Oracle and Fujitsu to team up for enterprise cloud services in Japan

(c)iStock.com/ricochet64

Oracle and Fujitsu have announced a new strategic alliance to deliver enterprise-grade cloud services to customers in Japan and their subsidiaries.

The partnership aims to bring Oracle’s cloud application and platform services to Fujitsu’s cloud service, K5; installing Oracle’s cloud services into its data centres in Japan and connecting them to K5.

The first Oracle cloud app being offered to Fujitsu customers as part of the new deal is Oracle HCM Cloud, regarding, as the name suggests, HR and human capital management. Fujitsu for its part will implement Oracle HCM Cloud to gain ‘unprecedented insight’ into the company’s global workforce.

“We at Fujitsu support the digital transformation of our customers, and aim to contribute to optimised customer systems and business growth with the rollout of our Digital Business Platform MetaArc,” said head of digital services business and CTO Shingo Kagawa. “Oracle is a leader in Japan’s database market segment and possesses strong capabilities in the [systems of record] domain. Now, as we look to strengthen MetaArc and K5, taking part in this strategic alliance with Oracle will work to meet the cloud needs of our customers.”

Fujitsu’s infrastructure offering in EMEA was recently tracked by analyst house IDC, alongside nine other vendors, finding that EMEA cloud IT infrastructure revenue had grown by 17% to £1.3 billion (£1bn) in the first quarter of this year. In September last year, the Japanese giant announced Fujitsu Cloud Services Management, a service which enables unified management of cloud environments across different departments within an organisation.

“We strongly believe this cloud alliance will support Japanese companies to drive digital transformation,” said Hiroshige Sugihara, president and CEO of Oracle’s Japanese arm. “This will be a gateway for customers to achieve standardisation, modernisation, and globalisation.”

SaaS for SMBs: The main meal, not the side salad

Door to new opportunityWe know that telcos are well-placed to sell cloud services to small and medium-sized businesses. Even if they don’t always know it yet, the business customers they provide telecoms services to need to embrace digital services to succeed, and telecoms providers are trusted to deliver technology that meets their stated needs. Cloud is very much at the forefront of most telcos’ thinking, in terms of how it can be used to serve their own operational requirements, but also as a delivery mechanism and opportunity for providing business customers with a range of additional services. They are increasingly offering a catalogue of cloud applications that can provide business customers with efficient tools to help run their organisations without the cost and complexity of buying, running and maintaining software from myriad, discrete providers.

But while this is good in theory, the practice is somewhat different. In the last two to three years, there has been a lot of talk about the opportunity that exists, but for most this opportunity has not resulted in a significant new revenue stream. And building new revenue streams are vital for operators.

Voice and data revenues are declining so portfolio diversity is necessary if operators are to remain profitable. Providing cloud services remains one of the most obvious routes to diversity – which makes its current stagnation a bit of a worry.

Through a number of interviews and workshops, BCSG has identified some of the key factors that have stopped telcos from making the most of the opportunity.

Getting it wrong

Unfortunately, selling cloud services as “just another add on” doesn’t work as it might with other services for small businesses. The telco may be a natural provider of these services, but to reach the mass market customers need to be educated on how the solutions can bring value and why the telco should be considered as the vendor – it is, after all, a service of the type that the business may have previously acquired from elsewhere.

Many telcos are failing to making it clear why businesses should buy from them – the value of these joined-up digital solutions (alongside existing services, for example a device, a 4G connection and the ability to access their business files on the move) are not being communicated to the customer.

Additionally, many telcos are not communicating in an effective way, preferring a ‘big bang, product push’ approach to marketing – all products, all channels, all customers, all at once. This untargeted approach is not winning business.

Getting it right

To be successful, telcos need to understand their own customers better. What would they most benefit from? How well do they understand their own needs? How can they get a busy business owner to stop and take time to consider how to become more efficient with a new application? How could the business grow as a result of a new cloud marketing solution?

Without understanding how to take a customer on the journey, knowing what education they will need, and having a clear idea of the barriers they will face, customers won’t adopt the services or reach the point where they are getting good value, a must for any SaaS product. Developing this customer understanding enables providers to deliver a targeted approach that personalises the engagement. Once that baseline of customer understanding is established, telcos can begin the education process that underpins a path to purchase and ongoing use. At this point, targeted marketing must take customers on a journey that builds understanding of, comfort with, and desire for the services available. Telcos could help businesses understand, for example, how a mobile device can be combined with cloud-based software that creates online forms to save time completing admin outside of working hours or how a tablet and email marketing app can be used together to create the next campaign to find new customers in dead time waiting for a flight in an airport.

Working with the software vendors (ISVs) to provide insight about customers and their products is critical – they are, after all, the experts on their product. ISVs already sell their products through a number of channels and so should have the resources and expertise on hand to help with the sales process. There is no need to build something from scratch. While it might seem obvious, our analysis shows these key elements of the customer journey and marketing process are rarely followed.

Finally, once the understanding, education, customer journey and value is understood, telcos need to execute effectively. This means using the right marketing tools in the right way to reach the right customers at the right time. Taking a measured, staged approach to rolling out new services, using each opportunity to test, learn and scale, reduces risk and helps to avoid big bang launch, followed by re-launch 6 months later as the first approach hasn’t worked.

A lot of the steps and processes needed to create the right customer journeys can easily be automated using the right tools, such as marketing automation. These tools are also essential for the measurement and analysis of performance that helps to foster further learning about the customer.

Telcos have been told that “the time is now” for cloud services for several years, but up until now, with some exceptions, cloud services has remained a lacklustre business stream for telcos. Making cloud services the centre of attention, rather than an afterthought tacked on at the end of a sales call, will help telcos capture that all important cloud opportunity.

Written by Alan Marsh, Product and Marketing Director at BCSG

[session] Closing the Loop in IoT | @ThingsExpo @BsquareCorp #IoT #BigData

Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.

read more

The cloud is a utility, and we’re fine with that – AWS

amazon awsWhile the telco industry is fighting to avoid being relegated to the likes of utilities, AWS has already accepted cloud computing is commoditised, reports Telecoms.com.

As cloud as a concept continues to become normalized within the business world, the number of competitors is growing day by day. AWS would generally still be considered the leader in the market, though progress from Microsoft and Google, as well as a number of new players appearing has slightly eroded this dominant position. According to Brendan Bouffler, AWS’ lead for the team responsible for developing the scientific computing segment, the prospect of cloud becoming utilized would not bother the market leader.

“It already is,” said Bouffler. “You can move in and out of our cloud whenever you like. There’s no long term commitment as our standard terms and conditions last for an hour. You can sign up for an hour and then move out. We see it all the time. We’re constantly holding our feet to the fire and forcing ourselves to innovate, that’s how we keep customers.”

Within the telco industry, operators are fighting against the tide to prevent the business being classed in the same bracket as utilities. Competing on price and constantly attempting to undercut challengers is not a battle ground the industry wants to operate in. The telcos would like to compete on value adds and brand equity, though Bouffler believes there is enough untapped business in the cloud market for the utility model to be successful.

Estimates on the value of the global cloud computing market vary, though statista believes it is worth in the region of $114 billion this year. Should AWS continue its healthy start to 2016, it will account for $10 billion. By 2020 the market is predicted to grow to roughly $159 billion, offering plenty of opportunity for competitors to establish themselves, and AWS to continue its growth.

“Running a company like a hardware vendor does where they are looking for high margins is a legitimate business model, but ours is different to that,” said Bouffler. “We’re a high volume, low margin business and it’s successful for us. It was pretty successful in disrupting the retail industry in the way books were sold. As a consumer of books, I’m in awe of that. You can put books in the hands of people for almost pennies. We democratized reading and we’re going to do the same for cloud.”

Bouffler believes the disruptive nature of Amazon and AWS is fuelling future growth within the business itself. Competing on price is not a worry for the team, as this was the origins of the Amazon book business. Amazon was launched in 1994 and shook up the retail book industry. It drove down prices, opened up new distribution channels and created an entirely new way of consuming literature. Bouffler believes the same is being done for computing.

Although the telco industry is concerned with the direction it is heading, the potential for growth within the cloud computing industry means being classed as a utility is not necessarily a terrible fate for AWS. While there are some organizations who would like to create an industry with higher margins, Bouffler believes the origins of Amazon, the disruptive nature of the business and the experience of operating in a low margin/high volume environment puts the company in a strong position to compete and succeed in a utility environment.

“This is only the tip of the iceberg,” said Bouffler. “Some of our customers are people doing something they wouldn’t have usually done without cloud computing. It wasn’t that they were substituting for money which would have been spent on a hardware cluster, these are projects that weren’t going to happen. This is net new stuff. This whole net new universe is still in front of us, I think we’re only just scratching the surface.

“It’s incredibly sustainable. Even though we’re a low margin business and a high volume business we’re good with that. We’ve been doing this since Amazon came into business (22 years ago), and the model is still working. I think there is still tons to be done before anyone writes obituaries about that business model.”

Google adds media capabilities with Anvato purchase

Google AvantoGoogle has bolstered its capabilities in the video streaming market through acquiring video platform Anvato which will join its cloud business unit.

Anvato provides a software platform that fully automates the encoding, editing, publishing and secure distribution of video content across multiple platforms. The acquisition will improve Google’s capabilities to recruit media companies to its cloud storage business, in the long-term quest to gain ground on Microsoft Azure and AWS in the cloud market segment.

“Anvato’s Media Content Platform, which counts many large media companies as customers, will complement our efforts to enable scalable media processing and workflows in the cloud,” said Belwadi Srikanth, Senior Product Manager at Google. “The cloud is transforming the way video content is created and distributed to an array of connected devices, as well as the way users engage with this content. And in recent years, the adoption of over-the-top (OTT) technologies has emerged as a critical platform for delivering rich audio, video and other media via the Internet.”

Offerings such as Anvato’s have been pushed to prominence in recent years as more video content moves into the OTT category. Google already counts a number of media outlets as customers, including Sky News and Spotify, though the continuing OTT trend will generate more demand for cloud services. The Anvato purchase will add several other media heavy hitters to the customer list such as NBCUniversal, Univision, Scripps Networks, Fox Sports, Media General.

“We are thrilled to bring together Anvato with the scale and power of Google Cloud Platform to provide the industry’s best offering for OTT and mobile video,” said Alper Turgut, CEO at Avanto. “This will allow us to supercharge our capabilities, accelerate the pace of innovation, and deliver tomorrow’s video solutions faster, enabling media companies to better serve their customers.”

[session] IoT and Data Analytics | @ThingsExpo #IoT #M2M #API #BigData

From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams.
In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums.
John Paul is the CEO and Founder of VenueNext. Prior to VenueNext, he spent over 35 years as a founder, CEO or executive leader of product and engineering teams at startups and major technology companies. Most recently, he was Senior Vice President at Dish Digital where he created an Internet-based next-generation video distribution service, a continuation of his award-winning work at Sling Media, with the Slingbox product line, which was acquired by Dish in 2007. In 2002, Paul founded and created one of the first photo sharing services named Our Pictures Inc., which was acquired by Simple Star Inc. in 2005.
Prior to that, Paul was Senior VP and General Manager of the Server Division of Netscape, which was sold to Sun Microsystems for $1bn. After AOL’s acquisition of Netscape, he remained at the company as Executive Vice President. He was recently named one of the 60 Most Powerful People in Sports by Worth Magazine for his innovative contributions to the industry.

read more

Why cloud security best practices mean engagement from vendors and employees

(c)iStock.com/StockFinland

Ransomware may be the hot topic in the news at the moment, but human error is a greater threat. Human error, in fact, is often the reason ransomware is able to infiltrate a network (by staff members clicking phishing links, for example). It’s also one of the greatest causes of data loss in the cloud. The first part of this series discussed how cloud vendors, shadow IT and lack of employee cybersecurity education can increase the risk of human error. But how do you mitigate these threats? To start, follow the advice below.

Ensure your cloud providers are equipped to fulfil your compliance requirements

If a vendor will be handling sensitive data in the cloud, first thoroughly vet the vendor and ensure that the solution is adequately equipped to adhere to the requirements of the EU’s General Data Protection Regulation (GDPR). In addition to requiring companies handling personal data to report data breaches, the GDPR promises citizens the right for data to be forgotten, easier access to one’s data and a right to data portability.

What this means for you is that you need to know how your customers’ personal data is processed and be able to communicate that information clearly. You also need to ensure data is available so it can be easily transmitted between service providers (another reason you must have reliable backups) – unless an individual invokes their right to be forgotten, in which case you need to be aware of everywhere that data is stored and delete it. In the event a vendor accidentally deletes data, you need to know how the service provider plans to remedy the situation (the below section addresses this point further). (Note that these are only some of the requirements of GDPR. For more about Data Protection Reform, click here.)

Files should remain encrypted in transit and at rest, regardless of whether the data is subject to the requirements of the GDPR.

Review vendor SLAs

It’s important to verify that the vendor offers service level agreements (SLAs) that provide adequate recourse in the unfortunate event that data is lost. Be aware that SLAs are not equal to terms of service.

Whereas a vendor can change its terms of service without notice, they can’t change the terms of an agreement you’ve signed without your being aware of it. When reviewing an SLA, ensure that the vendor can restore your data within your recovery time objectives (RTOs). For example, Lukas Hospital in Neuss, Germany, had complete backups of all systems in place, but when it was plagued with TeslaCrypt 2.0 ransomware, the hospital estimated that it would take up to 48 hours before its IT environment was fully functional again. As a result, 20 per cent of the hospital’s surgeries had to be rescheduled, and less critical care had to be temporarily shifted to other hospitals.

Backups are the key to protecting yourself from data loss, but backup services provided by a vendor must be backed by SLAs and must meet your RTOs.

Educate employees about security best practices

To protect against threats, employees need to be aware of:

  • Who might view data. In addition to verifying that they’re sending data to the appropriate recipient, they should consider who else might be able to access the information. If uploading data to the cloud or placing it in a shared folder on a local area network, are there others who also have access to it? Are the files encrypted to deter unauthorised access to the data?
  • How to identify phishing emails. Instruct employees to view emails with a critical eye. Warning signs include poor design, incorrect spelling and grammar, requests for personal details, suspicious attachments and URLs that don’t match the company’s primary domain (to view a URL without clicking a link, users can hover over the link with their cursor).
  • Procedures for responding to a suspected ransomware attack. If employees encounter any suspicious activity, instruct them to notify IT. If a device is affected by ransomware, they should know to stop working on the affected device immediately.
  • Why it’s important to apply security patches. New security threats are continually emerging. In response to these threats, hardware and software developers create security patches that protect the device or application. Employees need to apply these updates promptly to ensure the company’s data and network are secure.
  • How to create secure logins. Encourage employees to create complex passwords that involve special characters, numbers and a mix of lower- and uppercase letters. Whenever possible, use two-factor authentication to increase security.

Taking these precautions reduces the chance of unauthorised access to data as well as ransomware taking your data hostage.

Create a culture of security

Your best defence against security breaches and data loss is creating a culture of security that begins from the top down and is supported by clear, enforceable policies.

Creating a data handling policy should begin with classifying data according to how sensitive it is. Personally identifiable details and health information, for example, should only be accessible to those who need that information to carry out their job duties. Set in place clear consequences for access to and use of that data outside of a person’s job duties.

You’ll also want to put parameters on how users access data. One of the greatest threats to data is employees who can access company files, databases and applications whenever they want, using whatever device they please. Although most UK businesses (95 per cent, according to a BT study) permit bring your own device (BYOD) practices, security is sorely lacking. BT’s research shows 41 per cent of organisations have suffered a mobile security breach, 33 per cent grant users unbridled access to the internal network, and 15 per cent lack confidence that they have the resources to prevent a breach.

It’s important to establish a BYOD policy that addresses issues such as data security, remote management, data transfer, backups, data wipe and technical support (office or field based). If you work with a managed services provider for your IT support, check to see if the vendor can assist with developing and supporting your BYOD program.

Creating a security culture where the IT department strives to address security issues while acting as a trusted adviser will also reduce the risk of shadow IT, as users will be more likely to enlist IT’s help in selecting and implementing cloud solutions.

There’s no denying that cybercriminals are targeting businesses with more sophisticated and frequent attacks – but you can’t afford not to address the threats within your own walls. By holding cloud vendors accountable through SLAs, reigning in shadow IT, educating employees and creating a culture of security, you can reduce your risk of cyber threats and minimise data loss. 

All you need to know about Virtual Office Space

Virtual Office Space The success of any organization is directly proportional to the productivity levels of its employees. This factor, in turn, depends on how satisfied employees are in the workplace. In today’s rapidly changing IT environments, the definition of a workspace is quickly changing as well. Organizations are trying to incorporate several new ideas […]

The post All you need to know about Virtual Office Space appeared first on Parallels Blog.

Encryption in the Cloud | @CloudExpo #BigData #IoT #M2M #ML #InfoSec

Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships.
In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.

read more