opsreview
Follow
Find
221 views | +0 today
 
Scooped by Governance Team
onto opsreview
Scoop.it!

CIO Asia Awards: Realising business value underlines 2012 IT Project Awards

Diving deep into infrastructural setup and deriving more value from IT are the prominent signs highlighted among this year's prestigious CIO Asia CIO Awards winners.

The winners - selected by a panel of independent judges from a 'Roll of Honour' short list, the CIO 100 2011 Index - are Hong Kong's City University; Singapore's Housing & Development Board, Integrated Health Information Systems Pte Ltd; Inland Revenue Authority of Singapore and Global Blue Pte Ltd; and Thailand's Standard Chartered Bank (Thai) PCL.

The annual CIO 100 index, coordinated by leading regional enterprise IT magazine CIO Asia, published by Fairfax Business Media Asia, recognises regional enterprises and organisations that have excelled through creative and innovative IT projects in the past 12 months.

more...
No comment yet.
opsreview
Operational excellence research team at Governance Board. Tell us about your IT management best practices.
Your new post is loading...
Your new post is loading...
Scooped by Governance Team
Scoop.it!

2012 Global Cities Index

2012 Global Cities Index | opsreview | Scoop.it
Governance Team's insight:

The world today is more about cities than countries, and a place like Seoul has more in common with Singapore and Hong Kong than with smaller Korean cities.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

IBM's Watson starts its medical career

IBM's Watson starts its medical career | opsreview | Scoop.it
The IBM Watson software line is not an EMR, but it can process and analyze information in an EMR.
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

6 cloud security questions CIOs should ask a service provider | Asia Cloud Forum

6 cloud security questions CIOs should ask a service provider | Asia Cloud Forum | opsreview | Scoop.it
Security invariably heads the list of concerns that any CIO outsourcing IT to a cloud service provider would have. Questions have to be raised on the reliability of the service provider's infrastructure and how access to the infrastructure as well as data, applications and other assets placed outside the company's premises are secured.

For Tata Communications, the critical factors extend beyond securing the cloud environment to transforming the customer's value chain. "It's about generating real [business] value, consolidating and leveraging resources, shortening time to market, having a system that automate upgrades and patches, innovating and so on," said Amit Sinha Roy, the company's vice president of Marketing & Strategy for Global Enterprise Solutions, at the recent CommunicAsia show in Singapore. "These are some areas that companies adopting the cloud should be mindful of."

From the perspective of a service provider that has served many enterprise customers in the region, Roy suggests six questions that enterprises should ask to better understand the key differences in vendor security.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

How can IT governance be implemented pragmatically by enterprises? | Agile IT Governance

How can IT governance be implemented pragmatically by enterprises? | Agile IT Governance | opsreview | Scoop.it
Various different structures, processes and related mechanisms can be used for execution of IT governance programs.
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

The hidden costs of BYOD

The hidden costs of BYOD | opsreview | Scoop.it
Before plunging straight into bring-your-own-device (BYOD), it is important to be aware of some of the unforeseen costs associated with managing and running BYOD schemes.
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Top 10 Things I Learned About Cloud Last Week | Andi Mann – Übergeek

Top 10 Things I Learned About Cloud Last Week | Andi Mann – Übergeek | opsreview | Scoop.it

Logicalis is doing some amazing things to deliver both public and private hosted cloud using CA Technologies, alongside key strategic partners Cisco and NetApp. While visiting their site in the UK – just outside of London, I learned a lot about the real world of cloud service providers.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

The Mechanics and Meaning of That Ol' Dial-Up Modem Sound

The Mechanics and Meaning of That Ol' Dial-Up Modem Sound | opsreview | Scoop.it
Pshhhkkkkkkrrrrkakingkakingkakingtshchchchchchchchcch*ding*ding*ding"...
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

HP debuts Monsoon for hybrid cloud management | Asia Cloud Forum

HP debuts Monsoon for hybrid cloud management | Asia Cloud Forum | opsreview | Scoop.it
HP has begun commercializing Monsoon, a cloud infrastructure management solution developed by HP Labs in Singapore for hybrid cloud environments. Meanwhile, HP moved its first public cloud services to beta last week.
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Good IT managers - are they born or bred? | TechRepublic

Good IT managers - are they born or bred? | TechRepublic | opsreview | Scoop.it
Overpromoting a senior engineer into a management role can end up wrecking perceptions of IT in the organisation.

The number one priority is communicating with the organisation, some members of which will be very senior, and require clear and timely updates not just on what the problem is, but also why it happened and when it will be fixed. Also, having been promoted, there will be other senior engineers whose responsibility it is to fix the problem.

If the manager wades in, pushing them to one side, how will that affect team morale in the future? Trust in the manager by his or her staff will be reduced, leading to a team management problem as well as a technical one.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

CSC launches on-premise private cloud in Asia | Asia Cloud Forum

CSC today announced the availability of BizCloud in Asia, touted to be the first on-premise private cloud to be charged as a service.

BizCloud features CSC CloudCompute, an infrastructure-as-a-service (IaaS) architecture that is also deployed in the CSC cloud data centers. CloudCompute delivers compute, storage and network resources as a service to support all applications.

Different SLA levels
BizCloud is a VMware vCloud data center service that gives users private cloud components -- preconfigured, integrated and tested, on their own premises behind their firewall.
"For enterprises, it has been difficult to obtain the economic benefits of a public cloud which is delivered to them as a private cloud."

-- Robert Mahowald, VP, SaaS and cloud services, IDC

It enables users to adopt a hybrid approach by keeping mission-critical applications on premise with BizCloud, while using CSC's off-premise cloud for disaster recovery, business continuity or for setting up agile development and test environments.

Because BizCloud shares the same infrastructure as the CSC public and off-premises logically separated cloud models, organizations can focus on moving workloads to the right cloud model based on the security and control those workloads require.

Ready for workloads in 10 weeks, BizCloud can speed up the adoption of a private cloud by businesses and government agencies, while reducing implementation time and avoiding huge upfront capex investment.

BizCloud can be subscribed on a pay-per-use model, and is packaged with different levels of service level agreement. All workloads are scalable on demand.

Different tiers of CloudCompute service can be mixed and matched with guaranteed availability levels from 99 to 99.95%. All CSC cloud models are billed as a service from a standard rate card.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

CIO Asia Awards: Realising business value underlines 2012 IT Project Awards

Diving deep into infrastructural setup and deriving more value from IT are the prominent signs highlighted among this year's prestigious CIO Asia CIO Awards winners.

The winners - selected by a panel of independent judges from a 'Roll of Honour' short list, the CIO 100 2011 Index - are Hong Kong's City University; Singapore's Housing & Development Board, Integrated Health Information Systems Pte Ltd; Inland Revenue Authority of Singapore and Global Blue Pte Ltd; and Thailand's Standard Chartered Bank (Thai) PCL.

The annual CIO 100 index, coordinated by leading regional enterprise IT magazine CIO Asia, published by Fairfax Business Media Asia, recognises regional enterprises and organisations that have excelled through creative and innovative IT projects in the past 12 months.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Harris Exits Cloud Hosting, Will Sell Data Center » Data Center Knowledge

Harris Corporation (HRS) will discontinue its Cyber Integrated Solutions operation and sell a data center facility in Harrisonburg, Virginia, taking a loss of at least $70 million on the operation. 

more...
No comment yet.
Rescooped by Governance Team from Quantified Self, Data Science, Digital Health, Personal Analytics, Big Data
Scoop.it!

Digital Health Strategy: From Novelty to Necessity - Forbes

Digital Health Strategy: From Novelty to Necessity - Forbes | opsreview | Scoop.it
Is your digital health gadget a novelty? I'm guilty.  The devices I carry with me are more an intellectual curiosity than a tool driven by my desire for health or wellness. And there lies a key insight into this marketplace.

Via Tictrac
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

ARM launches the first UK industry forum to help shape the Internet of Things

ARM launches the first UK industry forum to help shape the Internet of Things | opsreview | Scoop.it
ARM, known for its semiconductor intellectual property (IP) provision and development of digital electronic products, has announced that it has invited some of the UK’s leading specialist technology companies to establish the UK’s first industry forum to help shape the Internet of Things.

The forum will include lighting technology company EnLight, white space signal innovators Neul, home energy management tech firm Alertme and AquaMW which develops intelligent cloud sensing technologies.

The forum hopes to combat what it describes as the ‘Internet of Silos’. By this it means ‘an unconnected world with less value to both consumers and businesses’.

The group will drive a blueprint for how technologies associated with the Internet of Things should and could work together. It predicts that 50 billion intelligent devices will be connected to the Internet by 2020. So it’s high time a plan was in place to see how this might be more cohesive.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Netflix, Instagram, Pinterest knocked out by storm-related power outage at Amazon

Netflix, Instagram, Pinterest knocked out by storm-related power outage at Amazon | opsreview | Scoop.it
It's not the first time – Amazon is working to fix what it calls "power issues" at its Elastic Compute Cloud data center in North Virginia following a severe storm.
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

The Antivirus Era Is Over - Technology Review

The Antivirus Era Is Over - Technology Review | opsreview | Scoop.it
Conventional security software is powerless against sophisticated attacks like Flame, but alternative approaches are only just getting started.


For at least two years, Flame has been copying documents and recording audio, keystrokes, network traffic, and Skype calls, and taking screenshots from infected computers. That information was passed along to one of several command-and-control servers operated by its creators. In all that time, no security software raised the alarm.

Flame is just the latest in a series of incidents that suggest that conventional antivirus software is an outmoded way of protecting computers against malware. "Flame was a failure for the antivirus industry," Mikko Hypponen, the founder and chief research officer of antivirus firm F-Secure, wrote last week. "We really should have been able to do better. But we didn't. We were out of our league, in our own game."

The programs that are the lynchpin of computer security for businesses, governments, and consumers alike operate like the antivirus software on consumer PCs. Threats are detected by comparing the code of software programs and their activity against a database of "signatures" for known malware. Security companies such as F-Secure and McAfee constantly research reports of new malware and update their lists of signatures accordingly. The result is supposed to be an impenetrable wall that keeps the bad guys out.

However, in recent years, high-profile attacks on not just the Iranian government but also the U.S. government have taken place using software that, like Flame, was able to waltz straight past signature-based software. Many technically sophisticated U.S. companies—including Google and the computer security firm RSA—have been targeted in similar ways, albeit with less expensive malware, for their corporate secrets. Smaller companies are also routinely compromised, experts say.

Some experts and companies now say it's time to demote antivirus-style protection. "It's still an integral part [of malware defense], but it's not going to be the only thing," says Nicolas Christin, a researcher at Carnegie Mellon University. "We need to move away from trying to build Maginot lines that look bulletproof but are actually easy to get around."

Both Christin and several leading security startups are working on new defense strategies to make attacks more difficult, and even enable those who are targeted to fight back.

"The industry has been wrong to focus on the tools of the attackers, the exploits, which are very changeable," says Dmitri Alperovitch, chief technology officer and cofounder of CrowdStrike, a startup in California founded by veterans of the antivirus industry that has received $26 million in investment funding. "We need to focus on the shooter, not the gun—the tactics, the human parts of the operation, are the least scalable."

CrowdStrike isn't ready to go public with details of its technology, but Alperovitch says the company plans to offer a kind of intelligent warning system that can spot even completely novel attacks and trace their origins.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

BYOD: The downside is beginning to show

BYOD: The downside is beginning to show | opsreview | Scoop.it
The bring-your-own-device trend has taken off, based largely on the popularity of iOS and Android smartphones and tablets.

A large insurance customer of ours has gone the BYOD route, but their sales agents are now complaining that business-critical data, previously delivered quickly to one brand of company-issued mobile device, is no longer performing at needed speeds or availability levels. In this example, supporting BYOD is having a profound impact on the overall user experience, resulting in a decline of employee productivity while support costs increase.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

10 predictions for enterprise mobile for 2012

10 predictions for enterprise mobile for 2012 | opsreview | Scoop.it
Yes, it's that time of year of for predictions for what we might see in the next twelve months.
more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Japanese researchers break record for Terahertz Wi-Fi transmission

Researchers from the Tokyo Institute of Technology in Japan claim to have broken the record for wireless data transmission in the Terahertz band with a data rate 20 times higher than most current Wi-Fi connections.
The Terahertz band sits between the microwave and infrared regions of the spectrum and ranges from 300GHz to just under 3THz. The band is unregulated by telecoms agencies and is used primarily for imaging in research environments, because so-called "T-rays" cause less damage than X-rays when penetrating materials.
Using a wireless radio no bigger than a penny, the researchers were able to achieve a data transfer rate of 3Gbps at a frequency of 542GHz, smashing the previous record set by electronic component firm ROHM, which demonstrated a 1.5Gbps transfer rate at 300GHz in 2011.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

IBM CIO discusses Big Blue's BYOD strategy

The company has issued a series of "secure computing guidelines" to employees in an effort to raise awareness of online security and the sensitive nature of corporate data.


 IBM CIO Jeanette Horan has plenty of IT projects and systems to worry about, but perhaps one of the most pressing and timely is Big Blue's ongoing BYOD (bring your own device) rollout, which is aimed at including all of the company's 440,000 employees over time.

The IBM workforce is "hugely mobile," with many working at client sites, home offices and other locations outside corporate buildings, Horan said in a recent interview at IBM's office in Cambridge, Massachusetts. IBM has long had a corporate managed mobile-phone plan that historically has focused on BlackBerrys, she said.

But over time, more iPhones and other devices began cropping up in the workforce, and IBM decided it was time to get in front of the issue, Horan said. "If we didn't support them, we figured they would figure out how to support [the devices] themselves," a no-no given the amount and nature of corporate information potentially at risk.

IBM's BYOD program "really is about supporting employees in the way they want to work," Horan said. "They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business."

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Virtualizing waste – An expensive mistake?

Hidden costs of virtualisation
Hosting multiple virtualised servers requires more CPUs and significantly more memory, both of which contribute to power requirements and heat output. If growth is not managed, energy demand will increase as organisations purchase more high specification host servers to support the growing number of virtual machines. This is a hidden cost for facilities departments.
In addition, initial savings gained from virtualisation will be lost if virtual machines continue running when no longer required. Research and advisory firm Gartner refers to this as a 'Virtualisation Catch 22' .

Make virtualisation more efficient
New efficiency tools can help identify what is useful and when, making it easy to establish a process for reclaiming unused resource and avoiding unnecessary spend on new resource. The Green Grid’s Data Centre Compute Efficiency Metric (DCcE) is a good example of how useful work can be calculated. The Green Grid considers a server has a primary purpose where all resource should ideally be used. Any resources allocated to secondary operations detract from the ideal and are wasteful. Often virtualisation projects do not include these metrics, limiting the benefits that can be gained in efficiency.
In addition to metrics, a company can also do the following to help realise the benefits of virtualisation:
Optimise the environment – Look at assessing efficiency as well as uptime and performance. Efficiency audits identify hidden leaks in terms of cost, wasted energy, unused software, inefficient hardware and legacy systems that should be decommissioned, rather than virtualised.
Set a benchmark for efficiency – Once the percentage of servers doing useful work has been identified, a benchmark for efficiency can be established making it easier to monitor for sprawl in the future.
Improve IT waste discovery – Be prepared to find waste. When communicating audit benefits back to the business, champion savings made or that stand to be made, in quantifiable cash, energy or tonnes of reduced CO2 emissions.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Inside Out: A new way of using Salesforce Chatter Customer Groups

Inside Out:  A new way of using Salesforce Chatter Customer Groups | opsreview | Scoop.it
From the day Salesforce released Chatter (their secure private social network for businesses) there were calls to open up the network to customers. It was fantastic having your team collaborating on an opportunity or a project, but often with larger deals or partnerships there were external people who needed to be included.

In the Winter’12 release Salesforce introduced Chatter Customer Groups – a feature that enables you to invite third parties to specific Chatter groups in your org. Your customers (who could be prospects or partners!) can only see the groups you have invited them to so there is no risk of secure data finding it’s way into their hands.

Now the downside – in order to maintain this security, your customers will receive invites and logins to your Salesforce org. Their login might look like firstname.lastname@guest.yourcompany.com. If they are not already Salesforce users then this might not be a problem, but if they are, you are putting the responsibility on your customer to maintain two Salesforce logins. If your objective is to collaborate with your customer or partner then you might be missing a trick.

Before you set up a Chatter Customer Group ask your Customer/Prospect/Partner if they already use Salesforce. If they do then ask them to set up a Chatter Customer Group in their own org and invite you and your colleagues in as ‘the Customers’.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

Ultramain flies high with e-Cabin software for iPad, other tablets - New Mexico Business Weekly

Ultramain flies high with e-Cabin software for iPad, other tablets - New Mexico Business Weekly | opsreview | Scoop.it

Ultramain makes maintenance and logistics software to monitor and plan for upkeep and repair of vehicles, facilities and other assets. It sells to maritime, transit and military users. Its biggest customers are in the aviation industry, where giants such as Virgin Atlantic Airways , Hong Kong-based Cathay Pacific Airlines and Emirates have used it for years.

McCausland will demonstrate Ultramain’s e-Cabin software during the luncheon. e-Cabin allows flight attendants to manage all passenger and cabin-related issues electronically while in flight using an iPad or other tablets.

more...
No comment yet.
Scooped by Governance Team
Scoop.it!

How the CIO Can Establish a BYOD Usage Policy — CIO Dashboard

How the CIO Can Establish a BYOD Usage Policy — CIO Dashboard | opsreview | Scoop.it
Developing a BYOD strategy can stir up a hornet’s nest of issues for the CIO at the nexus of technology, HR and legal.

My colleagues in the Entertainment Media group address what you should consider when crafting a BYOD usage policy:

  1. Require employees to sign binding agreements that say that their computers, including their personal data, could be wiped in the event the computer is lost or stolen
  2. Require employees to back up personal information stored on the devices and explain that the organization cannot be responsible for loss of personal files
  3. Require employees to relinquish some rights to control the device and mandate that they install a mobile device management client, encrypt their device and email and use strong passwords
  4. Outline the support and repair policies for the equipment
  5. Get upfront permission from the user to wipe corporate data and applications from the device when he or she departs the company, voluntarily or otherwise
  6. Explain to employees that they will be responsible for costs associated with excessive data use, excessive 411 calls or selection of smartphones that are more expensive to use in some circumstances, if your company retains management of the smartphone service plan
more...
No comment yet.