The Washington Post is reporting a new wrinkle in cyberwarfare. In the article Defense official discloses cyberattack, the Post reports that “malicious code placed on the [flash] drive by a foreign intelligence agency uploaded itself onto a network run by the U.S. military's Central Command.” Perhaps SkyNet has become self-aware, as this malware appears to be able to “upload” itself onto a military network. We ARE nearing August 29th…
According to Deputy Defense Secretary William J. Lynn III, "It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary." This must be one awesome piece of code – sentient, silent, and “poised.”
One of my favorite things to do here at Forrester is judge the Groundswell Awards. Started by Josh Bernoff as a way to drive increasingly practical discussion regarding the real benefits that derive from exploiting social media, judging these Awards is among the most collaborative things we do within Forrester's research community. Moreover, as we compare submissions across years, the Awards give us a chance to ask, "How is the state of the art changing in the world of social media?" Finally, each and every submission becomes a case that we can use over and over as we help clients navigate the turbulent waters of the social sphere. Very cool stuff.
Imagine the Forrester analysts that help role clients with social media -- Josh et al. -- sitting around a virtual table discussing the details of each individual submission. We consider all the POST attributes -- people, objective, strategy, and tools/tactics -- highlighting what's innovative, what's working, and what's generating returns. It reminds me a bit of being a kid and getting the Sears Catalog in the mail at the beginning of the holiday season. For those that weren't around before Lindsay Lohan was born, the Sears Catalog was the compendium of every toy, sporting good item, musical instrument, etc., that could possibly emerge from that big box from Grandma. Like me with my siblings, we analysts metaphorically sit on the sofa with the Groundswell Award submissions in our laps, pointing at the examples that we think are most cool and worthy. I say "like," of course, because I haven't yet found myself bouncing off the walls, screaming gibberish, like I did when I first saw the red bicycle I got when I was nine years old.
I’m in the process of buying a new car, and I’m trying to apply everything I’ve learned from my research into software negotiation towards getting a good deal. I’m noticing many of the irritating behaviors from the dealers’ sales staff that Forrester’s sourcing and vendor management clients encounter regularly from their software reps. Here is my list of the worst ones, but I’d love to hear other people’s suggestions:
Having temporarily relocated to Eastern France – far from Paris and closer to Switzerland and Italy – I recently had the pleasure of experiencing my closest Cisco TelePresence site in Rolle, Switzerland, on the north shore of Lake Geneva for a discussion with Paul Mountford, President of Cisco’s Emerging Markets Theatre. Cisco’s Emerging Market’s strategy has focused on what they call “country transformation,” which revolves primarily around increasing the penetration of broadband. For FY11, Cisco will shift the message from country-wide transformation to something that rings closer to home (literally and figurative) with talk of “life-changing” stories through “life-changing” networks. While still a little lofty, the message resonates deeper than country transformation, which speaks primarily, if not exclusively, to high-level government officials. More a topic for Davos than for a boardroom or a living room.
Despite the lack of a sustained full-on recovery in the global economy, one gets the feeling that we're at the beginning of a period of tech expansion and growth, doesn't one? For many, 2011 budgeting planning is happening now, so it remains to be seen what yourexpansion and growth will be in the near term, but there's certainly no shortage of interesting new developments from technology vendors to whet your appetite.
While it's fun to look at emerging tech and imagine what impact it might have several years from now, it's a bit more pragmatic to focus on the technology trends that will be hitting the mainstream and making significant waves in the corporate world and in the public sector in the next few years.
In Q4 of last year Forrester published The Top 15 Technology Trends EA Should Watch. The author, analyst Alex Cullen, spoke with a few dozen analysts for input and then applied strict criteria for inclusion of a particular tech trend in the doc: 1) significant business or IT impact in the next 3 years; 2) newness, with implications not only for new business capabilities but also for the organization's understanding of the technology and how to manage it; and 3) complexity, especially regarding cross-functional impact to the organization.
Events are, and have been for quite some time, the fundamental elements of IT infrastructure real-time monitoring. Any status changed, threshold crossed in device usage, or step performed in a process generates an event that needs to be reported, analyzed, and acted upon by IT operations.
Historically, the lower layers of IT infrastructure (i.e., network components and hardware platforms) have been regarded as the most prone to hardware and software failures and have therefore been the object of all attention and of most management software investments. In reality, today’s failures are much more likely to be coming from the application and the management of platform and application updates than from the hardware platforms. The increased infrastructure complexity has resulted in a multiplication of events reported on IT management consoles.
Over the years, several solutions have been developed to extract the truth from the clutter of event messages. Network management pioneered solutions such as rule engines and codebook. The idea was to determine, among a group of related events, the original straw that broke the camel’s back. We then moved on to more sophisticated statistical and pattern analysis: Using historical data we could determine what was normal at any given time for a group of parameters. This not only reduces the number of events, it eliminates false alerts and provides a predictive analysis based on parameters’ value evolution in time.
The next step, which has been used in industrial process control and in business activities and is now finding its way into IT management solutions, is complex event processing (CEP).
Over the past decade, BPM suites promised to put the business in the driver’s seat for delivering process improvement to the enterprise. However, most of these promises fell flat, relegating the business to participate as backseat drivers directing IT on how best to steer process improvement.
In the latest update to our BPM suites Forrester Wave report, Forrester evaluated 11 leading vendors against 148 product feature, platform, and market presence criteria. The Forrester Wave provided a head-to-head comparison of which BPM suites best support the needs of comprehensive process improvement programs that demand tight collaboration and coordination across business and IT stakeholders. Here's a sneak peek at the findings from our new report, "The Forrester Wave: Business Process Management Suites, Q3 2010".
Time-to-value and fit-to-purpose are top priorities. Process professionals are searching for ways to trim the fat from bloated BPM initiatives and constantly ask about tools and best practices for making BPM leaner and meaner. Leading vendors — like Pega and Appian — are responding to the need for leaner and more fit-to-purpose BPM suites by providing targeted solution frameworks, embedding agile project management features, and delivering highly customizable end user work environments.
In a recent discussion with a group of infrastructure architects, power architecture, especially UPS engineering, was on the table as a topic. There was general agreement that UPS systems are a necessary evil, cumbersome and expensive beasts to put into a DC, and a lot of speculation on alternatives. There was general consensus that the goal was to develop a solution that would be more granular install and deploy and thus allow easier and ad-hoc decisions about which resources to protect, and agreement that battery technologies and current UPS architectures were not optimal for this kind of solution.
So what if someone were to suddenly expand battery technology R&D investment by a factor of maybe 100x of R&D and into battery technology, expand high-capacity battery production by a giant factor, and drive prices down precipitously? That’s a tall order for today’s UPS industry, but it’s happening now courtesy of the auto industry and the anticipated wave of plug-in hybrid cars. While batteries for cars and batteries for computers certainly have their differences in terms of depth and frequency of charge/discharge cycles, packaging, lifespan, etc, there is little doubt that investments in dense and powerful automotive batteries and power management technology will bleed through into the data center. Throw in recent developments in high-charge capacitors (referred to in the media as “super capacitors”), which add the impedance match between the requirements for spike demands and a chemical battery’s dislike of sudden state changes, and you have all the foundational ingredients for major transformation in the way we think about supplying backup power to our data center components.
Security in the Smart Grid ecosystem is getting more attention by the day. Although many of the traditional security measures are applicable to the Smart Grid environment, there’s a need for the specific tools to handle emerging security vulnerabilities. This Market Overview will focus on the security vendors in the Smart Grid space. The role of security is evolving gradually in the Smart Grid ecosystem, and therefore our utility as well as non-utility customers are asking about vendors that can provide secure solutions.
The Smart Grid IT market is still emerging and security seems to be a promising component of it. We see four vendor categories when it comes to security market:
I was introduced to the term “eat your own dog food” many years ago by a Microsoft project manager who pointed out that if you don't use your own products, maybe you should think about working for someone else (some of the best advice I ever got from Microsoft). Some years later I was teaching an EA leadership class in Sydney and used the “eat your own dog food” metaphor. A very indignant architect stood up and with great flair said: “Man, we are enterprise architects! We slurp our own caviar.” Well, whether it’s dog food or caviar, if you build it you should use it. The problem often isn’t that we don’t want to use our own products; it is that we are so busy trying to get everybody else to use them that we just don’t think about it.
I just published a report titled “Use Business Architecture Tools To Align EA With The CIO’s Agenda.” The genesis for this research was the realization that EA teams, along with many other organizations, don’t do a very good job figuring out what their bosses really need from them. And architects, unlike other organizations, have all the tools and skills they need at their disposal. So here are my four simple steps to better alignment with your CIO: