27
Dec 13

Rich Miller – The Year in Downtime: The Top 10 Outages of 2013

Fires. Floods. Power problems. Software updates gone bad. Thermal events. There was a wide range of causes for data center downtime in 2013. The year’s major outages covered the spectrum, affecting clouds, companies, payment networks and governments at the federal, state and local level.

Each incident caused pain for customers and end users, but also offered the opportunity to learn lessons that will make data centers and applications more reliable. Here’s a look at our list of the Top 10 outages of 2013:

1. The Healthcare.gov Disaster: Downtime doesn’t get much more epic than this. The federal government’s online insurance marketplace has become the poster child for an IT project gone wrong. It wasn’t just a matter of a single downtime incident, it was a series of hard outages and an ongoing soft outage in which the site was barely functional. They tried adding more hardware, but it wasn’t until the Obama administration’s “IT surge” addressed software and data bottlenecks that the site became usable in early December. Given the status of the Affordable Care Act as the signature legislation, and the accompanying political scrutiny, the web site’s performance amounted to a perfect storm of the many ways in which key systems can fail. If nothing else, Healthcare.gov transformed web site performance into front page news.

2. Major Outage for BlueHost, HostGator, HostMonster – The year’s most extensive web hosting downtime occurred Aug. 2, when a Utah data center supporting some of the industry’s best known brands suffered extended networking outage. The problems at a Provo, Utah facility operated by Endurance International Group led to downtime for customers of BlueHost, HostGator and HostMonster. Endurance attributed the incident to a hardware failure during routine server maintenance that “quickly cascaded throughout the network.”

More of the Data Center Knowledge article


26
Dec 13

ZDNet – CIO / CMO impact: Three disruptions that demand your attention

Summary: Venture capitalist, Fred Wilson, presents important business model innovations in enterprise technology. Corporate leadership should listen and learn.

Venture capital investor, Fred Wilson, is a keen and deep-thinking observer of enterprise software trends. During a talk at the LeWeb conference, in Paris, Wilson presented his framework for evaluating startup investments.

His ideas offer an interesting view for CIOs and CMOs who want to drive beneficial organizational change by innovating with technology.

Hierarchies vs. networks. Wilson presents the idea that “technology-driven networks of individuals” can replace bureaucratic hierarchies in some situations. Management in traditional organizations use a pyramid style, command and control communication structure to execute directives and receive feedback. However, when communication and transaction costs are sufficiently low, technology can enable information to flow without hierarchical intermediaries, creating a more rapid and efficient exchange of information than would otherwise be possible. This shift, from command-oriented to peer-oriented information flows, is having a profound impact in certain industries.

For example, Twitter has replaced the newspaper as source of news for many people. Instead of editors specifying stories and dispatching armies of reporters and photographers into the field, Twitter users gather and share news spontaneously, creating a broader network of sources than would be possible for any newspaper. In a refinement of this concept, Timeline Labs, founded by entrepreneur Malcolm CasSelle, analyzes social media data to surface real-time stories for television news; Timeline relies on peer sharing and data analytics to disrupt the traditional news room. Other examples can be found in industries as diverse as hotels (Airbnb) and music distribution (SoundCloud).

By replacing centralized hierarchies with distributed networks of individuals, technology can lower costs and dramatically increase operational efficiencies, compared to what is possible with top-down information flows.

More of the ZDNet article by Michael Krigsman


24
Dec 13

Continuity Central – Managing complexity in your business continuity planning

Ray Abide looks at the concepts of detail complexity and dynamic complexity in the context of business continuity planning.

Over an extended period of time, I believe that a conventional instinct is to add more specifics and detail to our business continuity plans. This may be guided by increasing complexity in the subject business or by our improved understanding and planning maturity brought about by plan exercises or experience gained by plan activation during a crisis.

While this increasing detail and texture in the plan may seem to be an improvement or an enhancement, it is only true if the incremental planning addresses the type of complexity that can be reduced or eliminated, in advance.

In Peter Senge’s 1990 book, The Fifth Discipline, an excellent text on the topic of organizational learning, Senge distinguishes between two types of complexity (pages 70-71): detail complexity and dynamic complexity. He defines detail complexity as the sort of complexity with many variables, which is what we typically think of when we think of complex issues. The second type, dynamic complexity, refers to situations where cause and effect are subtle, and where the effects over time of interventions are not obvious. Traditional planning methods are not effective in dealing with dynamic complexity as dynamic complexity is much more qualitative in nature than is detail complexity. The variables and their interrelationships do not readily lend themselves to a solution provided by a comprehensive task list or documented instruction set.

Before I read Senge’s book, I referred to the business continuity method of addressing dynamic complexity by developing a plan that was more of a roadmap than a recipe. The idea is that the roadmap would guide a recovery team allowing their expertise and experience to navigate ambiguity whereas a recipe infers that this is unnecessary if the team strictly adheres to an all-inclusive recovery plan or recipe.

More of the Continuity Central article by Ray Abide


23
Dec 13

Continuity Central – Key information protection and governance trends

Espion predicts some key information protection, governance and ediscovery trends which will affect organizations over the coming 12 months:

1. Social discovery – a new frontier for the legal profession
The acceleration in the number of cases involving evidence from social media and the Internet (such as Facebook, Twitter, webmail, website data and YouTube videos), will put greater emphasis on the importance of employing best practices to collect, preserve and produce such online datasets.

Internet investigations and in particular social media, represent a new frontier for the legal fraternity. The scope for finding digital evidence such as photographs, status updates, a person’s location at a certain time, as well as content from social media accounts, will be an enormous burden on organizations.

2. Data breaches: anger will turn to action
High profile data breaches continued to make headlines throughout 2013. With each breach came greater awareness and understanding of often complex issues with the management of data becoming not just an IT issue but a business one.

Espion predicts that consumers will be increasingly savvy around personal data privacy issues and will lose patience with organizations that fail to act responsibly. 2014 will see those affected by breaches take even greater action – sharing their experience on social media and increasingly reporting to relevant bodies such as the Information Commissioners Office (UK) or the Data Commissioner (IRE).

More of the Continuity Central article


18
Dec 13

CIO Journal – Client Data Trial Illustrates Ambiguity in Cloud

A Manhattan judge said that an accounting firm misappropriated a wealth manager’s cloud-based client list, in a case that illustrates the ambiguity that can surround how companies control third party storage.

Manhattan Federal Judge Robert Sweet said Weiser Capital Management LLC improperly took data from its former employee Debra Schatzki when it cut off her access to a database that contained her client business, after she was fired in 2010. But the judge stopped short of issuing a summary judgment in the case, which was first reported by the New York Daily News. The case goes to trial next month. An attorney for Weiser declined to comment on the case. “We don’t want to litigate through the media,” he said.

While centuries old law on information ownership still applies to new technologies, the cloud can sometimes muddy the distinctions of who has control the data, say legal observers.

More of the WSJ blog post by Joel Schectman


13
Dec 13

CIO Insight – The CIO’s Secret Weapon: Stakeholder Pressure

The roles of the CIO, and Chief Information Security Officer (CISO), have changed considerably over the past decade. Chief amongst these changes are that the security-based demands from company stakeholders have increased substantially as a result of major technological and cyber advancements.

Cyberspace is constantly evolving; its potential and real threats, vulnerabilities, complexity, and interconnectivity are always changing. The threat is asymmetric as activists, cybercriminals and nation-states disproportionately increase traditional information risks. In many organizations, cyber-security opportunities and risks have become a board-level issue, so the CIO, like the CISO, must engage at the boardroom level, where information strategy and risk should sit comfortably with other types of strategy and risk that the board oversees.

Information Security Under Pressure
Highly publicized breaches, and more stringent regulations, have put the spotlight on information security in most organizations around the world.

In a recent report, “Estimating the Cost of Cybercrime and Cyber Espionage,” conducted by the Center for Strategic and International Studies (CSIS) and sponsored by McAfee, it is estimated that cybercrime and cyber-spying are costing the U.S. economy $100 billion each year and the global economy perhaps $300 billion annually. Malicious cybercrimes are estimated to cost as many as 508,000 jobs in the U.S. alone. This has put unprecedented pressure on C-level executives to assure stakeholders that sensitive information is secure. And as information security moves up senior management and the board’s agenda, pressure will continue to mount. Like CISOs, CIOs must be able to shape the message and relay their successes to the board to sustain high-level support for security initiatives. A recent CEO survey, conducted by PwC in its Annual Global CEO Survey 2013, cited cyber-security as having the third highest possible impact on organizations—even ahead of a natural disaster disrupting a major trading and manufacturing hub or military tensions affecting access to natural resources.

More of the CIO Insight article


11
Dec 13

Network World – The worst IT project disasters of 2013

IDG News Service – Trends come and go in the technology industry but some things, such as IT system failures, bloom eternal.

“Nothing has changed,” said analyst Michael Krigsman of consulting firm Asuret, an expert on why IT projects go off the rails. “Not a damn thing.”

“These are hard problems,” he added. “People mistakenly believe that IT failures are due to a technical problem or a software problem, and in fact it has its roots into the culture, how people work together, how they share knowledge, the politics of an organization. The worse the politics, the more likely the failure.”

Here’s a look at some of this year’s highest-profile IT disasters.

Healthcare.gov: By now everyone knows about the health insurance shopping website’s problems upon the Oct. 1 go-live, when many users couldn’t access the system and only about 30 percent were actually able to sign up for health care.

More of the Network World article by Chris Kanaracus


10
Dec 13

CCJ – Cloud hurts: Server sales continue to slump

The latest server sales tally indicates that higher end systems are increasingly looking like glorified PCs that will experience the same slowing growth picture in the future.

And the cloud is increasingly getting the blame. Cloud computing is to server sales what tablets are to the PC market.

IDC said that server sales fell 3.7 percent in the third quarter to $12.1 billion. Gartner pegged server sales at $12.34 billion, down 2.1 percent from a year ago. Both research firms indicated that HP was the market share leader. HP and Cisco were the only server vendors to show growth in the third quarter.

The reasons for the server slump officially go like this:

Integrated systems are selling well and the market is consolidating.
Unix server sales are in a downward spiral.
And economic conditions are dicey in multiple regions.

More of the Cloud Computing Journal article by Larry Dignan


09
Dec 13

CIO Insight – The IT Rich Get Richer

The gap is widening between those organizations that know how to get the most business value of IT and those that don’t view IT as a strategic imperative. The latest version of the annual High Performance IT survey of 202 CIOs conducted by Accenture finds that of the organizations that are high performers, when it comes to using IT to drive the business suggest, most of them are focusing their IT investments on improving customer interactions. In its “High Performers in IT: Defined by Digitial” report, Accenture defines a high performer IT organization using 67 indicators, of which only 13 of the 202 CIOs surveyed were able to meet. By and large, those 13 high performer CIOs are more successful when it comes to employing emerging technologies to create material business advantages.

More of the CIO Insight article and slideshow by Michael Vizard


06
Dec 13

CIO Insight – The Fallacy of IT Consumerization

A global survey of 1,600 business and IT decision-makers conducted by Loudhouse Consultancy on behalf of Alfresco, a provider of open source enterprise content management (ECM) software, finds that when it comes to collaboration, internal IT may still know best. Despite all the hype surrounding the consumerization of IT in the age of cloud computing, the Alfresco research indicates that both business decision-makers and the internal IT organization would rather see internal IT delivering these services. But the survey also finds that the main challenge facing IT, in terms of delivering these capabilities, is where anything that pertains to collaboration ranks in the overall list of IT priorities – See more at: http://www.cioinsight.com/it-strategy/messaging-collaboration/slideshows/the-fallacy-of-it-consumerization.html/#sthash.jymlOVIj.dpuf

More of the CIO Insight article and slideshow by Michael Vizard