Industry news

  • 15 Sep 2011 12:00 AM | Anonymous

    The U.K. government is “way behind” the U.S. in the adoption of public cloud services, according to Marc Benioff, chief executive officer of Salesforce.com Inc.

    Benioff, who met with U.K. Cabinet Office Minister Francis Maude, said the government was too focused on building its own Internet-based computing and storage services, rather than using publicly available cloud systems.

    “The government should stop hiding behind the private cloud” in this way, the CEO said.

  • 15 Sep 2011 12:00 AM | Anonymous

    Asia’s first “Cloud Readiness Index” shows mixed picture of regional potential for harnessing the power and economic benefits of cloud computing

    Asia's first "Cloud Readiness Index," prepared and published by the Asia Cloud Computing Association, shows a mixed picture in terms of harnessing the power and economic benefits of cloud computing. The league table, which analyses 10 key attributes critical to the successful deployment and use of cloud computing technology in 14 countries across the region, shows that Japan is in the lead, with Hong Kong second and South Korea and Singapore following close behind in joint third place.

    China, and the fellow economic giant, India are in 8th and 9th place respectively – reflecting the challenges these economies must overcome in order to speed adoption and enjoy a brighter, more prosperous digital future.

    "Technology has always been a great enabler of opportunity for business, communities and citizens. Cloud technologies offer the potential for lowering technology costs and creating time to market advantages. Additionally, cloud technologies promise to securely democratize data access – and in doing so, creating a myriad of value-add possibilities across Asia," said Bernie Trudel, Chairman of the Asia Cloud Computing Association and Cloud CTO at Cisco APAC.

  • 15 Sep 2011 12:00 AM | Anonymous

    Fulham Football Club has implemented a new physical security system based on cloud infrastructure technologies.

    EMC has introduced a wireless IP Closed Circuit Television (CCTV) system on EMC unified storage, working with video management software provider Genetec: the solution is accessible on mobile devices, such as Apple iPads, allowing Fulham's security team to more effectively monitor crowd safety and improve stadium security.

    Fulham F.C. previously used a network of six VHS recorders and 27 cameras to observe the many thousands of visitors to the famous Craven Cottage ground. Based on a stand-alone storage infrastructure, this system was costly and difficult to manage and maintain, each camera required maintenance before every match and video tapes would have to be manually scanned in the event of a security incident.

  • 15 Sep 2011 12:00 AM | Anonymous

    The role of technology in BPO

    As IT and BPO converge to shape the future of outsourcing, businesses must make the best use of technology tools to run their multichannel service organisations. The surge in technology enablement has significantly improved business processes, when outsourced. It helps solve business problems and enables efficient outsourcing. It also delivers real benefits to customers, including:

    • Cost benefits and efficiencies

    • Customers are clearer on expectations from BPO, making outsourcing benefits less elusive

    • Global footprint expansion to provide cost flexibility and meet regional language needs

    • Data-driven, smart analytics-based decision making, replacing traditional dashboards

    Customers now demand business transformation and are confident of receiving it from their service providers.

    Technology routes

    With customers becoming savvier, service providers need to meet their specific needs – not just to prevent customer churn, but also to help maintain their bottom line. Customers are keen to know what the next big thing is and service providers need to stay on their toes to continually deliver new offerings to accelerate value delivery in a more sustained manner. The stress is on new innovations that create more standardised process models to improve efficiencies, reduce costs, and leverage best practices.

    Technology has proved to be the lynchpin, with the ability to create that ‘wow’ factor to addresses needs of both the customer and provider through benefits such as:

    • Economies of scale and improved accuracy through automation

    • Labour arbitrage

    • Ability to connect and monitor remote location workflows

    • Integrate buyers and service providers processes and technology systems

    • Improved communication and collaboration

    • Reduction in human error through automation

    While it’s clear that technology is fundamental to the process, customer success from outsourcing is dependent on opting for technology that complements their existing set-up. The most popular technology strategies are tie-and-run, core functional technology replacement, platform services, best-of-breed solutions and technology augmentation

    Let’s take a closer look at each of the choices:

    1. In tie-and-run, technology has a limited role where the service provider plugs into the buyer’s existing systems to deliver services.

    2. With core functional technology replacement method, the IT infrastructure and core functional application (F&A, HR, etc.) implementation is bundled with domain services (FAO, HRO, etc.) and technology ownership resides with buyer.

    3. In the case of platform services, the customer has to adopt pre-integrated applications and pre-built processes that are owned by the service provider and where pricing is built into the domain contract. With this strategy, customers may feel a loss-of-control, while security measures bring a ‘doubt factor’ with F&A processes in particular. For example, imagine two banks sharing the same platform for similar processes – the risk is high and the price of failure can be massive.

    4. Best-of-breed solutions have deep functionality, multiple features and address specific customer pain points. The options are many, but each solution is incomplete on its own as it fails to meet the breadth of customer requirements in a BPO set-up. This depth provided by best-of-breed solutions is not completely exploited as BPO requirements generally stay at the surface level and customers do not gain effective ROI on these higher cost solutions. In addition, integrating multiple point solutions has another set of challenges.

    5. In technology augmentation, the service provider implements tools that serve as ‘add-ons’ around the periphery of the existing systems to address specific gaps. Here, the customer has the ability to capitalise on their existing technology investments, while also improving their planning, reporting, and decision making processes. Implementing a technology-augmentation strategy is one of the leanest and quickest methods to reaping the benefits of outsourcing.

    The customer wish-list

    • Maximise return on technology investment: With an economy that demands a much tighter control on spend, it is natural for customers to want to minimise capital expenditures. There is undoubtedly a growing desire to add to the technology infrastructure, but only after completely sweating the current technology assets.

    • Minimal change management: The transformation is welcome, but only with minimal upheaval and when the overall implementation ‘experience’ is quick, efficient, smooth, and without any radical impact to employees’ every day responsibilities.

    • Outcome-based business model: Business models are undergoing changes and haven’t yet reached a definitive point. However, the shift is certainly moving away from the traditional pricing models that were FTE and transaction-based. Customers now wish to outsource business processes for measurable and significant business outcomes instead.

    • One-stop-shop model: Customers are increasingly looking for combined benefits from technology and BPO investment, with a single point of governance. They take process efficiency for granted in almost every BPO deal today – governance and effectiveness matter most, and the BPO provider landscape is changing dramatically in order to meet these evolving needs.

    • Increased governance and control: Customers are not ready to move all of their business processes in their entirety to be managed by the service provider, despite being assured of big benefits during the initial stage of the relationship. They are more in tune with the benefits of having absolute control over their outsourced processes at every step, irrespective of the new destination of the processes.

    • Intuitive business analytics: Customers are demanding speed and scale, as executives have a daunting task of ensuring overall organisational success, rather than merely focusing on their own business divisions. The number of performance indicators impacting the success or failure of business objectives is complex and calls for real intelligence to aid in decision making. Traditional reporting tools and dashboards for problem solving are passé and not sufficient for today’s business demands.

    Technology-augmentation scores

    Technology plays a major role in paving the future for BPO but the road is not totally clear. These challenges can lie in the technology features that customers are coming to demand as ‘must haves’ for a complete BPO offering, including:

    • Keep customisation to a minimum

    • Cater to a factory model of process execution, while accommodating operations’ floor-level variations

    • Automate completely but have manual intervention for deviations

    • Transition and ramp-up operations when rapidly evolving to a high-productivity model

    • Aid management in decision making with deep drill down on operational details

    • Move to outcome-based pricing

    • Have a single point of contact for all BPO-related technology requirements

    One thing that is certain is that business drives technology and not the other way around. Companies implement technology to enable outsourcing and solve business problems. Technology solutions that increase process effectiveness provide governance and control, and increase efficiency are welcome, but only if it does not junk their existing technology systems and applications, ERP systems, and supporting infrastructure. These are heavy investments with complex dependencies that customers can’t easily ‘rip and replace’.

    The ideal investment is in a breadth of technology that seamlessly integrates with the customer’s core systems, provides business outcomes, combines operational best practices, is standardised but configurable and customisable for specific nuances, protects investments and runs operations end-to-end – all implemented and hosted by one provider.

    Wipro BPO customers clearly connect with the technology-augmentation strategy. They see it as one of the leanest methods of empowering their existing ERP systems and overall technology infrastructure by using the required add-ons with minimal resources to deliver maximum benefits.

    Wipro BPO’s proprietary offering Base)))™ is a technology-enabled process-layer tailored for organisations that are not looking at disruptive changes to their existing technology landscape, but are keen to find solutions for specific business problems by leveraging existing technology with absolute visibility into their outsourced processes The technology-augmentation route provides business impact by unlocking hidden values, provides strategic impact by going beyond mere sustenance of operations, productises best practices, all of this with minimal CAPEX. It helps move a step beyond to fully meet the strategic needs of customers today.

  • 15 Sep 2011 12:00 AM | Anonymous

    Every important new information technology follows a similar path on the journey from promising new innovation to mainstream business productivity tool.

    There’s the “overhyped next-big-thing” phase, which is usually followed by an “emperor has no clothes” backlash. You can expect technology vendors to pass through a “hey, maybe I can sell more of that old solution with this new name” period, and business technology consumers to have their “if they’re using it, why aren’t we?” panic.

    Eventually, the “measurable evidence of value” moment arrives which paves the way for companies to transition to the all-important “aligning implementation to business strategy” stage.

    Cloud computing is moving along this path at remarkable speed, and with good reason.

    As recently as 18 months ago, “the cloud” was just another bit of confusing techno-jargon for most people. Today, however, there’s little doubt that cloud computing is transforming the way people create, access and use information and computing capabilities. And it’s quickly becoming obvious that cloud-based solutions can help companies cut costs, respond to changing business conditions with greater flexibility, and speed time to market.

    So, on the journey from breathless hype to strategic implementation, where is cloud computing right now?

    Think of it as the “double-edged sword” stage. This is the moment when companies discover that along with the expected benefits, an innovative new technology sometimes introduces unanticipated risks. During this stage, it is often unclear what steps a company should take to strike the right balance between the two.

    What is clear right now is that with evidence of the value of cloud computing coming into sharper relief, cloud-based technology has emerged as the number one IT focus for many businesses.

    A new Avanade survey of 576 C-level executives, IT decision makers and business unit leaders at top companies in 18 countries shows just how important cloud computing has become to enterprises around the world. When asked to name their top three IT priorities for the coming year, more executives said cloud computing (60 percent) than any other IT issue, including security (58 percent) and IT consolidation (31 percent).

    According to the survey, companies are looking to take advantage of cloud capabilities by increasing IT spending with an emphasis on solutions that help workers share information, streamline operations and understand customers. Companies are also taking steps to strengthen organizational expertise about cloud computing by expanding investments in employee training.

    But while business leaders are hoping to embrace the benefits that cloud services promise, they are also anxious about the potential challenges. Chief among their concerns is the uncontrolled proliferation of public cloud services – a problem we call “cloud sprawl.”

    According to the survey, 60 percent of executives are worried about the impact of unmanaged cloud services on their information infrastructure. One in five executives believes that it’s already impossible to manage the public cloud services that have crept into their organization.

    The difficulty, of course, is that the very nature of public cloud services means there are few barriers to stop employees from simply using a credit card to self-provision a useful new capability. This has created a situation at some companies where entire departments have provisioned cloud services that fall outside the reach of IT governance, creating huge potential risks to the security of company and customer information. In some industries, unmanaged public cloud services also raise the specter of serious regulatory violations.

    While nearly two-thirds of the companies surveyed have policies in place that prohibit employees from using unmanaged cloud services, the vast majority of respondents indicate there are no real ramifications for utilizing cloud services without going through proper IT channels. In fact, 20 percent of business leaders said they had purchased a cloud service themselves without approval from IT.

    In any case, companies that rely on blanket prohibitions to cut off access will miss out on important employee-driven initiatives that innovative cloud services make possible. In the process they may lose important opportunities to more nimble competitors. Ultimately, this poses an even greater long-term danger than the current short-term risks that cloud sprawl presents.

    Fortunately, there are steps that companies can take to manage cloud sprawl without sacrificing the opportunities that public cloud services can deliver.

    The key is to begin by defining an employee-centric cloud strategy that recognizes the value that Web services can provide and that maps IT policies to business objectives. This will demonstrate to business users that IT is committed to unlocking the potential of cloud technology inside the enterprise and it will open the door to clear communication between the IT department and business leaders across the organization.

    From there, it is important to conduct a comprehensive cloud audit to see how services are being used within the company and to identify not only potential vulnerabilities but also areas where cloud services are having a positive impact. This audit will provide the foundation for a migration roadmap for moving from cloud sprawl to alignment between business objectives and service deployment.

    Next, it is critical to communicate company cloud policies and strategies clearly and concisely, with an emphasis on the positive benefits that cloud services bring to the organization.

    Companies that follow these steps will give their IT department the flexibility to respond to employee needs and the tools to bring cloud sprawl under control. In the process, they will move their company from the stage where the cloud feels like a double-edged sword to something much more valuable –where a transformational technology begins to unlock dramatic improvements in productivity and opens the door to new ways of innovating and creating competitive advantage in a fast-changing marketplace.

  • 14 Sep 2011 12:00 AM | Anonymous

    Phil Evans, VP Sales for EMEA at Datacastle, examines the expanding market in data protection technology and the emerging issues driving this trend.

    The implications of the latest Gartner predictions are clear: a string of user-empowering consumer-IT technologies are steadily loosening the modern organisation’s grip on its workforce practices and on its most sensitive data.

    By 2012, 73% of the enterprise workforce will be mobile, and some 20% of companies will no longer own any IT assets, by 2013 80% of businesses will support a workforce using tablets and by 2014 almost all businesses will supply corporate data through smart-phone apps, as data migrates beyond office walls to the remote realms of virtual reality and cloud-services.

    Gartner’s latest predictions conjure up images of a data-security nightmare, providing a porthole into a future digital workspace of informational chaos, with endlessly multiplying mobile endpoints, sensitive data handled on home laptops and mobile devices, a growing stream of unencrypted, unprotected user data on employee endpoints, i-workers” closing lucrative deals in Starbucks, remote boards thrashing out mergers in virtual meetings and corporate data flowing, unfettered, across public networks.

    We know where these changes are coming from. The markets have shown for some time that the fixed PC endpoint is falling out of favour with the modern consumer, which means that, this year alone, 42 million tablets and 330 million new mobile devices will have been sold worldwide while the PC market continues to stagnate.

    But as corporate IT is increasingly infiltrated by consumer trends, with mobile data storage replacing fixed endpoints, the implications for data security are potentially disastrous.

    One recent report from the Ponemon Institute found that the average data breach incident cost UK organisations £1.9 million. And with the EU and Australia moving to enforce mandatory data-breach notification laws, the Financial Services Authority now flexing its punitive muscle and the ICO newly-armed with the power to impose crippling £500,000 fines on negligent organisations, data security is becoming a legal imperative.

    But in a services economy where reputation is the biggest business asset, and a 24/7 media culture where mainstream news is increasingly converging with user-generated media content, it is the instantaneous effect of data breaches on reputation, and corresponding share price, that most concerns businesses.

    The reputational cost of data breaches for global giants in today’s media environment was powerfully illustrated when Toshiba was recently hit by a massive data breach. The NHS recently compromised the medical records of £8.6 million patients after the loss of an unencrypted laptop, while just one missing BP laptop containing details of those affected by the recent oil-spill could cost the oil giant $2.78 million.

    Meanwhile, for an estimated 80% of SME’s, who can least afford such losses, data breaches could lead to bankruptcy.

    Spending on security solutions has massively increased, but many organisations are only adopting patchwork solutions. Of 160,000 laptops lost in Europe in 2010, 34% were encrypted, but only 26% were regularly backed up and many had no capacity for remote deletion. We also know that just 3% of lost devices are ever traced and many organisations no longer control which employees access sensitive data.

    This demonstrates the urgent need in the channel for single disaster-recovery and policy-control solutions that can combine the functions of data backup, encryption, port-locking, remote data-policy control, remote deletion and device trace, through one central agent.

    Consumerisation of IT

    Because consumer IT is geared towards data consumption rather than data creation and user empowerment rather than data privacy, without the right security solutions it has the potential to open the floodgates to catastrophic corporate data-loss.

    The personalisation of IT is now democratising corporate data, (in the same way user-generated digital media democratised news creation) with companies fast losing control of which tiers of employee access their data, or how sensitive information is communicated. The explosion in consumer IT, is spawning a new generation of digitally-empowered, hyper-connected workers who expect the flexibility to work both remotely or on-site to facilitate work/life balance, to freely share corporate data over public networks anywhere in the world at any time, select their own IT technology, and introduce everything from app-stores to social media into the workspace.

    The business community stands at a fork in the road. A recent ITC report gives a glimpse of one possible future, outlining the lack of corporate device encryption and the explosive growth in unauthorised use of personal devices to access corporate data, with businesses openly admitting they are floundering in the face of the new trend, due to a lack of governance policies, no integrated solutions to control what happens to important data inside and outside office walls, and an absence of sufficient will among management teams to solve the problem. In this environment, it is no wonder many businesses are falling foul of regulators, when they are failing to even ensure compliance with their own data policies.

    Yet rapid advances in encryption and cloud-based solutions mean that the technology to locally encrypt on the device, remotely store encrypted data and control access to existing data, or remotely delete and instantly restore lost data is already in existence for end points. Yet many businesses are not currently integrating all these solutions.

    Datacastle RED (Resilient Endpoint Data) software, uniquely in the market, combines all these functions through a single policy-controlled agent. Critically, at a time when remote cloud-storage is a concern for many businesses, the RED policy-engine can be operated either in a Private Cloud or through a Public Cloud such as Microsoft Azure or Amazon AWS as well as through partnerships with Authorised Service Provider cloud hosts in the UK, US, Germany, France, Italy, Spain and Scandinavia.

    As data breach becomes a hot-button issue in the media, portable devices increase data vulnerability, the number of endpoints continue to multiply and Governments tighten the law, the market in end point data security is set to explode.

    Datacastle already deploys RED across 12 countries and multiple languages, but it is the adaption of this technology to mobile devices which may hold the key for the future control of data security. The extension of RED technology to the mobile market will, for the first time, consolidate data-control, backup, remote deletion, device trace and automatic at-rest encryption into a central agent operating with every endpoint, from tablet to PC, finally restoring corporate control over its remote data across the myriad devices and mobile workforces of the future.

  • 14 Sep 2011 12:00 AM | Anonymous

    Cloud Computing is here to stay, but what is driving growth in this area over the next 12-18 months?

    Whether it’s saving costs, a need for more efficient IT processes or a desire for the latest technology upgrades, organisations are looking at options to become more agile in IT consumption and remove the expensive boxes in their computer rooms by outsourcing key IT services to third party providers. Vendors are beginning to make this transition easier by offering pay-as-you-go services from the cloud at an affordable monthly cost, which of course is enhancing their own profitability at the same time.

    We’ll see this accelerate at pace over the next six months, with most vendors offering cloud based solutions that will enable organisations to make the transition. As confidence in the cloud model increases, and the benefits start becoming a reality, over the next 12 months organisations will start to use the cloud for more and more, well, for everything in fact; including the server, telephony services, CRM, desktop software licenses, line of business systems, accountancy services, email services and security.

    The result – small businesses will no longer need a computer room because their network applications and services will be in the ‘cloud’; management and software costs will plummet. Completely scalable, the cloud will also enable them to increase or decrease their IT based on business requirements. Complex licensing will begin to be a thing of the past, as will static contracts tying you to systems that don’t adapt to changing business needs.

    This complete transition to the cloud will revolutionise the IT department, freeing up resource from the daily, time intensive, tasks of making sure everything ticks over; instead allowing time to innovate and look at what technology can deliver the organisation to gain business knowledge, competitive advantage and get ahead of the curve.

    And what about new products? Microsoft Office 365 and Lync are now entering the market. Combined, and hosted from a secure cloud platform, this will provide organisations with their tried and trusted business tools, tied together with extra integration and flexibility. Lync is especially exciting, bringing the telephone and video to your desktop, enabling users to see what other people are doing at any point in time, from any geographic location, and communicate in the most productive and appropriate way. It is the ultimate communication tool. Saving money on lengthy travel, as well as improving productivity, collaboration and time management, Office 365 and Lync will allow business transactions to happen significantly quicker. Unified Communications tools like this, supported by the cloud delivery model, is a great indicator of how the future of business technology is evolving.

    Looking even further into the future (let’s say 2015), the make-up of a business workforce will be truly mobile. As smart phones and tablets penetrate the business more and more, most organisations will have an entirely mobile workforce. Working on smart devices, anytime and anywhere, that are linked to the network, and synchronised with social networking sites and the central collaboration server. Companies will be able to pull project teams together via Facebook or Twitter, without anyone needing to come back to the office – online collaboration will start to become the norm. It’s products like Office 365 with Lync and the maturing adoption of the cloud model that is taking us there – and beyond!

  • 14 Sep 2011 12:00 AM | Anonymous

    Engineering and technology corporation Metso and Fujitsu Services Oy have signed an agreement on IT infrastructure services for Metso's sites in Finland.

    The contract, which was signed at the end of August, marks a continuation to a long-standing collaboration which dates as far back as the 1990's. The first Patja agreement that incorporated all Metso sites in Finland was sealed in summer 2003.

    ”We have been happy with the service. In particular, Fujitsu has succeeded in productising its service provision. Although key people have changed along the way the basic concept has proved strong and there has been no disruptions in the service,” says Vice President, Group IT Pauli Nuutinen of Metso.

    The Patja service model, known as the 4114 service at Metso, provides end-to-end services for 8,000 workstation users at Metso's 60 sites in Finland.

  • 14 Sep 2011 12:00 AM | Anonymous

    Dell Inc is cautiously optimistic that its strong performance in Europe and Asia will continue, but is concerned about U.S. government spending, an executive said.

    Steve Schuckenbrock, who runs the U.S. company's $8 billion services business, told Reuters it was yet to be seen whether a typical September spending surge as U.S. federal budgets close would happen this year.

    "We're continuing to monitor demand big-time, as European issues, U.S. issues continue to get debated and discussed," Schuckenbrock said in an interview in London on Tuesday.

  • 14 Sep 2011 12:00 AM | Anonymous

    Accenture has announced that it has agreed with the U.S. Department of Justice to settle a lawsuit originally filed in 2006 (United States ex rel. Norman Rille and Neal Roberts v. Accenture LLP) for $63.68 million. The lawsuit claimed that, in work for the U.S. federal government, Accenture received payments, resale revenue or other benefits through alliance agreements with technology vendors that were not sufficiently disclosed and that were not allowed on federal contracts.

    Accenture and the U.S. Department of Justice have agreed to settle the suit to avoid additional time, inconvenience and expense that would come with protracted litigation.

    The agreement is not an admission of liability by Accenture. Accenture continues to vigorously deny that there was any wrongdoing. The U.S. federal government was aware of alliance relationships in the IT industry and how they would benefit customers, vendors and the IT industry. The details of how alliances worked in the IT industry were widely reported in the industry press.

Powered by Wild Apricot Membership Software