Over the course of 2015 I was exposed to many companies going through Lean software delivery transformations – some very successful, but many less so. Having this visibility into the software lifecycle architecture of such a broad range of the world’s leading organizations was eye opening.
Here’s what I found: most leading IT organizations are going through some kind of Lean transformation. The ones that succeed in accelerating software delivery will thrive. Those that fail will fall behind. And those that take no action, but continue down the complacent road of delivering software in the slow ways of yesteryear, will be displaced by their nimbler enterprise counterparts, or by startups. This will happen much more quickly than they realize. One of the most interesting things I learned was just how fast the return on investment from a successful transformation is, which spells market-changing dynamics for the Have and Have Nots of software delivery transformations in 2016 and 2017.
Monthly Archives: January 2016
Why Small Businesses Still Don’t Take Cyber Security Seriously By @NateMVickery | @CloudExpo #Cloud
Although corporate giants realized the danger of cyber attacks and cyber crime in general, especially after attacks on Sony and Zappos, as well as the very sensitive data breach that struck Ashley Madison website, small businesses still don’t do much for making their networks more secure.
Statistics say that more than half of all small businesses in the US don’t provide security training for their employees, only one quarter conduct outside party security tests, and more than 40% don’t produce backup copies of their most important business files, in case something goes wrong.
Synergy Declares 2015 “The Year of the Cloud”
Synergy Research Group has recently declared 2015 “The Year of the Cloud,” as 2015 featured unprecedented growth in the cloud industry. For the first time, cloud infrastructure and service became the norm in enterprises. The study measure the growth of six different cloud sectors, including Software as a Service (SaaS) and the public cloud.
Between the fourth quarter of 2014 and the third quarter of 2015, total cloud revenue reached $110 billion, according to Synergy. This means that all measured sectors displayed a 28 percent annual growth rate. Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) showed the highest growth rate during 2015 (51%) with private and hybrid cloud services following with a growth rate of 45%. All sectors measured experienced a growth rate of at least 16%. $60 billion was spent on infrastructure hardware and software, while $30 billion was spent on the development of the private cloud. Investments also returned large sums with $20 billion resulting from cloud infrastructure services and $27 billion coming from Software as a Service (SaaS) and other internet services.
Synergy Research Group Chief Analyst John Dinsdale commented, “Cloud technologies are now generating massive revenues and high growth rates that will continue long into the future, making this an exciting time for IT vendors and service providers that focus on cloud.”
Cisco Systems, Amazon, and Microsoft continue to dominate the cloud industry. While the cloud infrastructure industry has experienced massive growth in 2015, other cloud services, such as cloud security, may have their chance to dominate in 2016.
The post Synergy Declares 2015 “The Year of the Cloud” appeared first on Cloud News Daily.
The Answer to Shadow IT Is at Your Fingertips | @CloudExpo #Cloud
Shadow IT is here to stay. IT departments need to appreciate that it is so culturally inbuilt that shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness. The battle that can be won is to better educate staff and make Shadow IT an integral part of the company’s wider security awareness program. Some staff are aware of the problems, and will ignore them, but many just simply won’t understand why what they are doing could affect the whole business.
The ‘Cloud Builder’ Awakens | @CloudExpo #Cloud
I have traveled extensively over the final quarter of 2015, meeting with customers, prospects and partners. There is something about being on the road that gives clarity to business and as a result, it is clear in my mind that Information Technology is witnessing its greatest period of change. The Internet of Things, Cloud and Big Data are driving the massive growth of new applications and data. Rapid rates of application and data growth are forcing organizations to move away from legacy scale-up approaches to ones that provide seamless scale-out. Siloed and monolithic approaches to delivering storage, compute and network resources must be replaced by integrated and elastic infrastructure and services consumption models.
Multi-Cloud Microservices | @CloudExpo #BigData #DevOps #Microservices
The Microservices architectural pattern promises increased DevOps agility and can help enable continuous delivery of software. This session is for developers who are transforming existing applications to cloud-native applications, or creating new microservices style applications.
In his session at 17th Cloud Expo, Jim Bugwadia, CEO of Nirmata, introduced best practices, patterns, challenges, and solutions for the development and operations of microservices style applications. He discussed how application container solutions can be used to efficiently deploy and operate these applications in a highly scalable and flexible manner. He also included a live demonstration of how microservices applications, packaged in Docker containers, can be deployed and managed across public and private clouds in a fully automated manner.
IIoT Top News: IIoT Predictions and Innovations for 2015-2016 | @ThingsExpo #IoT
As we inch our way closer to the New Year, we would like to take a moment and appreciate some of the technological advancements of 2015, as well as a few bold IIoT predictions for our connected-world enthusiasts. This medley of top news gives credit to our inventiveness, while highlighting a future forecast for IIoT.
No matter your place in the world, drones have captured our attention. Precision Ag has changed the way farmers care for crops and animals. So naturally, more and more farmers would be jumping on the drone plan of action. Recently, the FAA has been putting a major kink in the farmer’s right to use drones in farming. The ruling states that if a farmer uses a drone for farm operations in any way, they must file with the FAA for a commercial exemption to use that technology legally. New permanent rules for drone usage could be in place next year from the FAA. So time will tell how the FAA’s ruling will impact the farmers and other commercial drone users in this country.
Big Data Accelerates with IoT | @ThingsExpo #IoT #M2M #API #BigData
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Tapping into the Full Potential of the Cloud By @MadhavanK | @CloudExpo #Cloud
Cloud adoption across enterprises is accelerating and this momentum will continue to be a core focus for many organizations in 2016. Realizing we are still in the early stages of the cloud migration tsunami is both exciting and scary at the same time.
When it comes to the cloud, unprecedented opportunities lie ahead that can be capitalized upon. There is also a serious threat of being left behind if not well prepared. Cloud enabled IT will percolate throughout all parts of the enterprise in some form or another. Every single aspect of IT – including server infrastructure, networks, storage, application development, packaged apps, and applications management – will all be touched and transformed by the cloud in short order.
VMware beefs up security, announces IBM and Intel collaborations
VMware has moved to patch flaws in several of its services and has worked with Intel Security to beef up its protection of mobile cloud systems.
In a security announcement on its web site VMware told clients that versions of VMware ESXi, Workstation, Player and Fusion for Windows suffer from a kernel memory corruption which could be exploited.
Earlier this week VMware announced that it is working with Intel Security on two joint mobile initiatives involving AirWatch. It has also joined the Intel Security Innovation Alliance.
The two vendors will allow clients to share mobility data via the McAfee Data Exchange Layer, a component within Intel Security’s system. The integration of AirWatch with Intel Security technologies will help customers get more out of their existing security investments, resolve mobile threats more quickly and reduce operational costs, claims VMware. Additionally, Intel Security has joined the AirWatch Mobile Security Alliance (MSA).
The alliance formed by Intel Security and VMware addresses three areas of enterprise security: data protection, threat detection and prevention and security management with integrated workflows.
Mobile business transformation will run its course much quicker if companies can get their foundation security system to work with their mobility assets, according to Noah Wasmer, VP of mobile engineering and product management for end-user computing at VMware. “This partnership with Intel Security will deliver a complete mobile security solution. McAfee Data Exchange Layer will communicate essential threat intelligence that can help drive faster response and remediation,” said Wasmer.
News of another partnership was announced on the VMware site, which unveiled a new VMware IBM Partner Hub. This new sales enablement portal has been modified to make it easier for IBM partners to get sales assets, training and event information pertaining to the two companies’ joint efforts on Cloud, Systems, Networking, Mobility and Resiliency. Access is restricted to those with an IBM or VMware email address.