 2 ITNEXT | F E B R U A R Y 2 0 1 1
A platform to air your views on latest developments and issues that impact you
RITIK GOEL, BUSINESS CONSULTANT, RELIANCE COMMUNICATIONSLinkedIn acted as a
catalyst to expedite my
thought process for
exploring opportunities
otherwise unknown to
me. Updating one’s profile
on Linkedin can facilitate
sharing thoughts and in-
formation with likeminded
individuals, subsequently
enhancing profes-
sional knowledge which
otherwise one would
experience only through
working in an organiza-
tion. On the downside, a
majority of professionals
use updated LinkedIn
profiles only as a medium
for job search, but this at-
titude defeats the overall
purpose of the concept.
VISHAL BISHT, CEO, MARKSMAN TECHNOLOGIESIn today’s global environ-
ment, where we are add-
ing skills, knowlege and
certifications on a contin-
uous basis, it’s extremely
important to showcase
core skills, things one has
learned and expertise
which has been gained
over a period of time. That
not only facilitates explor-
ing new career avenues,
but it also helps others
know your true potential.
Nevertheless, despite
all the advantages, one
must learn to use these
networking sites wisely.
For instance, lying about
your achievements, with
the intention of attracting
headhunters, could actu-
ally bring you more harm
than any good.
SHANTANU SINGH CHAUHAN, TECHNOLOGY EXPERT, DIRECTOR, NEW INITIATIVES AT VALUEFIRST MESSAGINGIt depends a lot upon
the way you intend to
position yourself in the
market. These network-
ing sites definitely help
talented professionals
to relate and network
with professionals they
already know. Moreover,
it also allows them to
understand the market
patterns in a better way.
However, one needs to
make a conscious effort
while crafting a profile
of himself or herself. In
the digital age, you never
know what will work and
what will not!.
Do networking sites like LinkedIn help?
OPEN DEBATE
Your views and opinion matter to us. Send us your feedback on stories and the magazine to the Editor at [email protected]
BOOK FOR YOU
Final callHow hidden fractures still threaten the world economy
STAR VALUE:
IT NEXT VERDICTAt times the writing would seem highly pes-simistic. But in today’s times, one has to be distrustful of the sudden recovery.
TITLE: FAULT LINESAUTHOR: RAGHURAM G RAJANPUBLISHER:HARPER COLLINSPRICE: RS 499
Fault Lines is another forewarning by
the economist and author – Raghuram G
Rajan on financial skeletons still hidden
in our wardrobes. The author fears that
the causes that had led to the financial
crisis of 2007 might have not been fully
addressed; hence the financial turmoil
may reappear as our tendency to take
risk clubbed with our unabashed greed
could get the better of our prudence.
It might be a momentary financial relief
but what’s the guarantee that it’s not
the proverbial calm before yet another
storm, this time much larger in its mag-
nitude. There weren’t many takers to his
warning note prophesying a financial cri-
sis in the making in early 2007. This time
around, ignore him at your own peril.
Through the book Rajan has tried to
address certain unanswered questions
such as – why are poorer developing
countries like China financing the unsus-
tainable consumption of rich countries
like the US? Why did Federal Reserve
keep rates so low for so long? Or more
importantly why did financial firms make
loans to people who had no income?
OpenDebate.indd 52 1/28/2011 9:03:32 PM
5 3F E B R U A R Y 2 0 1 1 | IT NEXT
THEBIG
Your responses count. Log on to www.itnext.in/bigQ to submit your replies. The best entry will be published in the next print edition
THE SITUATION...Manoj Dixit was studying a fresh set of MIS requirements when Vinod Bhatkar, VP–Sales and Marketing, called him in for a discussion. Bhatkar had recently been brought into this role at Samtail, the mega retail company, and entrusted with formulating its growth and expansion strategy. Manoj is one of the three IT managers at Samtail.
“I need more support from IT. I cannot build a high-growth strategy for the company with the traditional MIS reports. These don’t provide the customer information that my business managers and I need,” said a slightly irritated Bhatkar.
Going through new MIS requirements, Manoj saw where Bhatkar was coming from. “The kind of information you want will need a Business Intelligence and Analytics (BI/BA) solution. It can’t be produced out of the exist-ing ERP system,” he said.
“I’ve read about these solutions in a business magazine. I can arrange a special budget alloca-tion for it from my strategy budget. But when can we have this up and running?” asked Bhatkar.
Manoj could sense that while Bhatkar was keen on a solution, he wasn’t aware of the deployment challenges. “A BI solution is not just about the budget, the processes and databases. It is about ownership from the business manag-ers,” he tried to explain.
“I can ask my managers to provide you with the support, but it is an IT solution and so has to be driven by you... and I guess a month’s time would be adequate for its completion,” said Bhatkar concluding the discussion.
Manoj wanted to say that for a BI solution to be successful, it had to be driven by the business manager and supported by the IT manager, and not vice versa. But, somehow he felt it would be a futile discussion; Bhatkar seemed to have unrealistic expectations of a BI rollout and had the mindset that anything to do with IT, had to be done by IT.
MAHESH F. PARDESI,PROJECT MANAGER, SODEXO INDIA
SUDISH BALAN,BUSINESS DIRECTOR,TONIC MEDIA
AJAY SARTAPE, COO, IBEXIS
EXPERT PANEL
NEXT
CU
T I
T
FR
OM
HE
RE
BUSINESS INTELLIGENCE
WHO’S DRIVING IT?
THE BIG Q
5 4 IT NEXT | F E B R U A R Y 2 0 1 1
FIRST ANSWER Since Manoj is left with no options but to take the responsibility of deploying the BI solution, he must do his spadework properly. He must analyse the existing ERP thoroughly and simultaneously commence the work of implementing the BI tools by gathering the prerequisites, evaluating the different BI/BA tools available, and assessing the infrastructure changes needed in the current setup for implementing the BI solution. He must form the BI selection committee and include members from the business and IT teams. He must identify the target users and determine the usage scenar-ios, as well as prepare a proof of concept. He must also arrange for vendors to conduct demos of BI.
As regards meeting the current needs of his company’s sales and marketing department, it’s possible that the current systems are underutilised. A proper evalution of the same may show that there
are areas where the current ERP system can come to his rescue. He can seek help from the existing ERP vendor/consultant to create and develop new MIS reports to crunch more out of the ERP system. But as ERP comes with a predefined set of report formats which are generally quite rigid, this solution could be an impracticable and an expen-sive one. He could suggest to his VP that the best solution would be to wait until the implementation of the BI/BA tool which can yield benefits such as:
Accurate sensing of customers’ needs and requirements JIT (Just in Time) responsiveness to customers’ needs and demands Ability to adopt any market changes or shifts, including economic recessions Streamlined business processes which results in a cost-effective business operation Accurate business and sales forecasting
SECOND ANSWER The implementation of BI would be successful only if driven by business and sup-ported by IT. That much is quite clear. BI implementations should be driven and spon-sored by an executive who has bottom-line responsibility, has a broad picture of the enterprise objectives, strategy and goals, and knows how to translate the company’s mission into key performance indicators that will support the business intelligence strategy mission. Manoj has to convince Bhatkar that a successful BI implementation requires a coordinated effort across the dimensions of people, processes, technology and, of course, that the data and success of BI would rely on a joint effort between the business managers and IT.
THE BIG QUESTIONS...? CAN MANOJ ACHIEVE A BALANCE BETWEEN THE TIMEFRAME REQUIRED
TO PUT IN A BI SOLUTION AND PROVIDE THE INFORMATION NEEDED FOR STRATEGY PLANNING? HOW CAN HE MEET KEY INFORMATION NEEDS WHILE THE BI ROLLOUT IS COMPLETED?
? MORE IMPORTANTLY, CAN HE DELIVER A SUCCESSFUL BI IMPLEMENTATION, GIVEN THE ATTITUDE OF A BUSINESS HEAD?
HERE ARE THE ANSWERS...
MAHESH F. PARDESI
Project Manager–Global Information
Systems & Technology, Sodexo India On-site
Service Solutions
About me: A sports enthusiast, he is
also the winner of the IT Next and APC Datacenter contest.
‘A COORDINATED EFFORT’
THE BIG Q
5 5F E B R U A R Y 2 0 1 1 | IT NEXT
FIRST ANSWERManoj needs to have a detailed discussion with his VP on what BI is and what it does. From the current scenario, it seems that he has little or no idea of the benefits that accrue from BI.
What must be impressed upon Bhatkar is that BI is not a solu-tion but a process. While it is implemented by the tech team, it is driven by all. The output of the BI, that is, the report and prognosis are completely dependent on the data that is fed into the system. A lot depends on the quality of data and all stake holders concerned need to be aware of this upfront. This needs to be impressed upon Bhatkar and the earlier it is done, the better it will be.
On the other hand, Manoj need not wait till the full suite of BI is implemented but should look at ways and means of catering to the information requirements of the organisation. It is possible that the capabilities of the current systems have not been fully explored, and Manoj would do well to conduct a thorough assessment to ascertain this. Many organi-sations fall in this category.
As such, there are scores of free analytical tools available that can help him in this regard. For instance, if he is looking at online analytics, then Google Analytics can be a good tool. Similarly, there are many other tools which Manoj can use for the same.
SECOND ANSWERTo be honest, even if he attempts a full-bodied implementation of BI, he is setting himself up for failure, if the prevailing mindset does not change. As stated earlier, BI is not an IT solution or software that needs to be ported on a server and is ready to start when you press ‘go’. The criticality of BI tools cannot be overstated. It is not just a tool for diagnosis but also used for future projections. Hence, it is very important that all the people on board, and this includes people from the business side as well as IT. They should be crystal clear on what is possible, and what can be achieved.
SUDISH BALAN
Business Director, Tonic Media
About me: Is a new media professional, currently advising
brands on achieving their marketing objectives using
interactive media.
‘NOT A SOLUTION BUT A PROCESS’
NEXT
SOFTWARE Spending Forecast
SOURCE: GARTNER (NOVEMBER 2010)
Gartner Says Indian ICT Spending To Grow 10.3 Percent in 20114000
3500
3000
2500
2000
1500
1000
500
0
2,11
2
2,4
21
2,76
8
3124
3,52
1
3,96
0
Spending ($M)
2009 2010 2011 2012 2013 2014
Year
NOTES
THE BIG Q
5 6 IT NEXT | F E B R U A R Y 2 0 1 1
FIRST ANSWER It looks like Samtail already has sufficient systems in place, like ERP and CRM. Manoj should delve deeper into what reports his VP requires, and see how he can enable them. Most of the enterprise-suite applications have reporting features, which can be tweaked and customised, based on the requirements of the user. Thus, Manoj needs to first completely understand the ‘what’ and ‘why’ of Bhatkar’s request and work on them. Also, these days, many BI solutions are available on a go, pay-per-use model that can be instantly up and running. Though, they don’t provide the complete features of a full-blown suite, they are pretty decent. Thus, based on the need analysis, Manoj can even look at the solutions that can be implemented in a jiffy.
SECOND ANSWERThere are two aspects to this. While there is no debating that the premise, ‘IT is to be done by IT’ is fundamentally flawed, one needs to appreciate
Bhatkar’s candid admission of his ignorance. Besides that, he’s even ready to completely trust and fund Manoj on the implementation. This is a great opportunity for Manoj to prove his mettle. So, while the risk of failure is high, a success will establish Manoj’s leadership potential.
Nonetheless, he needs to have a detailed discussion with his VP and explain that for the success of BI, everyone needs to pitch in. It is not a one-man Rambo sort of a thing. If the message is communicated properly, even the VP will agree and the work can be jointly undertaken.
MORE RESOURCES The Datawarehouse Institute: http://www.tdwi.org
‘UNDERSTAND THE WHAT AND WHY’
COO, Ibexis
About me: Experienced in
content creation for gaming and web and has interest in
all aspects of game development.
NOTES
AJAY SARTAPE
UPDATE
5 8 ITNEXT | F E B R U A R Y 2 0 1 1
Get ready to go mobile with these latest devices. If you are a tablet freak, then we got the SMC EZ Stylepad for you. Or if you like the good old netebook PC, then you can try the new Apple Macbook.
Like something? Want to share your objects of desire? Send us your wish-list or feedback to [email protected]
INDULGE The hottest, the coolest and the funkiest next generation gadgets and devices for you
SONY WALKMAN NWZ-A845
16GB capacity, MP3, WMA,
AAC-LC, Linear PCM, Video
Formats, AVC, WMV9
PRICE: `11, 990
SMC EZ STYLEPAD
7inch media tablet,
Cortex’s ARM 11
Processor, 256MB RAM,
32GB SD Card Slot, Wi-Fi
802.11b/gPRICE: `15,900
HOT
AIPTEK POCKET CINEMA V20
Capable of projecting
60 inch image, 32GB
expandable memory, Great
tool for office presentations
APPLE MACBOOK PRO 13 INCH
OS: OS X 10.6 (Snow Leopard)
CPU: Core 2Duo P8800
RAM: 4GB DDR3
GPU: NvIDIA GeForce 320M
NEW
PRICE: `89,900
MY LOG
6 0 ITNEXT | F E B R U A R Y 2 0 1 1
With a pan enterprise search infrastructure in place, a company can access all its systems to quickly uncover vital information pertinent to a special project
HOW TO MEET UNIQUEINFORMATION MANAGEMENT
A sophisticated pan-enterprise search solution is a smart approach for effective information management
and compliance, especially in highly-regulated industries that have little room for error. With a pan-enterprise search infrastructure in place, a company can access all its systems to quickly uncover vital information pertinent to a specific project. Carol Fineagan shares how the right pan-enterprise search solution has fulfilled her company’s unique knowledge management and compliance requirements.
AND COMPLIANCE CHALLENGESBY CAROL FINEAGAN
IL
LU
ST
RA
TI
ON
: PH
OT
OS
.CO
M
INSIGHT | INFORMATION MANAGEMENT
2 4 ITNEXT | F E B R U A R Y 2 0 1 1
EnergySolutions is recognized as a leader in nuclear waste processing. In the short time of two years, we made nine acquisitions. Like many companies that have gone through acquisitions, we faced the challenge of managing infor-mation from all of the acquired compa-nies. Without the right tools, the cost and effort involved in organizing and extracting business value from this huge volume of information would have been prohibitive.
We set out to identify an enterprise search solution that could cull data from the various document manage-ment systems (DMSes) we inherited through our acquisitions. We needed a solution that was able to index and understand the information without having to move it from its native sys-tems. Our mission was to find the best solution for our users to increase their ability to share and collaborate on information. At the same time, the solu-tion needed to provide an information infrastructure for the enterprise that would allow us to adhere to our regula-tory compliance mandates.
Like many enterprises, we have criti-cal information stored in hundreds of legacy systems, company e-mails, and documents exchanged between inter-national departments across global entities. To compound the challenge, with nuclear materials there is a need for cradle-to-grave responsibility of all project information. This includes continuous monitoring, methods of disposal and location of burial, encom-passing many lifetimes of information that must be managed.
Our DMSes housed some of the company’s most crucial intellectual property, including nuclear project materials and correspondence, engi-neering papers, drawings and safety documents. To effectively manage this information, we needed a solution that could scale rapidly without limit, maintain the native formatting, leverage existing indexing systems and offer pro-tection from unauthorized access.
Due to the high volume, age and disparate file formats and data types, consolidating everything into a single
DMS was not an option, as we needed an audit trail and the original metadata for compliance. The company has to support a myriad of global regulatory compliance initiatives that apply to management of nuclear waste, includ-ing specific compliance mandates as defined by the Department of Energy. Since our initial public offering (IPO) in November 2007, we now also have to comply with the Sarbanes-Oxley Act.
TRADITIONAL WASN’T THE RIGHT OPTIONWhen we began to look at various options to address our information man-agement and compliance challenges, we quickly realized that traditional solu-tions—such as adding more storage or consolidating documents into another Records Management or Enterprise Content Management system—was not the right answer. With the increasing cost of media management, power and cooling, and datacenter space, simply procuring more storage media would be far too costly. Additionally, we could not quantify investing time and money moving data from one document sys-tem to another. There is intrinsic value in maintaining the original indexes and metatags. Having the ability to connect to multiple content repositories was a key selection criterion for us.
With employees located around the world, we recognized that it would be impossible to expect that everyone would categorize data the same. For example, the company’s users in the U.K. (Queen’s English) and the United States (Colonial English) might label or search for the same document with entirely different keywords. With so much data, we couldn’t rely on individuals to decipher these nuances. We needed a tool that was smart enough to understand what the person meant by “concept” and apply it to a broader base to bring back accurate results, and that includes finding both information and experts across the company—whether for legal, compliance or knowledge-sharing purposes.
Our industry has some unique information retention requirements in
Three layers, working in concert required to achieve the vision of a successful ‘air traffic control system’ for information security:
3A Controls Enforcement Layer which is the point of security detection
enforcement across the infrastructure. In an ideal environment, many controls are embedded directly into IT infrastructure such as operating systems and networks, providing ubiquitous coverage without deploying and managing hundreds of point tools.
A Controls Management Layer where organiza-tions can provision and
monitor security controls. Establishing this layer offers the opportunity to consolidate numerous security consoles.
A Security Management Layer where policies are defi ned that govern the
organization and information infrastructure based on compliance requirements, best practices and the nature of risk. This is also the layer where events and alerts from controls across the infrastructure come together and are correlated to assess compliance and remediate as necessary. This visibility layer is about bringing together what were once isolated technologies, inputs and feeds, into a single platform or framework, the same as an air traffi c control system.
1
2
3
Source: By Art Coviello, President, RSA and Tom Heiser, Chief Operations Offi cer for RSA, The Security Division of EMC.
2 4 B ITNEXT | F E B R U A R Y 2 0 1 1
With the iPad gaining popularity in the enterprise, here are 5 must-have business
applications for the iPad.
BOX.NET: This application helps break down all traditional barriers between
you and the elusive content. You need not worry whether you are at work or
not, behind a fi rewall or not, what OS are you on, one can access content anywhere,
anytime as needed. The application helps you leverage the best of CCM (Cloud
content management) whether you have the right desktop applications to view docu-
ments, spreadsheets, images and other types of content.
GOTOMEETING: The best of things in life are free. So is the application
that can keep you virtually at work even if you are absent physically. With
GoToMeeting all you need do is TAP to attend online meetings. Also, through the
application you can view slide presentations, design mockups, spreadsheets, reports –
whatever meeting presenters choose to share on-screen. Get started for free.
DRAGON DICTATION: We all have used umpteen voice recognition ap-
plications for Windows PCs. There’s one for the iPad as well, powered by
Dragon Naturally Speaking. It allows you to easily speak and instantly dictate
small text or lengthy email messages.
DESKTOP CONNECT: A desktop viewer that allows you to view and control
Windows, Mac OSX and Linux computers as if you were sitting in front of them, or
observe others as if you were watching over their shoulder. Get started at Rs 675.
KEYNOTE: While this presentation application for the Mac needs to be
redesigned to suit the iPad’s requirements. The application has retained its
basic feature to help you build an appealing presentation, complete with animated
charts and transitions. One could use Apple-designed themes, custom graphic
styles, and animations and effects to add glitter to the presentations. The applica-
tion is also PowerPoint compatible. Get started at Rs. 450.
-— Compiled by Anoop Chugh
very few organisations are taking any action against such violators. Most are turning a Nelson’s eye to such acts.
The Cyber Cells set up in India are there to help in this regard. However, before approaching them, it is advisable that IT managers do some groundwork and investigation on their own. For example, in the case of emails luring the public with job offers that do not exist, the IT manager should first try and trace the origin of the email. Of course, one needs to be able to analyse the header of the emails to do this. This would speed up matters and make it easier to take the case to the Cyber Cell.
Approaching legal representatives, be they internal or external lawyers, and seeking their help to take such issues to the Cyber Cell would definitely be advantageous and beneficial. The IT Act 2000 depends on the IPC (Indian Penal Code) and this is where a lawyer or legal representative will add value in convincing the Cyber Cell to take action.
Of course, in such instances, the IT manager must think on his feet and ensure that the recipient of any defaming or false emails does not delete the original email. This would be disastrous, as invaluable evidence would be destroyed.
An IT manager must also be aware of the laws and cases cited under the IT Act 2000, including Cyber Squatting of domain names, intellectual property, copyright law, trademark law, data protection and privacy laws, among other things. Although most would be tackled by the legal representatives of the company, the IT manager can add value with his knowledge of such issues.
So where does the buck stop for the IT manager? It would be worthwhile to either take up a course on cyber laws or to educate yourself by reading books on cyber laws and the IT Act 2000. This will definitely add value both to the manager and the organisation.
The author is the head of IT for Tata Services and is responsible for IT security of the head office of the group.
5 BUSINESS APPS FOR THE IPAD
FASTER & STRONGER
1
2
3
4
5
15-MINUTE MANAGER
Suggestions to help make certain that your next outsourcing project will be successful. BY DAVID STROM
Outsourcing isn’t new, but, by now, many IT shops have accumulated enough experience to use this service more
effectively. According to Houston-based consultancy TPI, even though the overall outsourcing market is down 13 percent from last year, growth remains strong for U.S.-based contracts.
Certainly, the cost-saving motivation is still significant: The cost for programmers and support services overseas can be less than half of what their domestic equivalents can be.
Nevertheless, to achieve those savings, you have to know how to work with the outsourcing vendor.
We spoke with several managers who have used outsourcers to build and augment their systems, and we came away with seven suggestions to help ensure that your next outsourcing contact—and contract—will be successful.1. Make sure there is a strong cultural fit between your two organizations. This involves both the country of origin of the outsourcer and your own corpo-rate culture. “The Dutch are very direct
at telling you when you have done something wrong, but in India, that can backfire and shut things down imme-diately” says Scott McDonald, the CTO of FCI USA, a manufacturing company with French headquarters that has used a number of outsourcers all over the world.
“The French like to have a lot more interaction than we do, and in Asia they like more structure and to understand the various components of a process. We hired an external consulting firm to help us understand the differences among the various cultures and how we operate.”
Google calls this culture fit “Googleyness,” offering “an environment that inspires original thinking, encourages people to take the initiative, is guided by data and user experience, has a flat management hierarchy, and is willing to take risks and be innovative,” says Patrick Chanezon, a Google developer relations manager in charge of outsourcing initiatives, who has worked with Globant in Argentina.
“We interviewed Globant as if they were going to be hired by Google internally,” says Chanezon. “We tried
7 STEPS TO OUTSOURCING
STRATEGY
IL
LU
ST
RA
TI
ON
: PH
OT
OS
.CO
M
CUBE CHAT | JATINDER AGGARWAL
“The thought of doing something new, innovative and the best in everything is what keeps me motivated,” says Jatinder Aggarwal, Project Manager at HCL Technologies
A staunch believer in both God and the power of good karma, Jatinder Aggarwal, Project Manager at HCL Technologies lays emphasis on making quick
decisions, even in crises situations. To him, time is one of the most precious elements of life, and ensuring delivery on schedule, a priority.
In a complex world, where chasing goals is often treated as a primary obligation, Aggarwal sees no substantial value in achieving a high without the blessings of friends and family. “Success should be measured in every aspect of life, including social respect, professional growth, friends and family. There is no excitement in holding a trophy if you are standing alone, with no family or friends in your side to celebrate that magical moment of success,” he asserts.
Measure your success
in every aspect of life,
including social respect,
professional growth,
friends and family
MY SUCESSMANTRA
BY JATINDER SINGH
It was his passion for work and good people management skills that led this Next100 winner to where he is at today. Nevertheless, the journey so far, has not been without its challenges.
“I have always come across challenges in every assignment I have done. But building an online interface for Citibank’s Trade Finance System with an OLECA System using the MQ Series in 2002-03 is the one I will always remember,” he says. Since no one in the team of 100+ associates had ever worked on the MQ Series before, and the organisation did not have the budget, to train the IT team, it was quite a big challenge to understand the technology without any help. “I read nearly five books on it, and implemented it end-to-end, starting from the requirements to making the implementation successful,” Aggarwal recalls.
KARMA AND CREATIVITY
4 8 ITNEXT | F E B R U A R Y 2 0 1 1
PH
OT
OG
RA
PH
Y:
D. R
. LO
HI
A
Among the new technologies around, cloud computing excites him. “It’s a combination of many technologies that have evolved recently. I feel over a period of time the way we use software and hardware is going to change dramatically. And concepts like HaaS and SaaS will be more popular in the future, especially for SMEs,” he predicts.
But it’s not just work that keeps him busy for hours, he also devotes an equal amount of quality time to family get-togethers and partying with friends on weekends. Going forward, this creative Project Manager intends to become an entrepreneur one day. He draws inspiration from the likes of Mukesh Ambani, Sunil Mittal, Bill Gates and Steve Jobs. Hard work, for him, is the only way to accomplishing a dream. He believes that the daily grind gets a person polished.
FACT FILE
NAME: JATINDER AGGARWAL
CURRENT DESIGNATION: PROJECT MANAGER, HCL TECHNOLOGIES
CURRENT ROLE: SERVICE DELIVERY MANAGER
EXPERTISE: MANAGING MULTIPLE PROJECTS, SETTING UP DELIVERY PROCESSES,
FAVORITE BOOK: NOT AN AVID READER, BUT LIKES ‘RICH DAD POOR DAD’ AND CHETAN BHAGAT’S BOOKS
FAVORITE QUOTES: ‘FIGHT TILL YOU DIE’, ‘BELIEVE IN THE BEST’ AND ‘LIVE LIFE KING SIZE’
WORK EXPERIENCE DEC 2010 – NOW: PROJECT MANAGER, HCL TECHNOLOGIES
2006 – 2009 PROJECT MANAGER, SAT YAM COMPUTER SERVICES LTD
2004 – 2006CONSULTANT, IBM INDIA
2000 – 2004ANALYST, CITICORP OVERSEAS SOFTWARE LTD
ACHIEVEMENTS RECEIVED NEXT100 AWARD IN 2010
RECEIVED MANY AWARDS IN CITIGROUP
WAS PART OF HIPOT (HIGHLY POTENTIAL) EMPLOYEES LIST IN POLARIS (COSL) IN 2004
“EVERY TIME I ACHIEVE ONE TARGET,I DEFINE ANOTHER TARGET FOR MYSELF
AND KEEP RAISING THE BAR”
The thought of doing something new, innovative and the best in everything keeps him motivated. “Every time I achieve one target I define another goal for myself and keep raising the bar,” he states. According to him, understanding various IT delivery models, having a clear business roadmap and excellent people management skills are the key ingredients for a successful IT Manager.
However, he doesn’t place much importance on fancy designations, or even being labelled as a CIO. “After a while, nobody actually cares whether you are the skipper or the wicketkeeper, it’s your performance on the field that counts. I am quite happy to have a no designation but more responsibilities, new challenges, and a free hand to drive the business as a mentor,” he says with candour.
4 9F E B R U A R Y 2 0 1 1 | ITNEXT
For the road less-taken!Five automobile technologies that have boosted safety
ANOOP CHUGHAssistant EditorThe CFO India Magazine
3 ESSENTIAL READS
Meet Jatinder Aggarwal, Project Manager , HCL Tech, this month, in Cube Chat Pg 48
Make sure you take right steps to make your outsourcing project successful Pg 45
How to tackle the challenges of Information Management ? Pg 24
After years of being fastened to cush-ioned-seats with a safety-jacket under-neath inside a flying aluminium structure I had lost all hopes for road transport, Now, that the golden quadrilateral (GQ) & NSEW corridor up and running, highway is hell again topping the charts in India. In the last five years I have burnt rubber on every inch of 5846 kms of the GQ and luckily, survived to tell the tale. But I must admit that, I owe my luck to five technolo-gies that automobiles have bestowed on us roadies!
a) Run-flat: Developed by BMW, this technology has made punctured tyres a thing of the past. No more changing tyres by the side of a road. It makes the spare tyre obsolete, reduces weight and frees up boot space. Found in all BMW four-wheelers.
b) Night Vision: Sometimes, a day trip means driving well past sun down. That’s where Night Vision fixed in Beemers can help drivers get past poor lighting. Intelligent algorithms look specifically for pedestrians, who are highlighted in yellow on the LCD screen, Found in BMW 7 Series, X5 and Z4. Disclaimer: It doesn't detect the spirits.
c) City Safety: This technology developed by Volvo has made the driver almost redundant. Imagine a car that applies brakes on its own, since you were busy texting, or sleeping. At speeds
up to 30 km per hour, this laser-based technology can sense if a vehicle 6m to 8m ahead is standing still, or moving slower. If City Safety senses an impending collision, the brakes are pre-charged to act faster on your response. Time for driver to retire! Found in the Volvo XC60.
d) Anti-skid systems: This one isn’t for the drag-racers. Anti-skid would take the adventure out of your driving. At the core of the system, sensors register the car’s direction and roll rate. The system compares this with steering wheel movements as well as the actual rotation of the car’s wheels. If you love barbaric style of driving, avoid cars with tags like EPS, traction control or DSTC. Found in Mercedes-Benz, Volvo and BMW with different names.
e) Pre-safe system: Depending on the driving situation and vehicle equipment, the system can initiate measures for passenger protection when it detects dangers. These include reversible belt tensioning and automatic closing of side windows or the optional tilting sunroof. The all-important information is provided by the sensors in various systems such as brake assist, which can register critical driving situations like under steering, over steering or emergency braking. Found in Mercedes-Benz GL-Class.
Long live safety technology, long live travellers!
ILLUSTRATION: PHOTOS.COM
6 ITNEXT | F E B R U A R Y 2 0 1 1
IL
LU
ST
RA
TI
ON
: SR
IS
TI
MA
UR
YA
, PH
OT
OG
RA
PH
Y:P
HO
TO
S.C
OM
TRENDSDEALSPRODUCTSSERVICESPEOPLE
TECH TRENDS | IT budget projections for 2011 are globally flat, with a weighted average budget increase of 1 percent. While IT heads do not report IT budgets returning to their 2008 (pre-recession) levels, the number of those experiencing budget increases in 2011 outnum-bered those reporting a cut by almost three-to-one.
According to a recent survey conducted by Gartner, IT heads
Cloud tops Priority List for IT Leaders
expect to adopt new cloud services much faster than originally expected. Currently, 3 percent of IT heads have the majority of IT running in the cloud or on SaaS technologies, but over the next four years IT heads expect this number to increase to 43 percent. The top three business priorities, according to the survey, are increasing enterprise growth; attracting and retaining new customers; and reducing enterprise costs.
Also among the top ten business priorities are: improving business processes; implementing and updating business applications; improving technical infrastructure; improving enterprise efficiency; improving operations; and improving business continuity, risk and securit. In a further positive development revealed in the survey, technology leaders may be able to reallocate IT budget savings, rather than simply returning them to the organisation in 2011. The ability to fund infrastructure changes and new projects by reallocating resources within that budget will gain momentum.
The introduction of Internet service-based technologies as changing that equation and releasing between 35 to 50 percent of infrastructure and operational resources for innovation and growth. This is creating a new success cycle, by creating and realising new sources of value, in addition to cost-effective IT operations.
Cloud computing,
virtualisation and mobile
technologies will be the
top three technology
priorities
UPDATEI N D U S T R Y
SOURCE: IT NEXT RESEARCH
Over 18% IT heads felt that no single solution is able to pro-vide full proof security
IT Managers vote for Best Antivirus Solution (NUMBERS IN %)
ENTERPRISE SECURITY
31
26% Symantec
20% McAfee
18% Kaspersky
13% Trend Micro
7% Others
7F E B R U A R Y 2 0 1 1 | ITNEXT
FROM WIRED TO WIRELESSLogitech has introduced the Logitech Wire-
less Combo MK260, a mouse and keyboard
for enterprise work-
ers. It is available
in India for a rec-
ommended retail
price of Rs 1,495.
FOR SERIOUS GAMERSCooler Master has launched its new mid-tower
gaming chassis, the HAF
912 Advanced, which is tar-
geted at gamers. The HAF
912 Advanced is priced at
an MRP of Rs 7,300 and
carries one year warranty.
TECH TRENDS | Intel has launched the much awaited second generation Intel Core processor family. Powered by new features and services, it claims to deliver an entirely new visual experience with processor graphics built in. According to company, more than 500 desktop and laptop PCs are expected from all major OEMs worldwide throughout the next year. In India, systems are likely to be available from OEMs like HCL, Wipro, MSI, HP, Lenovo, Toshiba and Dell amongst others as well as from local channel partners.
Amongst the new features, the company has added Quick
Intel Launches 2nd Generation Core Processor
biggest advance in computing performance and capabilities over any other previous generation,” said R. Sivakumar, Managing Director, Sales & Marketing Group, Intel South Asia. “These new features are bound to appeal to your senses” adds Sivakumar.
New processor graphics technology will focus on the areas where most people are computing today: high-definition (HD) video, photos, mainstream gaming, multi-tasking and online socializing and multimedia. Enhanced visual technologies like HD graphics are built into every 2nd Generation Intel Core processor. For consumers, this means improved PC experience, with better power management, efficiency and battery life.
Includes features such as Quick Sync Video, HD Graphics and Wireless Display 2.0
IT security firm, Sophos, warns that more than 1 m Facebook users are believed to have fallen for a hoax claiming that the popular website will close its doors on March 15th. A bogus news story, published by the “Weekly World News” said that Mark Zuckerberg had told reports that “managing [Facebook] has ruined my life. I need to put an end to all the madness.” In a panic, users have spread the story far and wide across internet. Facebook later, debunked the hoax via its Twitter account.
AROUND THE WORLD
Facebook Closing on March 15th?
MARK SELBY, NOKIA’S VICE PRESIDENT OF INDUSTRY COLLABORATIONS
“NOKIA IS KEEN TO UNDERSTAND THE IMPLICATIONS FOR THE PRIVACY OF CONSUMERS, AS WELL AS REGULATIONS AND POLICIES CONCERNING COMMERCIAL SERVICES,”
Sync Video, wireless display (WiDi), which can add 1080p HD and content protection for those wishing to beam premium HD content from their laptop screen to their TV.
“The processors represent the
QUICK BYTE
ZOOM YOUR IDEASBenQ has launched the MX880UST ultra
short throw projector for the business-
es. As per the company,
the new projector is ideal
for small environments
with big picture needs. It
is priced at Rs. 92,000.
UPDATE
1 0 ITNEXT | F E B R U A R Y 2 0 1 1
TECH TRENDS | It looks like the second Windows Phone 7 device to officially land in India is another HTC phone, the HTC 7 Mozart. Priced at Rs. 26,490 (MOP), the Mozart is cheaper than its punctual WP7 sibling, the HTC HD7, by about Rs. 3,500 - presumably because of the smaller screen size.
The HTC 7 Mozart comes packing high-fidelity audio with SRS and Dolby Mobile sound enhancement, remaining true to its namesake musical genius. The phone also features Microsoft Zune integration, so that users can synch media on their HTC 7 Mozart with their PC.
Unlike the HD7, which launched in partnership with Airtel, another carrier has made its WP7 intentions plain – Tata DoCoMo. Subscribers of the operator will get exclusive data plans for the device.
Other specs of the phone include an 8MP camera
with auto focus and Xenon flash that’s capable of 720p HD video recording, a 1GHz Snapdragon processor, 576MB of RAM and 512MB of ROM, GPS and A-GPS support, stereo FM with RDS, 8GB of internal storage, and a large 1300 mAh battery that provides up to 6 hours and 40 minutes of 2G talk time, and 5 hours and 30 minutes of 3G talk time. It weighs in at a nice and hefty 130 grams.
All in all, the phone sure seems like it would be able to stand up to the best in the market today, but the strangely enough, it does not support storage
expansion with microSD card. While Microsoft seems to have some strange ideas about how microSD expansion should work on Windows Phone 7, the lack of a card slot on a device that has just 8GB of internal storage is a bit…strange.
TECH TRENDS | A new Kelton Research sponsored by Sybase highlights that this year 90 per-cent of IT managers surveyed are planning to implement new mobile applications and nearly one in two believe that success-fully managing mobile applica-tions will top their priority list. It further adds that nine in ten (90 percent) IT managers reported they will implement new mobile applications this year, Almost a quarter (21 per-cent) looking to introduce 20 or more applications into their organization. In addition, they anticipate supporting about eight different mobile platforms
HTC Brings Mozart to India
Enterprise Apps Poised to Take Off in 2011
IT NEXT: What kind of evolution do you see in virtualisation technologies going forward?KEN STEINHARDT: Virtualisation has
been there since the mainframe era and
the flexibility and the barriers to change
today is so different and so much lesser
than they were back then. The barriers
to change back then were that the
applications and databases tended to
be unique to individual server platforms
, they could never run on anyone else’s
load. But today through standardisation,
software and the interconnects, the
barriers to change are nowhere near what
they were back then, so it’s a lot easier to
get from one place to another.
Do you also see public clouds being completely neutral wherein you can shift your data from one cloud to another?This has become a huge obstacle today. A
particular public cloud infrastructure can
be very much of a lock in today, which can
be a problem. The industry needs some
standardisation, from a cloud perspective.
Any specific technology EMC has or would really bullish?There are a couple of technologies. First
is the concept called Fully Automated
Storage Tearing(FAST) which is the
ability for the storage system instead of
having to be a specific tier. The other is
de-duplication. I believe that virtually all
environments at source, at target would
benefit over the next time especially over
the next few years with deduplication.
By Varun Aggarwal
INTERVIEW
KEN STEINHARDT, VP, ENTERPRISE BMTS AND CTO, CUSTOMER OPERA-TIONS, EMC CORPORATION
90 % IT managers reported they will implement new mobile applications this year
%
or operating systems by the end of 2011. Among the issues, IT manag-ers report that possible data security issues with mobile applications cause more problems than implementation.
The windows 7 device will be available for
` 26,490
UPDATE
1 1F E B R U A R Y 2 0 1 1 | ITNEXT
TECH TIDINGS| As attack kits become more accessible and relatively easier to use, they are being utilised much more widely, a report by security, storage and systems management solutions provider major Symantec has said. This has attracted tradi-tional criminals who would other-wise lack the technical expertise into cybercrime, fueling a self-sustaining, profitable, and increasingly organ-ised global economy, the report said. The report includes an overview of these kits as well as attack methods, kit types, notable attacks, and attack kit evolution. It also includes a discussion of attack kit features, traffic generation,
Cyber Attack Toolkits use on Rise: Symantec
and attack kit activity. Attack toolkits are software programs that can be used by novices and experts alike to facilitate the launch of widespread attacks on networked computers. These kits enable the attacker to easily launch numerous pre-written threats against computer systems. The study also said that popularity and demand has driven up the cost of attack kits. Organizations and end users should ensure that all software is up-to-date with vendor patches. Asset and patch management solutions may help to ensure systems are compliant and deploy patches to systems that are not up-to-date.
Comviva, the mobile solu-
tions company has entred into a
strategic partnership with airtel
bangladesh to provide messaging
solutions under its Unstructured
Supplementary Service Data
(USSD), Short Message Service
Center (SMSC) and BMG (Bulk
Messaging Gateway) portfolio.
The company adds that the
Framework to launch applica-
tions and rapidly evolve services
will drastically reduce overall
cost around airtel bangladesh’s
operator portal. The solution will
also provide airtel bangladesh
with a single-window web-based
environment to access, create,
execute and manage services. It
will optimally deliver messages
with minimal latency during periods
of intense continuous traffic. Rich
SMS features such as SMS Upload,
SMS Storage, SMS Forward, SMS
Copy, Auto Reply, Email notifica-
tion, SMS Signature and web will
facilitate airtel bangladesh to offer
unique and innovative services to
the Airtel subscribers. It has also
deployed its high capacity SMS
platform that delivers cross-carrier
messaging for enterprise custom-
ers, to help airtel generate new
revenue stream.
TECH TRENDS
Comviva to Provide platform sol
In 2010, Zeus 2.0 was advertised for up to US $8000
WHY IS STEVE JOBS LEAVING APPLE?AT MY REQUEST, THE BOARD OF DIRECTORS HAS GRANTED ME A MEDICAL LEAVE OF ABSENCE SO I CAN FOCUS ON MY HEALTH Apple CEO Steve Jobs sent the following email to all Apple employees
I will continue as CEO and be involved in major strategic decisions for the company. I have asked Tim Cook to be responsible for all of Apple’s day to day operations. I have great confidence that Tim and the rest of the executive management team will do a terrific job executing the exciting plans we have in place for 2011.
NEWS @
BLOG
PH
OT
OG
RA
PH
Y:P
HO
TO
S.C
OM