The severe flooding across the Midwest has caused at least 24 deaths and while there are no exact estimates, the damages are expected to be in the billions of dollars. This is the second time in the last 15 years there has been a supposed “100 year flood” of the Mississippi River. The flooding has caused inestimable financial and emotional losses for residents, and some might not return to the area. Those businesses that do not directly rely on the Mississippi for their operations and the surrounding area – like shipping and farming -- need to decide if they’ll re-build in the flood plains of the Mississippi. The answer is likely no.
SAP’s recent announcement of its intent to acquire MES vendor Visiprise is both unsurprising and at the same time eyebrow raising. On the one hand, it’s no surprise given the tight history between the two companies — forming their first partnership way back in 2005 with a collaborative development and marketing effort centered around the Netweaver platform and cumulating in last year’s agreement for SAP to resell Visisprise’s software on its price list. Also, SAP has been grabbing other manufacturing shop floor applications like Lighthammer in 2005 (now manufacturing intelligence product MII) and Factory Logic in 2006 (now lean scheduling product LPO) to complement its “Perfect Plant” initiative to link plant operations to enterprise-level production planning and management. So where’s the surprise?
The Bureau of Customs and Border Protection (CBP) published the Importer Security Filing and Additional Carrier Requirements documents in January, a notice of proposed rulemaking better know to the industry as ‘10+2’. Since then, CBP has continued to refine the ruling and gather feedback from the trading community. And the writing is on the wall, this rule will very likely be put into motion later this year. So what does this mean to importers?
In a nutshell, 10+2 is the pending regulation that will require filing for US bound ocean shipments to be electronically sent 24 hours prior to the vessel loading at its origin. This is intended to help allow enough time for Custom’s Automated Targeting System to flag high risk containers for inspection and security screening. The proposed penalty for failure to file the importer security filing is 100% of the value of the imported merchandise.
There are 10 categories of data the CBP wants from the importers and two sets of data from the carriers. The rule is controversial because it will mean most companies will need to adjust and update their processes and systems to handle this. Importers are worried because they are not 100% sure where the data is going to come from. In some cases, its not that the data is not available, it’s that it is intentionally hidden. For example, a reseller may not include the original manufactures’ details because what’s stopping buyers from now going directly to the source? The other wrinkle in this regulation is making importers directly accountable where most of these supply chain processes are typically handled by their carrier, customs brokers and other 3rd parties.
We've established that 10 GbE is now ready for the enterprise, which means it is time to start worrying about whether your Internet service provider (ISP) is adopting 100 gigabit Ethernet (100 GbE). ISPs aggregate enterprise traffic and connect you to the Internet over high speed optical networks that must ensure the adequate bandwidth and quality of service (QoS) you require.
While the majority of customers won’t fill their 10 GbE pipes this year or next, many will; advanced applications such as high definition video streaming, video conferencing, data replication, and wide area clustering for business continuity will tax bandwidth. Moreover, corporate networks will take advantage of the better bandwidth of 10 GbE to shift to IP-based Unified Communications (UC.) Forrester Research found that 36% of enterprises in North America and Europe have deployed or are rolling out UC this year with another 36% evaluating it. All these high-bandwidth services require strong QoS to meet enterprise needs and drive adoption.
Remember my blog dated January 16, 2008 where I said that everything that happens in the software market is somehow related to Business Intelligence? I am now expanding that conjecture to include all other market segments. Specifically, the airline industry. And not just Business Intelligence. Just plain old intelligence.
Recently I’ve been thinking about the vendors that I cover and wondering which has really had the most impact on app dev -- for better or for worse.
Forget which vendor's tool has the best bells and whistles. Which vendor has really made the most difference? Which vendor has delivered products or services that have really improved project outcomes? Or resulted in worse project outcomes? Not just a single project outcome, but hundreds or even thousands of project outcomes.
I'm not asking which vendor's cool technology has improved productivity by 10% on proje cts where it was applied. I'm looking for far more broad-reaching impact than that. I’m after the vendors that have changed the way development works. This post is about who those vendors are -- my ideas, and a request for yours.
This data center-in-a-box is portable, stackable, and can be
deployed in as little at 12 to 14 weeks, says IBM. It supports an open architecture and
equipment from non-IBM vendors. IBM states that if you need to expand your data
center fast, but don’t have the space, the PMDC is worth considering.
Huh? A data center in the trailer of an 18-wheeler? What do
you do, park it outside next to your data center? How does this make sense? And
While waiting for the pan-out of the Cisco System's acquisition of Securent, I can't help but wonder how Cisco is going to develop the Securent technology in its future products. Will the Securent policy engine (PDP) be used 1) as a main point for policy management and enforcement for network equipment, OR 2) will they continue using the product along the 'Securent-intended' path: enforcing fine grained application level policies by integrating policy enforcement points into applications, OR 3) managing fine grained authorizations on the network layer (without the need to open up applications), similarly to BayShore Networks, Autonomic Networks, and Rohati Systems? Without a comprehensive identity and access management offering (IAM), Cisco will probably be fit best to do 1) and 3) described above. This seems most consistent with Cisco's background and culture.