Historically, the positioning of Dell versus its two major competitors for high-value enterprise business, particularly where it involved complex services and the ability to deliver deeply integrated infrastructure and management stacks, has been as sort of an also ran. Competitors looked at Dell as a price spoiler and a channel for standard storage and networking offerings from its partners, not as a potential threat to the high-ground of being able to deliver complex integrated infrastructure solutions.
This comforting image of Dell as being a glorified box pusher appears to be coming to an end. When my colleague Andrew Reichman recently wrote about Dell’s attempted acquisition of 3Par, it made me take another look at Dell’s recent pattern of investments and the series of announcements they have made around delivering integrated infrastructure with a message and solution offering that looks like it is aimed squarely at HP and IBM's Virtual Fabric.
The Washington Post is reporting a new wrinkle in cyberwarfare. In the article Defense official discloses cyberattack, the Post reports that “malicious code placed on the [flash] drive by a foreign intelligence agency uploaded itself onto a network run by the U.S. military's Central Command.” Perhaps SkyNet has become self-aware, as this malware appears to be able to “upload” itself onto a military network. We ARE nearing August 29th…
According to Deputy Defense Secretary William J. Lynn III, "It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary." This must be one awesome piece of code – sentient, silent, and “poised.”
One of my favorite things to do here at Forrester is judge the Groundswell Awards. Started by Josh Bernoff as a way to drive increasingly practical discussion regarding the real benefits that derive from exploiting social media, judging these Awards is among the most collaborative things we do within Forrester's research community. Moreover, as we compare submissions across years, the Awards give us a chance to ask, "How is the state of the art changing in the world of social media?" Finally, each and every submission becomes a case that we can use over and over as we help clients navigate the turbulent waters of the social sphere. Very cool stuff.
Imagine the Forrester analysts that help role clients with social media -- Josh et al. -- sitting around a virtual table discussing the details of each individual submission. We consider all the POST attributes -- people, objective, strategy, and tools/tactics -- highlighting what's innovative, what's working, and what's generating returns. It reminds me a bit of being a kid and getting the Sears Catalog in the mail at the beginning of the holiday season. For those that weren't around before Lindsay Lohan was born, the Sears Catalog was the compendium of every toy, sporting good item, musical instrument, etc., that could possibly emerge from that big box from Grandma. Like me with my siblings, we analysts metaphorically sit on the sofa with the Groundswell Award submissions in our laps, pointing at the examples that we think are most cool and worthy. I say "like," of course, because I haven't yet found myself bouncing off the walls, screaming gibberish, like I did when I first saw the red bicycle I got when I was nine years old.
I’m in the process of buying a new car, and I’m trying to apply everything I’ve learned from my research into software negotiation towards getting a good deal. I’m noticing many of the irritating behaviors from the dealers’ sales staff that Forrester’s sourcing and vendor management clients encounter regularly from their software reps. Here is my list of the worst ones, but I’d love to hear other people’s suggestions:
Having temporarily relocated to Eastern France – far from Paris and closer to Switzerland and Italy – I recently had the pleasure of experiencing my closest Cisco TelePresence site in Rolle, Switzerland, on the north shore of Lake Geneva for a discussion with Paul Mountford, President of Cisco’s Emerging Markets Theatre. Cisco’s Emerging Market’s strategy has focused on what they call “country transformation,” which revolves primarily around increasing the penetration of broadband. For FY11, Cisco will shift the message from country-wide transformation to something that rings closer to home (literally and figurative) with talk of “life-changing” stories through “life-changing” networks. While still a little lofty, the message resonates deeper than country transformation, which speaks primarily, if not exclusively, to high-level government officials. More a topic for Davos than for a boardroom or a living room.
Despite the lack of a sustained full-on recovery in the global economy, one gets the feeling that we're at the beginning of a period of tech expansion and growth, doesn't one? For many, 2011 budgeting planning is happening now, so it remains to be seen what yourexpansion and growth will be in the near term, but there's certainly no shortage of interesting new developments from technology vendors to whet your appetite.
While it's fun to look at emerging tech and imagine what impact it might have several years from now, it's a bit more pragmatic to focus on the technology trends that will be hitting the mainstream and making significant waves in the corporate world and in the public sector in the next few years.
In Q4 of last year Forrester published The Top 15 Technology Trends EA Should Watch. The author, analyst Alex Cullen, spoke with a few dozen analysts for input and then applied strict criteria for inclusion of a particular tech trend in the doc: 1) significant business or IT impact in the next 3 years; 2) newness, with implications not only for new business capabilities but also for the organization's understanding of the technology and how to manage it; and 3) complexity, especially regarding cross-functional impact to the organization.
Events are, and have been for quite some time, the fundamental elements of IT infrastructure real-time monitoring. Any status changed, threshold crossed in device usage, or step performed in a process generates an event that needs to be reported, analyzed, and acted upon by IT operations.
Historically, the lower layers of IT infrastructure (i.e., network components and hardware platforms) have been regarded as the most prone to hardware and software failures and have therefore been the object of all attention and of most management software investments. In reality, today’s failures are much more likely to be coming from the application and the management of platform and application updates than from the hardware platforms. The increased infrastructure complexity has resulted in a multiplication of events reported on IT management consoles.
Over the years, several solutions have been developed to extract the truth from the clutter of event messages. Network management pioneered solutions such as rule engines and codebook. The idea was to determine, among a group of related events, the original straw that broke the camel’s back. We then moved on to more sophisticated statistical and pattern analysis: Using historical data we could determine what was normal at any given time for a group of parameters. This not only reduces the number of events, it eliminates false alerts and provides a predictive analysis based on parameters’ value evolution in time.
The next step, which has been used in industrial process control and in business activities and is now finding its way into IT management solutions, is complex event processing (CEP).
Over the past decade, BPM suites promised to put the business in the driver’s seat for delivering process improvement to the enterprise. However, most of these promises fell flat, relegating the business to participate as backseat drivers directing IT on how best to steer process improvement.
In the latest update to our BPM suites Forrester Wave report, Forrester evaluated 11 leading vendors against 148 product feature, platform, and market presence criteria. The Forrester Wave provided a head-to-head comparison of which BPM suites best support the needs of comprehensive process improvement programs that demand tight collaboration and coordination across business and IT stakeholders. Here's a sneak peek at the findings from our new report, "The Forrester Wave: Business Process Management Suites, Q3 2010".
Time-to-value and fit-to-purpose are top priorities. Process professionals are searching for ways to trim the fat from bloated BPM initiatives and constantly ask about tools and best practices for making BPM leaner and meaner. Leading vendors — like Pega and Appian — are responding to the need for leaner and more fit-to-purpose BPM suites by providing targeted solution frameworks, embedding agile project management features, and delivering highly customizable end user work environments.
In a recent discussion with a group of infrastructure architects, power architecture, especially UPS engineering, was on the table as a topic. There was general agreement that UPS systems are a necessary evil, cumbersome and expensive beasts to put into a DC, and a lot of speculation on alternatives. There was general consensus that the goal was to develop a solution that would be more granular install and deploy and thus allow easier and ad-hoc decisions about which resources to protect, and agreement that battery technologies and current UPS architectures were not optimal for this kind of solution.
So what if someone were to suddenly expand battery technology R&D investment by a factor of maybe 100x of R&D and into battery technology, expand high-capacity battery production by a giant factor, and drive prices down precipitously? That’s a tall order for today’s UPS industry, but it’s happening now courtesy of the auto industry and the anticipated wave of plug-in hybrid cars. While batteries for cars and batteries for computers certainly have their differences in terms of depth and frequency of charge/discharge cycles, packaging, lifespan, etc, there is little doubt that investments in dense and powerful automotive batteries and power management technology will bleed through into the data center. Throw in recent developments in high-charge capacitors (referred to in the media as “super capacitors”), which add the impedance match between the requirements for spike demands and a chemical battery’s dislike of sudden state changes, and you have all the foundational ingredients for major transformation in the way we think about supplying backup power to our data center components.
Over the past several months, I've been receiving a lot of questions about replication for continuity and recovery. One thing I've noticed, however, is that there is a lot of confusion around replication and its uses. To combat this, my colleague Stephanie Balaouras and I recently put out a research report called "The Past, Present, And Future Of Replication" where we outlined the different types of replication and their use cases. In addition to that, I thought it would be good to get some of the misconceptions about replication cleared up:
Myth: Replication is the same as high availability Reality: Replication can help to enable high availability and disaster recovery, but it is not a solution in and of itself. In the case of an outage, simply having another copy of the data at an alternate site isn't going to help if you don't have a failover strategy or solution. Some host-based replication products come with integrated failover and failback capabilities.
Myth: Replication is too expensive Reality: It's true that traditionally array-based replication has been expensive due to the fact that it requires like-to-like storage and additional licensing fees. However, two factors have mitigated this expense: 1) several storage vendors are no longer charging an extra licensing fee for replication; and 2) there are several alternatives to array-based replication that allow you to use heterogeneous storage and come at a significantly lower acquisition cost. Replication products fall into one of four categories (roughly from most to least expensive):