Cisco and Accenture add global credibility to the Wireless IoT Forum’s standards rationalisation efforts, while WSN Tech adds China to the UK contribution from BT, Telensa and Arkessa.
Consolidated standards should give developers a bigger target market at which to aim, increase innovation in applications, reduce develop-ment costs and lower ROI thresholds for buyers, but market history suggests it may never happen.
Red Hat and Pivotal/Cloud Foundry are looking to establish leadership roles in defining microservices technologies.
Approaches vary between the two OSS players, with a division primarily around buildpacks versus containers.
Microservices is the hottest new technology to hit the application platforms market sector, promising to deliver a more agile and efficient way to build, deploy, and manage apps. Most application platform providers are trying to figure out how microservices fit into their current middleware portfolios, but Red Hat and Pivotal (Cloud Foundry) are taking an early lead on launching their own distinct initiatives. The OSS PaaS leaders are causing disruption to the application platforms industry through thought leadership and announcements around microservices, albeit through varying technology support of containerization, buildpacks, and orchestration. The battle has begun over which of the two will generate the most momentum around their technology strategies. This week, I compared the different approaches between the rival PaaS players (please see: OSS PaaS Rivals Red Hat and Pivotal Tackle Microservice Architectures via Very Different Approaches, June 30, 2015). Continue reading “Microservices Get a Kick Start as OSS PaaS Leaders Commit to New App Development Architecture”→
OPM’s data breach may have been prevented by any number of widely used security controls.
However, OPM’s biggest failing was in not applying security controls in measure equal to its risk.
Given the catastrophic nature of the recently discovered data breach at the U.S. Office of Personnel Management (OPM), it’s clear both the investigation and the finger-pointing will continue for some time. However, it’s not too soon to highlight not only the security controls that may have prevented or mitigated the damage, but also the inevitable disaster that will result for any organization which fails to implement information security in equal measure to its risk. Continue reading “OPM Breach Analysis: Many Failures Highlight the Cost of Risk Ignorance”→
• IBM sold off its Rivermine TEM business to Tangoe in May 2015, signaling that it was not as strategic a business as its other mobility-related services.
• Verizon shuttered its TEM service in 2014, as prospects favored independent providers for billing verification, expense reporting, device and service plan logistics and provisioning, and especially multi-carrier expense optimization.
While all Tier 1 operators and IT service providers (ITSPs) have offered telecom expense management (TEM) services for years, there are some changes in the market that harken back to the original question of whether a mobile operator can be impartial enough to be trusted with seeing, validating, recommending and helping optimize both its own voice and data services, as well as those of other operators. The ITSPs often used this argument to tout their own offerings, since they clearly weren’t tied to a particular operator. But network operators went out of their way to be impartial too, by separating their TEM staff and services from their network services. Meanwhile, as the TEM platform providers grew into TEM services and became service providers themselves, carriers increasingly used them as an independent liaison, whether the carriers were simply reselling their platforms or basing more advanced services on them. Continue reading “Will TEM Have Trouble Finding Ongoing Traction in an Industry Where Complex Solutions Become Dominant Over Commodity Services?”→
Artificial avatars combine natural language processing, contextual awareness, predictive analytics, and machine learning not only to answer requests, but also to anticipate them.
What if these avatars were instructed to include not just your inbox, but everyone’s inbox, your corporate ERP database, even your nifty little Hadoop cluster?
As you may have heard, Microsoft is playing around with the notion of intelligent automation. Like Google and Apple, the company has its own personal, mobile assistant named Cortana, which can help you find a nice restaurant, schedule a meeting, or remind you to call your mom more often… seriously. These artificial avatars combine natural language processing, contextual awareness, predictive analytics, and machine learning to sift through your inbox, search history, and calendar, not only to respond to your requests, but actually to anticipate them. Of course, they’re still fraught with negative perceptions and unreasonable expectations, which currently limits their effective use to basic responsive tasks such as looking at your calendar and seeing that you need to call your mom today because it’s her birthday. Continue reading ““Hello, Cortana. This Is Big Data Calling.””→
Vendors have been surprisingly receptive to getting on board with the OpenStack initiative.
OpenStack is still a major challenge for companies to adopt.
Over the last few weeks there have been a number of key acquisitions in the world of hosted and managed private cloud startups. First tier vendors like IBM, EMC, and Cisco have all made significant investments in private cloud startups that have already built a respectable business providing a simplified path to an OpenStack private cloud through either hosting secure externalized private clouds (which seems like an oxymoron) or by offering a managed private cloud service that can take a lot of the pain out of building an OpenStack-based private cloud. But to me, this raises the obvious question of just why is private cloud so darn hard? Continue reading “Easy Usually Starts Out Being Hard”→
Various service provider categories – ITSP/SI, cloud, data center, network and technology vendors – seek to outmaneuver each other and win control of the customer relationship.
The provider (and sector) that secures the customer relationship can seek to preserve its own margins and, through commoditization and automation, push down those of adjacent providers.
If you’re a large enterprise buyer and can wade through the mixed messages from service providers, it’s a great time for shopping around to find deals. But, for many service providers, the same overlapping messages are cause for apprehension. The mixing of cloud, data center, network and managed/professional services plays up fears that every adjacent sector is now a competitor. Those concerns are well-founded. Continue reading “Overlapping Mixed Messages? Service Providers Aim to Commoditize Adjacent Peers”→