|By Jeremy Geelan||
|May 13, 2010 05:45 AM EDT||
Blueprint4IT on Ulitzer
In this exclusive Q&A for SYS-CON's Cloud Computing Journal with Cloud Expo Conference Chair, Jeremy Geelan, Tony Bishop - Founder & CEO of Adaptivity - discusses Adaptivity's "IT Transformation Factory" and their Cloud Computing strategy.
Bishop gave a General Session at the 5th Cloud Expo in New York in April entitled "Understanding the Relationship Between Workloads and the Cloud."
About Tony Bishop: As Chairman and CEO, he leads the team and provides hands-on coaching, thought leadership and executive strategy support for Adaptivity's key clients and partners. He is an innovative IT executive, with an excellent track record in strategy, design, and the implementation of business-aligned enterprise technology platforms across large organizations. He most recently served as SVP and Chief Architect of Wachovia’s Corporate Investment Banking Technology Group, where his team designed, built, and implemented a leading-edge service-oriented architecture and utility computing infrastructure.
About Adaptivity Corporation: Adaptivity provides integrated solutions that automate IT Delivery optimization across enterprise computing environments. Our integrated solutions include a unified knowledge base and an expert workbench that allows customers to design and optimize the delivery model of their infrastructure computing environments. These solutions help customers and partners change how they organize, architect, engineer and manage their IT supply chain.
Cloud Computing Journal: What's the idea behind the term ‘IT Transformation Factory' as an umbrella term for Adaptivity's activities in the Cloud Computing space?
Tony Bishop: The industry is intensely focused on a narrow definition of Cloud Computing (remotely managed IaaS resources). Adaptivity sees the opportunity from a much broader perspective. IaaS type resources managed externally from the enterprise do provide value; however, the larger opportunity is enabling enterprises to change how they deliver and consume IT resources.
The IT Transformation Factory is a combination of tools, knowledge base, and advisory services, which together form turnkey programs that accelerate systematic enterprise IT delivery transformation.
Cloud Computing Journal: How would you characterize a "next-generation" data center?
Bishop: There's a lot that goes into the design of a next-generation data center, so much that I wrote a book on the subject: Next Generation Datacenters in Financial Services: Driving Extreme Efficiency and Effective Cost Savings. The primary characteristic of a next-generation data center is that it empowers IT in its efforts to maximize business effectiveness. As infrastructure is tailored to workloads, its organization is reflective of business realities (not technology limitations), and it's able to respond to business events as they happen, which makes for a much more agile organization.
There are a number of fundamental changes to how design characteristics should be considered:
- Respect IT Physics: An application/service's computer infrastructure should be located with other application/services that it is mostly likely to communicate with, reducing contention.
- Tailored Infrastructure: The computing resources are no longer generic and are now tuned to the types of workloads running within an application.
- Demise of the Silo: IT changes its focus from the delivery of isolated silos of technology resources to high-level services aligned with business operations.
- Enhanced Recovery: Grouping of services via their organization in the data center helps mitigate technology risk by providing a clear view of what's required to restore business capabilities in disaster recovery scenarios.
Cloud Computing Journal: Have advancements in Virtualization and Cloud Computing made managing an organization's IT resource inventory easier or harder?
Bishop: Much harder. The traditional tools and processes for managing inventory were caught off guard by the rapid proliferation of these technologies and are only now beginning to catch up to virtualization, never mind cloud computing. There's even some debate about what should count as a resource and its boundaries, especially in the cloud space. This lack of clarity regarding where resource boundaries begin and end further blurs the matter.
That said, there's opportunity for changing the notion of what a resource is and keeping an inventory of high-level constructs, such as business services. As resources are delivered via the cloud, attention will move away from managing asset inventory and toward capacity management.
A Full General Session Room at Cloud Expo 2010 East in New York for Adaptivity's CEO
Cloud Computing Journal: Why is Cloud Computing recession-relevant?
Bishop: The traditional IT delivery model isn't tied to business performance. When the recession really started kicking in, it became apparent how many problems in the data center have been solved by throwing money at them. In fact, as many businesses have seen a reduction in revenue and gross numbers of transactions to process, they have not had the ability to curtail the corresponding IT costs, and costs continued to rise in many cases. Organizations that could not "turn off" an entire application were often faced with leaving the often "over-provisioned" infrastructure as is. The elastic nature of the cloud helps close the gap between what the business needs for operations for any given market environment. The recession has made organizations take stock of their current expense models for IT and therefore they are more open to the consideration of alternatives.
Cloud Computing Journal: How about the trend towards real-time in IT; what are the main business drivers for that?
Bishop: The primary driver is the competitive advantage provided by the ability to meet the demands of the business environment moment by moment in a more agile manner. This trend toward real-time is not just about the time-to-market benefits, but also about providing real-time capabilities that enable the business to build a sustainable competitive advantage by tailoring its IT services toward specific demands. The more tailored to the specific nature of HOW the business operates, the more difficult it is for the competition to duplicate. A business that is more agile becomes more effective. A business that is able to operate more effectively than the competition has a major strategic advantage.
Cloud Computing Journal: So what's the secret to making Cloud Computing work at the enterprise level?
Bishop: Economics is the driving force to create the disciplines needed to properly move applications into the cloud. When software development first began moving to India, there were poor controls in place and results were mixed. Over time, disciplines were created that improved the success rate, such that it's now unusual for large projects to have no part of the development being outsourced. The situation is similar with cloud computing. The disciplines needed to manage the business in this way are still in their infancy. In particular, the challenges of security and reliability are major concerns, followed closely by FUD (Fear, Uncertainty, and Doubt).
To combat these obstacles, enterprises are applying cloud principles to how they deliver IT internally in order to begin the process of developing the needed new disciplines. Beware, those who see cloud as only a way to more rapidly deploy traditional resources (compute, storage, network) will be trounced by those who use cloud to transform how the whole organization operates. The reason they will fall behind is that they are missing a critical opportunity to transform IT delivery, which requires holistic process changes. This is not a "throw it over the wall" solution. The same mistakes were made in the initial outsourcing craze.
Cloud Computing Journal: Is Cloud Computing, as some have claimed, "pure SOA" - and if so is that good or bad?
Bishop: The answer to this question is likely filed somewhere near "How many angels can dance on the head of a pin?" The answer depends on the definitions you're working with and your world view. Clearly SOA service can be delivered via Cloud Computing resources and Cloud Computing resources can ‘be discovered.' The bigger issue is that neither Cloud Computing nor SOA really have proper systematic mechanisms to ensure resources are properly applied based on workload characteristics and the interconnectedness of their interactions. In this case, this abstraction sets us back and not forward. "Everything should be made as simple as possible, but not simpler." - Einstein
Cloud Computing Journal: You've been known to quote Tim Berners-Lee, who once said "I think IT projects are about supporting social systems - about communications between people and machines. They tend to fail due to cultural issues." Is that still true today, do you find?
Bishop: Yes. If we humans ever go to war with our machine counterparts, mark my words, it'll be because of a lack of communication about workload characteristics and the intensity of collaboration required!
The issue here is that IT is taking short cuts with its current application profiling techniques. Generally, profiling is an afterthought in the design process, if it takes place at all. Even when done, it's a process much similar to throwing spaghetti against the wall to see if it sticks. Instead demand, as characterized by workload and collaboration, should have a direct influence on our designs from the beginning, such that the infrastructure is tailored to the job at hand. This perspective facilitates implementations that work under all conditions, which is increasingly important in a world where the digital supply chain is the new organizational face.
This leads to the final part of the quote on cultural issues. Effective use of the cloud means that IT organizations are going to have to change. Silos must be broken down so that resource sharing is possible. Discussions between IT and the business about Service Level Agreements (SLA) must occur in a meaningful way so that they can lead to Operational and Execution Level Agreements (OLA, ELA). Disciplines must be created and invested to promote and sustain the transformation of IT. It all comes down to greater rigor and responsibility among groups, and many organizations are not ready for that kind of interaction or transparency. Too many people in IT and business will perceive that they can be on the losing end of such a transformation. Therefore the organization has to grapple with what is valuable and change that value system (culture) in order to achieve the behavioral changes required.
Cloud Computing Journal: What's the best way, do you think, to go beyond the basic virtualization strategy and consider, say, grids that can be shared by multiple projects across business lines?
Bishop: You're describing a utility computing model, where shared grids have been successfully implemented by many firms, especially financial services firms. We're focusing on the step beyond that, which is moving workloads seamlessly across the whole footprint of the data center, such that the right resources are applied to whichever problems the organization needs without code changes. This is being accomplished via a holistic virtualization approach that maps business demands to resource supply, augmented by a trend toward predictive and self-healing infrastructures.
Cloud Computing Journal: How big an issue is security for enterprises that wish to migrate toward Cloud-based infrastructure wholly or in part?
Bishop: Enormous; security can't be understated. The problem of security is compounded by all the different layers of security that must be addressed. Everything from application security services all the way down to physical security is a concern, including everything in between such as transmission and data storage (transient and long term). Organizations have already been dealing with all the different challenges security presents; the particular challenge with public Cloud-based infrastructure is that a third party has to be entrusted with some portion of these responsibilities, which becomes a trust issue. This is another area where FUD (Fear, Uncertainly, and Doubt) will need to be overcome. It stands to reason that the issues around security will be used as the weapon of choice by those who want to slow down progress to the public cloud. So again culture plays a role here.
Cloud Computing Journal: And what about management, how's that being taken care of? Can the deployment and management of computing clouds really be automated, or is that in the far-off future still?
Bishop: Yes, management can be automated based on business policies, security policies, and cultural changes to operations - though there is no holistic solution for workload management - so these services need to be pulled together through a combination of technologies. Many organizations have been focused on virtual machines, but that virtualization construct really doesn't provide the granularity or the dynamic capabilities needed to properly manage workloads.
Furthermore, the language for setting business expectations needs to be recast. For example, SLAs are needed, for those that do exist are insufficient. An SLA speaks to what service needs to be provided, but not how to adjust the underlying resources should different execution conditions be encountered. For instance, doubling the number of compute resources won't help if a service is storage bound. We've introduced the concept of Execution Level Agreements (ELAs) with our clients to help them define the behavior of their dynamic infrastructures to make sure that SLAs are met.
Cloud Computing Journal: How big a part are standards going to play in the success of the Cloud?
Bishop: Ideally, standards are important to facilitate inter-operation and integration, but standards usually lag severely behind innovation by several years. Those who innovate now have a better chance to lead their segment by making deliberate technology choices and thoughtful designs. Don't be surprised to see early standards used to shut out competition by large vendors that have a strong influence on standards boards. Our message is keep an eye out for industry standards that make sense to adopt, but in the interim develop your disciplines now or be left behind.
Two key disciplines that IT must invest in are Architecture and Engineering. Architecture will help IT make the tradeoff assessments for non-standard technology more rigorous, while developing designs that have a better chance of adapting as standards become finalized. Engineering helps IT test and configure new technologies so that risk can be properly understood. These are investments that will make an organization much more competitive.
Cloud Computing Journal: 2009 has been a year of obvious challenges, from both a CapEx and an OpEx perspective, for anyone involved with Enterprise IT. Finally, what's your top tip, as a seasoned software executive, to those other CEOs out there right now - especially CEOs of embattled start-ups who may be looking for some magic bullet to ensure they're alive (and well) as a company in 2010?
Bishop: To my mind, a magic bullet implies an easy fix. The simple sales formulas of the past, where IT allowed itself to play the subservient role of being order takers, are no longer appropriate. The key strategic move for IT is to move its focus up the organizational hierarchy and provide holistic solutions that meet business challenges. You must have a story that is interesting to CxOs. This critical decision making process can no longer be relegated to system managers or technicians as the stakes have become too high.
In a time of limited funding, only initiatives that are considered business imperatives are going to get funded. Solutions must be clearly articulated and tailored to the challenges at hand and must be able to show significant results within a quarter.
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
May. 27, 2015 09:30 AM EDT Reads: 4,492
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
May. 27, 2015 09:30 AM EDT Reads: 7,077
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
May. 27, 2015 09:00 AM EDT Reads: 2,308
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
May. 27, 2015 07:30 AM EDT Reads: 5,713
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
May. 27, 2015 04:30 AM EDT Reads: 4,301
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
May. 27, 2015 03:00 AM EDT Reads: 5,982
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
May. 27, 2015 02:30 AM EDT Reads: 5,641
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
May. 27, 2015 02:00 AM EDT Reads: 6,395
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a business application to multiple users (multi-tenancy). Docker, a container technology, was used to ...
May. 27, 2015 01:00 AM EDT Reads: 2,596
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
May. 26, 2015 09:00 PM EDT Reads: 5,266
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
May. 26, 2015 05:00 PM EDT Reads: 4,998
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
May. 26, 2015 02:00 PM EDT Reads: 6,733
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will addresses this very serious issue of profound change in the industry.
May. 26, 2015 01:15 PM EDT Reads: 1,221
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
May. 26, 2015 01:00 PM EDT Reads: 7,345
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
May. 26, 2015 01:00 PM EDT Reads: 4,642
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
May. 26, 2015 12:15 PM EDT Reads: 2,752
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers is very hard. You have to learn five new and different technologies and best practices (libswarm, sy...
May. 26, 2015 12:00 PM EDT Reads: 2,511
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
May. 26, 2015 12:00 PM EDT Reads: 2,277
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
May. 26, 2015 11:00 AM EDT Reads: 4,307
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
May. 26, 2015 11:00 AM EDT Reads: 6,004