Just in case you have been living under a rock for the last month or so, Pokémon Go has become the latest mobile phone gaming craze. It is based on the Nintendo game Pokémon, in which you travel around a mythical land capturing, training, and then fighting these creatures called “Pokémon” (pocket monsters) with other Pokémon hunters.
What is interesting about this particular game is the interactive nature and the fact that it is based in the real world. For a technical viewpoint, read my fellow analyst’s post on the subject here. The fact that it actually gets the kids out of their darkened rooms and into the wild outdoors, gaining valuable vitamin D for their sun-starved teenage skin, is a bonus.
Connecting the costs we incur to the business value we deliver is something we in IT need to do better. One of the dimensions of this is the value of a single piece of data compared to the cost of storing that piece of data. I think it’s safe to say that not all data is created equal. A contract document for a ten-million-dollar sale is a lot more valuable than a single tweet. What are the implications for IT infrastructure if we know the value of data? Can we make more sensible decisions about how we build our infrastructure based on knowledge of data value?
Dell has announced it will spin off its SecureWorks product portfolio. SecureWorks is very late to the cloud and virtualization security market, and it may never get there. EMC RSA ignored the cloud and virtualization security market and now is struggling to find a footing in the larger IoT market. VCE has no security reference architecture other than a growing list of products. When everyone is hailing Dell plus EMC as one of the largest mergers (which it is), how is security going to play as a part of the combined portfolio?
Everyone uses the cloud. It is a plain, simple fact that everyone uses at least one consumer cloud and that those consumer clouds (iCloud, Google, Dropbox, etc.) translate into cloud usage within the workplace. The workforce likes to get its job done, and part of doing that is using the tools they know, regardless of how IT feels about everything. In the past, IT would block access to those consumer-grade tools with the mistaken thought that they were not secure, that data was leaking, or that they were just plain bad to use. That is not the opinion of the workforce. IT did not substitute anything in place of those tools, so in many cases, IT became marginalized, shadow IT propagated, and we are now behind the eight ball when it comes to having a solid plan on how to handle the cloud tools. Because the workforce uses these Software as a Service (SaaS) tools, we are working within the world of the hybrid cloud.
Is there still a chance that one OS could rule them all?
At a recent Windows User Group meeting, I was astounded to hear the speaker talk about the Internet of Things in conjunction with Windows 10. When I asked him if that meant my fridge would reboot every Patch Tuesday, he laughed it off. But I wasn’t joking. Far from it. Is Microsoft still going down the route of “one OS to rule them all”? More importantly, if it is, then is there any sense in adopting this approach?
Every new advancement in technology brings security challenges. When the Internet became popular, many people had serious concerns about exposing the enterprise to the outside world. For companies to adopt Internet technologies, they had to accept a tradeoff: taking on new vulnerabilities in return for game-changing business value creation. With the emergence of cloud computing, history is repeating itself. It no longer is feasible to resist the movement to the cloud because of security fears. There must be some acceptance of risk and an effort to minimize that risk with sound architecture, good process, and continuous monitoring. The business value of cloud is too great for businesses to sit on the sidelines.