The Patent Game: Everybody’s Playing, You Snooze, You Lose

“Let the future tell the truth, and evaluate each one according to his work and accomplishments. The present is theirs; the future, for which I have really worked, is mine.”

— Nikola Tesla

Thomas Edison and Nikola Tesla have a lot in common with Apple, Google, HTC, and Motorola & Research in Motion.

They were/are all warriors in the ongoing war to see who can amass the largest number of the most lucrative technology patents. Edison and Tesla waged their battle from the late 1860s through the 1920s and the stakes were just as high then as they are now.

Nary has a week gone by without mention of the latest contretemps among the high tech industry titans. There’s been no cessation of hostilities during the holiday season. If anything, top tier companies have become even more aggressive about solidifying and extending their dominance in and out of their core competencies as 2010 comes to a close. …

The Patent Game: Everybody’s Playing, You Snooze, You Lose Read More »

As Ellison Rips Rivals, Oracle Services Slip, Support Prices Soar

Memo to Larry Ellison: The Roman Coliseum halted gladiator combats around 435 A.D. SAP has thrown in the towel and has no interest in continuing a court battle. Hewlett-Packard executives are refusing to accept service on your lawsuits and HP’s newly named chief executive Leo Apotheker is laying low, presumably dodging your increasingly vituperative verbal assaults. You’ve got no takers for the bloody, bare knuckles brawl you crave. What does that tell you?

It should signal an end to the Circus Maximus sideshow but it won’t.

No one desires this much attention or sticks their chin out spoiling for a fight like Ellison. And in an industry like high tech that’s overflowing with giant egos, that’s saying something. It’s true that Ellison’s antics always make for reams and reams of good copy. Reporters calling for comments on the latest developments don’t even bother to suppress their mirth. Enough is enough, though. The Larry Ellison Show would be more amusing if corporate customers weren’t getting caught in the crossfire. …

As Ellison Rips Rivals, Oracle Services Slip, Support Prices Soar Read More »

ITIC 2010-2011 Infrastructure Trends Survey Shows Sharp Increase in Mobility & Use of Ipads, Smart Phones in the Workplace; Cloud Deployments Slow

The sharp increase in remote and mobile workers is spurring the fast adoption of iPads in the workplace. At the same time, public cloud computing deployments among mainstream users remain slow and steady. These are some of the other survey highlights of the latest ITIC/Sunbelt Software survey on Desktop and Infrastructure deployment trends.

No Rush to the Cloud — Yet

Users on the Move: Number of Mobile workers increases

The survey results also confirm what has been widely reported: that greater numbers and percentages of users are spending more time telecommuting, traveling and generally working outside the corporate offices.

Over half – 58 percent of businesses say that up to 25 percent of their employees work remotely; another 18 percent of respondents said that between 26 to 50 percent of their workers are remote; 11 percent said that 51 to 75 percent work outside the office and seven percent of respondents said that 76 to 100 percent of their employees work remotely. It is significant that only 7 percent of the over 400 businesses polled say that none of their workers are remote or mobile. …

ITIC 2010-2011 Infrastructure Trends Survey Shows Sharp Increase in Mobility & Use of Ipads, Smart Phones in the Workplace; Cloud Deployments Slow Read More »

ITIC Windows 7 Survey Results: 75% of Users Give it High Marks for Performance & Reliability!

Thanks to everyone who responded to the independent, joint ITIC/Sunbelt Software survey on Windows 7, Desktop Infrastructure and Cloud Services deployment trends and issues. Please NOTE: no vendors sponsored this survey or in any way influenced the results.

Over 400 of you from 22 countries took time out of your busy schedules to respond to our poll.

Windows 7 is a winner!

As we noted in our previous blog, Windows 7 officially celebrates its 1st birthday, today — October 22nd. And there are plenty of reasons to celebrate. Yes, Windows 7 has sold over 240 million copies, to date making it the fastest selling OS in Microsoft’s (or any vendor’s) history. And yes, many of those sales can be attributed to pent-up demand because the overwhelming majority of the Windows installed base elected to remain on Windows XP and skip Vista. Admittedly, many organizations would opt to remain on Windows XP indefinitely if Microsoft was not ending support for the nearly 10 year old desktop OS. Those disclaimers aside, Windows 7’s success is no fluke. …

ITIC Windows 7 Survey Results: 75% of Users Give it High Marks for Performance & Reliability! Read More »

Happy 1st Birthday Windows 7; Now Can We Please Cancel Microsoft’s MidLife Crisis?

Windows 7 is now officially a year old. Since it was released October 22, 2009, Microsoft has sold over 240 million copies of the operating system — approximately seven copies per second. That makes it the fastest selling operating system in Microsoft’s history or any vendor’s history. Some industry pundits estimate that Windows 7 sales will top 300 million within the next six-to-eight months.

Microsoft has plenty of other reasons to celebrate Windows 7’s first birthday. Windows 7 has also been one of the most stable, reliable and secure releases in Microsoft’s history.

A three-quarters majority – 73 percent of the 400+ respondents to the latest joint ITIC/Sunbelt Software poll, gave Windows 7 an “excellent,” “very good” or “good” rating. …

Happy 1st Birthday Windows 7; Now Can We Please Cancel Microsoft’s MidLife Crisis? Read More »

Oracle & HP Appear to Have Made Up But They’re Gearing up for Battle

“When two elephants fight, it is the grass that gets trampled.”

— African proverb

Hewlett-Packard Co. and Oracle Corp.’s decision to settle the lawsuit over Oracle’s hiring of Mark Hurd as co-President after weeks of public wrangling is welcome news to everyone but the corporate attorneys.

But don’t expect the two vendors to just pick up and resume their former close partnership. It got very ugly, very fast. And the reverberations from Hurd’s hiring to HP’s recent appointment of Leo Apotheker, as the new CEO effective November 1, will be felt for a long time. HP’s decision to hire the German-born Apotheker, who is also the former CEO of SAP, is to put it politely a big “take that, Oracle!” Forget the surface smiles, behind the scenes Oracle and HP have their ears pinned back, teeth bared and swords sharpened as they gird for battle.

This was not the typical cross-competitive carping that vendors routinely spew to denigrate their rivals’ products and strategies. The issues between HP and Oracle are very personal and very deep. The verbal volleys Oracle CEO Larry Ellison lobbed at HP in recent weeks exposed the changing nature of this decades old alliance. It is morphing from a close, mutually beneficial collaboration to a head-on collision in several key product areas. Ellison’s words did more than just wound HP: they also opened up deep fissures in the relationship which are as big as the San Andreas Fault. …

Oracle & HP Appear to Have Made Up But They’re Gearing up for Battle Read More »

SQL Server Most Secure Database; Oracle Least Secure Database Since 2002

Ask any 10 qualified people to guess which of the major database platforms is the most secure and chances are at least half would say Oracle. That is incorrect.

The correct answer is Microsoft’s SQL Server. In fact, the Oracle database has recorded the most number of security vulnerabilities of any of the major database platforms over the last eight years.

This is not a subjective statement. The data comes directly from the National Institute of Standards and Technology.

Since 2002, Microsoft’s SQL Server has compiled an enviable record. It is the most secure of any of the major database platforms. SQL Server has recorded the fewest number of reported vulnerabilities — just 49 from 2002 through June 2010 — of any database. These statistics were compiled independently by the National Institute of Standards and Technology (NIST), the government agency that monitors security vulnerabilities by technology, vendor, and product (see Exhibit 1). So far in 2010, through June, SQL Server has a perfect record — no security bugs have been recorded by NIST CVE.

And SQL Server was the most secure database by a wide margin: Its closest competitor, MySQL (which was owned by Sun Microsystems until its January 2010 acquisition by Oracle) recorded 98 security flaws or twice as many as SQL Server.

By contrast, during the same eight-and-a-half year period spanning 2002 through June 2010, the NIST CVE recorded 321 security vulnerabilities associated with the Oracle database platform, the highest total of any major vendor. Oracle had more than six times as many reported security flaws as SQL Server during the same time span. NIST CVE statistics recorded 121 security-related issues for the IBM DB2 platform during the past eight-and-a-half years.

Solid security is an essential element for many mainstream line-of-business (LOB) applications, and a crucial cornerstone in the foundation of every organization’s network infrastructure. Databases are the information repositories for many organizations; they contain much of the sensitive corporate data and intellectual property. If database security is compromised, the entire business is potentially at risk.

SQL Server’s unmatched security record is no fluke. It is the direct result of significant Microsoft investment in its Trustworthy Computing Initiative, which the company launched in 2002. In January of that year, Microsoft took the step of halting all new code development for several months across its product lines to scrub the code base and make its products more secure.

The strategy is working. In the past 21 months since January 2009, Microsoft has issued only eight (8) SQL Server security-related alerts. To date in 2010 (January through June), there have been no SQL Server vulnerabilities recorded by Microsoft or NIST. Microsoft is the only database vendor with a spotless security record the first six months of 2010.

ITIC conducted an independent Web-based survey on SQL Server security that polled 400 companies worldwide during May and June 2010. The results of the ITIC 2010 SQL Server Security survey support the NIST CVE findings. Among the survey highlights:
• An 83% majority rated SQL Server security “excellent” or “very good” (see Exhibit 2, below).
• None of the 400 survey respondents gave SQL Server security a “poor” or “unsatisfactory” rating.
• A 97% majority of survey participants said they experienced no inherent security issues with SQL Server.
• Anecdotal data obtained during first-person customer interviews also elicited a very high level of satisfaction with the embedded security functions and capabilities of SQL Server 7, SQL Server 2000, SQL Server 2005, SQL Server 2008, and the newest SQL Server 2008 R2 release. In fact, database administrators, CIOs and CTOs interviewed by ITIC expressed their approbation with Microsoft’s ongoing initiatives to improve SQL Server’s overall security and functionality during the last decade starting with SQL Server 2000.

Strong security is a must for every organization irrespective of size or vertical industry. Databases are among the most crucial applications in the entire network infrastructure. Information in databases is the organization’s intellectual property and life blood.

Databases are essentially a company’s electronic filing system. The information contained in the database directly influences and impacts every aspect of the organization’s daily operations including relationships with customers, business partners, suppliers and its own internal end users. All of these users must have the ability to quickly, efficiently and securely locate and access data. The database platform must be secure. An insecure, porous database platform will almost certainly compromise business operations and by association, any firm that does business with it. Any lapses in database security, including deliberate internal and external hacks, inadvertent misconfiguration, or user errors can mean lost or damaged data, lost revenue, and damage to the company’s reputation, raising the potential for litigation and loss of business.

It’s also true that organizations bear at least 50 percent of the responsibility for keeping their databases and their entire network infrastructures secure. As the old proverb goes, “The chain is only as secure as its weakest link.” Even the strongest security can be undone or bypassed by user error, misconfiguration or weak computer security practices. No database or network is 100 percent hack-proof or impregnable.Organizations should consult with their vendors regarding any questions and concerns they may have about the security of ANY of their database platforms. They should also ensure they stay updated with the latest patches and install the necessary updates. Above all, bolster the inherent security of your databases with the appropriate third party security tools and applications. Make sure your organization strictly adheres to best computer security computing practices. At the end of the day only you can defend your data.

Registered ITIC site users can Email me at: ldidio@itic-corp.com for a copy of the full report.

SQL Server Most Secure Database; Oracle Least Secure Database Since 2002 Read More »

The Dog Days of Summer & High Tech Hijinks

In the mid-to-late 1980s colleagues and friends were surprised when I transitioned from working as an on camera investigative TV reporter to cover the then-fledgling high technology industry for specialized trade magazines.
After all they reasoned, how could I be content covering semiconductors, memory boards, server hardware, software and computer networks after working as a mainstream journalist covering stories such as lurid political and law enforcement corruption scandals ; drug trafficking; prostitution; dumping tainted substances on unsuspecting third world nations and cover-ups by big business when their planes, trains and automobiles malfunctioned? How could I trade in “murder and mayhem” for the staid, sterile world of high technology?
They needn’t have worried.
Admittedly, mastering the technology was a challenge. For the first few weeks every time I did story on PALs and had to spell out the acronym I wrote “Police Athletic League” instead of Programmable Array Logic. And then there was my first work-related trip to Las Vegas to cover the mammoth spectacle that was Comdex circa 1988. In the dark ages before wireless, laptops and decent broadband, it was nearly impossible to file stories from your hotel room because the trunk lines were overwhelmed. A colleague and I were forced to trek down to a bank of pay phones to transmit our news articles at 2:30 a.m. and were mistaken for hookers. The pay was arguably better than a journalist’s salary but we passed. Incidents like this made me feel close to my cops and crimes, murder and mayhem investigative TV roots.
I felt at home covering technology right away. Within a month, I was chronicling tales of high tech companies sending their top executives off to rehab for drug and alcohol addiction; there was a rash of top executives leaving established powerhouses like and taking top engineers and sales executives with them, which in turn precipitated a slew of theft of trade secrets and patent infringement lawsuits. Things really got interesting when Robert Morris, Jr. launched his now infamous Internet Worm; there were myriad other tales of sex scandals, involving corporate executives, board of director fights and coups, price fixing, hostile takeovers, corporate espionage and fiscal chicanery that entailed everything from embezzlement and theft to cooking the books .
Reality TV and the tabloids have nothing on high technology industry hijinks.
Fast forward to what’s making headlines during these “Dog Days” of summer 2010. The ancient Greeks and Romans believed that the dog days of summer (named after the constellation Sirius or Dog Star) lasted from late July to early September and hot weather foreshadowed evil doings. John Brady’s “Clavis Calendarium of 1813 describes it as “an evil time when the seas boiled, wine turned sour, dogs grew mad, and all creatures became languid, causing to man burning fevers, hysterics, and phrensies.” The recent spate of high tech headlines seems to bear that out. Here’s a sampling:
• The Hewlett-Packard board of directors abruptly fired CEO Mark Hurd, after allegations of sexual harassment surfaced.
• Oracle CEO Larry Ellison publicly blasted the HP board for firing Mark Hurd.
• Oracle sued Google for alleged patent and copyright infringement involving the use of Java intellectual property in Google’s mobile Android operating system.
• Google StreetView maps prompts privacy lawsuits and raids in several countries including South Korea
• Google releases version 6 of its Chrome web browser and vows to issue a stable new release every six weeks.
The headlines provide an accurate assessment of both the current state and the direction of the high tech industry. Four words say it all: sex, money, power and posturing. Let’s examine some of the stories in more detail.
The HP board of directors’ decision to fire CEO Mark Hurd after five years of stewardship remains cloaked in mystery. Hurd may or may not have been guilty of fudging expense reports and engaging in conduct not up to HP’s standards with Jodie Fisher, a contract HP “adviser” and sometime actress. In addition to being an adviser, Fisher also received $5,000 to attend HP events acting as a “meet and greet” hostess. Fisher, who retained the services of celebrity lawyer Gloria Allred, may or may not have been a victim of harassment. We don’t know for sure because all of the principals in this tableau are mum. Rumors are rife that the “real reason” the HP’s board may have shown Hurd the door is because: 1) he may have been more involved than was previously thought in the 2006 HP board of directors “pretexting” scandal. At that time, HP board members illegally spied on other board members to learn the source of news leaks and 2) Hurd was exceedingly unpopular with rank and file HP employees.
By all monetary measures, Hurd’s five year stint at HP was a resounding success. And for that, Hurd will walk away with a $40 to $50 million severance package. No one knows how much Fisher received, because Hurd and Fisher settled whatever transpired between them, privately. But it must be a pretty good sum, because Fisher issued a very upbeat and conciliatory statement saying she did not intend for Hurd to lose his job and wishes Hurd, his family and HP all the best. Thankfully, I read this on an empty stomach!
What’s wrong with this picture? Plenty.
The real victims here are HP’s rank and file employees, the American worker and sexual harassment victims – both men and women – who lack the clout to hire a Gloria Allred to rattle her saber for another 15 minutes of fame and a quick, inglorious settlement.
The average Joe and Jane worker have seen their ranks decimated with each new acquisition and round of layoffs. HP currently ranks number 9 on Fortune 500 list. In the past several years it has acquired Compaq, EDS, 3Com and Palm. Those mergers and acquisitions helped HP become the first high tech company to have annual revenues that exceed the $100 billion threshold. HP is also first in another category – albeit an unwelcome one: despite its stellar financial performance, over the last decade HP has cut more jobs (most of them here in the U.S.) than any other high tech firm. The head count stands at approximately 85,000.
So Mark Hurd gets $40 to $50 million and tens of thousands of HP’s American employees get shown the door.
Then there’s Ms. Fisher. I know nothing about the woman. One must presume if Hurd was willing to settle with her that her claim had some merit. However, as soon as I heard she was represented by Allred, I cringed. Allred has turned into a modern day Carrie Nation for the tabloid TV generation. In an age of instant and continual information via the Tabloids and the Web, publicity is the chief currency – the more salacious and lurid, the bigger the settlement. I phoned Allred’s office to inquire how many pro bono and non-celebrity sexual harassment cases she handles. I haven’t heard back yet and I’m not too hopeful.
The Equal Employment Opportunity Commission (EEOC) received 12,696 complaints of sexual harassment in the workplace – 16% of them by men. The EEOC says it recovered $51.5 million in monetary benefits for those nearly 13,000 workers. That’s probably just about what Mark Hurd, Jodie Fisher and Gloria Allred pocketed among the three of them. Nice work if you can get it.
That brings me to another prominent headline of the past couple of weeks: Oracle chief Larry Ellison, in an interview with the New York Times blasted the HP board for firing his longtime friend Mark Hurd. Ellison’s comments have all the credence of a professional athlete convicted of using steroids writing an editorial extolling the virtues of doping. Oracle, which completed its acquisition of Sun Microsystems earlier this year, is gearing up to axe up to one-third to one-half of Sun’s workforce of over 25,000. No one is sure exactly how many Oracle employees will be pink slipped but estimates range from 5,000 to as high as 10,000. Oracle disclosed in a recent government finding that it will take write off $825,000 in restructuring charges.
The question is will Larry Ellison make room for Mark Hurd at Oracle? He might. Hurd has a proven record of cutting costs, cutting people and thus delivering value to shareholders.
The real measure of a company’s success should not be measured by how many jobs it cuts by how many jobs it creates for the American worker.
Oracle also made headlines and flexed its muscles last week with the announcement that it is suing Internet search engine giant Google for allegedly infringing on the Java patents Oracle now owns as part of the Sun acquisition, that are used in Google’s mobile Android operating system. This is all about Oracle making a preemptive strike to try and contain Google in what’s shaping up to be a battle of high tech titans. Google’s Android OS runs on many of the major mobile phone platforms including Motorola and HTC Corp. The implications are enormous. Don’t expect this one will ever get to court. Neither firm wants to spend millions or expend precious corporate resources in a protracted legal battle, which would be detrimental to both sides. Expect them to settle. But we can also expect the acrimony between these two rivals to rise commensurately along with the stakes in the mobile market.
Google meanwhile engaged in some posturing of its own. The company released beta version 6 of its Google Chrome web browser. Google also says it will issue a stable new release of the browser every six weeks. This move is clearly designed as a challenge to Microsoft Internet Explorer, Mozilla Firefox and Apple Safari. While I applaud Google’s initiative and desire to retain its competitive edge, releasing a new version of its browser every six weeks is overkill. No matter how fast Google or any vendor makes its browser, the actual speeds are still determined by the user’s broadband. And frankly, the constant application upgrades to everyday packages like Adobe, WordPress and the various browsers are a nuisance. One can barely log on to an application without being hounded to upgrade to the latest version. It’s a major nuisance.
But these days, companies feel compelled to make an announcement just to keep their names in the headlines at all costs. There’s never a dull moment in the high tech industry, especially during the dog days of summer. I can’t wait to see what fall brings. If you have any ideas, Email me at: ldidio@itic-corp.com.

The Dog Days of Summer & High Tech Hijinks Read More »

Cloud Computing: Pros and Cons

Cloud computing like any emerging new technology has both advantages and disadvantages. Before beginning any infrastructure upgrade or migration, organizations are well advised to first perform a thorough inventory and review of their existing legacy infrastructure and make the necessary upgrades, revisions and modifications. Next, the organization should determine its business goals for the next three-to-five years to determine when, if and what type of cloud infrastructure to adopt. It should also construct an operational and capital expenditure budget and a timeframe that includes research, planning, testing, evaluation and final rollout.
Public Clouds: Advantages and disadvantages
The biggest allure of a public cloud infrastructure over traditional premises-based network infrastructures is the ability to offload the tedious and time consuming management chores to a third party. This in turn can help businesses:
• Shave precious capital expenditure monies because they avoid the expensive investment in new equipment including hardware, software, and applications as well as the attendant configuration planning and provisioning that accompanies any new technology rollout.
• Accelerated deployment timetable. Having an experienced third party cloud services provider do all the work also accelerates the deployment timetable and most likely means less time spent on trial and error.
• Construct a flexible, scalable cloud infrastructure that is tailored to their business needs. A company that has performed its due diligence and is working with an experienced cloud provider can architect a cloud infrastructure that will scale up or down according to the organization’s business and technical needs and budget.
The potential downside of a public cloud is that the business is essentially renting common space with other customers. As such, depending on the resources of the particular cloud model, there exists the potential for performance, latency and security issues as well as acceptable response and service and support from the cloud provider.
Risk is another potential pitfall associated with outsourcing any of your firm’s resources and services to a third party. To mitigate risk and lower it to an acceptable level, it’s essential that organizations choose a reputable, experienced third party cloud services provider very carefully. Ask for customer references; check their financial viability. Don’t sign up with a service provider whose finances are tenuous and who might not be in business two or three years from now.
The cloud services provider must work closely and transparently with the corporation to build a cloud infrastructure that best suits the business’ budget, technology and business goals.
To ensure that the expectations of both parties are met, organizations should create a checklist of the items and issues that are of crucial importance to their business and incorporate them into Service Level Agreements (SLAs) Be as specific as possible. These should include but are not limited to:

• What types of equipment do they use?
• How old is the server hardware? Is the configuration powerful enough?
• How often is the data center equipment/infrastructure upgraded?
• How much bandwidth does the provider have?
• Does the service provider use open standards or is it a proprietary datacenter?
• How many customers will you be sharing data; resources with?
• Where is the cloud services provider’s datacenter physically located?
• What specific guarantees if any, will it provide for securing sensitive data?
• What level of guaranteed response time will it provide for service and support?
• What is the minimum acceptable latency/response time for its cloud services?
• Will it provide multiple access points to and from the cloud infrastructure?
• What specific provisions will apply to Service Level Agreements (SLAs)?
• How will financial remuneration for SLA violations be determined?
• What are the capacity ceilings for the service infrastructure?
• What provisions will there be for service failures and disruptions?
• How are upgrade and maintenance provisions defined?
• What are the costs over the term of the contract agreement?
• How much will the costs rise over the term of the contract?
• Does the cloud service provider use the Secure Sockets Layer (SSL) to transmit data?
• Does the cloud services provider encrypt the resting data to prohibit and restrict access?
• How often does the cloud services provider perform audits?
• What mechanisms will it use to quickly shut down a hack and can it track a hacker?
• If your cloud services provider is located outside your country of origin, what are the privacy and security rules of that country and what impact will that have on your firm’s privacy and security issues?
Finally, the corporation should appoint a liaison and that person should meet regularly with a representative from the cloud services provider to ensure that the company attains its immediate goals and that it is always aware and working on future technology and business goals. Outsourcing all or any part of your infrastructure to a public cloud does not mean forgetting and abandoning it.
Private Clouds: Advantages and Disadvantages
The biggest advantage of a private cloud infrastructure is that your organization keeps control of its corporate assets and can safeguard and preserve its privacy and security. Your organization is in command of its own destiny. That can be a double-edged sword.
Before committing to build a private cloud model the organization must do a thorough assessment of its current infrastructure, its budget and the expertise and preparedness of its IT department. Is your firm ready to assume the responsibility for such a large burden from both a technical and ongoing operational standpoint? Only you can answer that. Remember that the private cloud should be highly reliable and highly available – at least 99.999% uptime with built-in redundancy and failover capabilities. Many organizations currently struggle to maintain 99.9% uptime and reliability which is the equivalent of 8.76 hours of per server, per annum downtime. When your private cloud is down for any length of time, your end users (and anyone else who has access to the cloud) will be unable to access resources.
Realistically, in order for an organization to successfully implement and maintain a private cloud, it needs the following:
• Robust equipment that can handle the workloads efficiently during peak usage times
• An experienced, trained IT staff that is familiar with all aspects of virtualization, virtualization management, grid, utility and chargeback computing models
• An adequate capital expenditure and operational expenditure budget
• The right set of private cloud product offerings and service agreements
• Appropriate third party virtualization and management tools to support the private cloud
• Specific SLA agreements with vendors, suppliers and business partners
• Operational level agreements (OLAs) to ensure that each person within the organization is responsible for specific routine tasks and in the event of an outage
• A disaster recovery and backup strategy
• Strong security products and policies
• Efficient chargeback utilities, policies and procedures
Other potential private cloud pitfalls include: deciding which applications to virtualize; vendor lock-in and integration and interoperability issues. Businesses grapple with these same issues today in their existing environments. At present, however, the product choices from vendors and third party providers are more limited for virtualized private cloud offerings. Additionally, since the technology is still relatively new, it will be difficult from both a financial as well as technical standpoint to switch horses in midstream from one cloud provider to another if you encounter difficulties.
There is no doubt that virtualized public and private cloud infrastructures adoptions will grow significantly in the next 12 to 18 months. In order to capitalize on their benefits, lower your total cost of ownership (TCO), accelerate return on investment (ROI) and mitigate risk your organization should take its time and do it right.

Cloud Computing: Pros and Cons Read More »

Cloud Computing: De-Mystifying the Cloud

Every year or so the high technology industry gets a new buzzword or experiences a paradigm shift which is hyped as “the next big thing.”
For the last 12 months or so, cloud computing has had that distinction. Anyone reading all the vendor-generated cloud computing press releases and associated news articles and blogs would conclude that corporations are building and deploying both private and public clouds in record breaking numbers. The reality is much more sobering. An ITIC independent Web-based survey that polled IT managers and C-level professionals at 700 organizations worldwide in January 2010, found that spending on cloud adoption was not a priority for the majority of survey participants during calendar 2010. In fact only 6 percent of participants said that private cloud spending was a priority this year and an even smaller 3 percent minority say that public cloud spending is a priority this year.
Those findings are buttressed by the latest joint ITIC/Sunbelt Software survey data (which is still live); it indicates that just under 20 percent of organizations have implemented a public or a private cloud. When asked why, nearly two-thirds or 65 percent of the respondents said they felt no compelling business need. Translation: they feel safe inside the confines of their current datacenters here on Terra Firma.

While there is a great deal of interest in the cloud infrastructure model, the majority of midsized and enterprise organizations are not rushing to install and deploy private or public clouds in 2010.

However, that is not to say that organizations – especially mid-sized and large enterprises – are not considering cloud implementations. ITIC research indicates that many businesses are more focused on performing much needed upgrades to such essentials as disaster recovery, desktop and server hardware, operating systems, applications, bandwidth and storage before turning their attention to new technologies like cloud computing.
Despite the many articles written about public and private cloud infrastructures over the past 18 months, many businesses remain confused about cloud specifics such as characteristics, costs, operational requirements, integration and interoperability with their existing environment or how to even get started.
De-Mystifying the Cloud
But just what is cloud computing, exactly? Definitions vary. The simplest, most straightforward definition is that a cloud is a grid or utility style pay-as-you-go computing model that uses the Web to deliver applications and services in real-time.
Organizations can choose to deploy a private cloud infrastructure wherein they host their services on-premises from behind the safety of the corporate firewall. The advantage here is that the IT department always knows what’s going on with all aspects of the corporate data from bandwidth, CPU utilization to all-important security issues. Alternatively, organizations can opt for a public cloud deployment in which a third party like Amazon Web Services (a division of Amazon.com) hosts the services at a remote location. This latter scenario saves businesses money and manpower hours by utilizing the host provider’s equipment and management. All that is needed is a Web browser and a high-speed Internet connection to connect to the host to access applications, services and data. However, the public cloud infrastructure is also a shared model in which corporate customers share bandwidth and space on the host’s servers.
Organizations that are extremely concerned about security and privacy issues and those that desire more control over their data can opt for a private cloud infrastructure in which the hosted services are delivered to the corporation’s end users from behind the safe confines of an internal corporate firewall. However, a private cloud is more than just a hosted services model that exists behind the confines of a firewall. Any discussion of private and/or public cloud infrastructure must also include virtualization. While most virtualized desktop, server, storage and network environments are not yet part of a cloud infrastructure, just about every private and public cloud will feature a virtualized environment.
Organizations contemplating a private cloud also need to ensure that they feature very high (near fault tolerant) availability with at least “five nines” 99.999% uptime or better. The private cloud should also be able to scale dynamically to accommodate the needs and demands of the users. And unlike most existing, traditional datacenters, the private cloud model should also incorporate a high degree of user-based resource provisioning. Ideally, the IT department should also be able to track resource usage in the private cloud by user, department or groups of users working on specific projects, for chargeback purposes.
Private clouds will also make extensive use of business intelligence and business process automation to guarantee that resources are available to the users on demand.
Given the Spartan economic conditions of the last two years, all but the most cash-rich organizations (and there are very few of those) will almost certainly have to upgrade their network infrastructure in advance of migrating to a private cloud environment. Organizations considering outsourcing any of their datacenter needs to a public cloud will also have to perform due diligence to determine the bona fides of their potential cloud service providers.
There are three basic types of cloud computing although the first two are the most prevalent. They are:
• Software as a Service (SaaS) which uses the Web to deliver software applications to the customer. Examples of this are Salesforce.com, which has one of the most popular, widely deployed, and the earliest cloud-based CRM application and Google Apps, which is experiencing solid growth. Google Apps comes in three editions – Standard, Education and Premier (the first two are free). It provides consumers and corporations with customizable versions of the company’s applications like Google Mail, Google Docs and Calendar.
• Platform as a Service (PaaS) offerings; examples of this include the above-mentioned Amazon Web Services and Microsoft’s nascent Windows Azure Platform. The Microsoft Azure cloud platform offering contains all the elements of a traditional application stack from the operating system up to the applications and the development framework. It includes the Windows Azure Platform AppFabric (formerly .NET Services for Azure) as well as the SQL Azure Database service. Customers that build applications for Azure will host it in the cloud. However, it is not a multi-tenant architecture meant to host your entire infrastructure. With Azure, businesses will rent resources that will reside in Microsoft datacenters. The costs are based on a per usage model. This gives customers the flexibility to rent fewer or more resources depending on their business needs.
• Infrastructure as a Service (IaaS) is exactly what its name implies: the entire infrastructure becomes a multi-tiered hosted cloud model and delivery mechanism.
Both public and private clouds should be flexible and agile: the resources should be available on demand and should be able to scale up or scale back as the businesses’ needs dictate.

Next: In Part 2 The Pros and Cons of the Cloud

Cloud Computing: De-Mystifying the Cloud Read More »

Scroll to Top