Monday 2 December 2013

MOBILE MALWARE

Mobile malware has emerged as a real and significant problem. Addressing it is no longer optional. As with other IT security risks, technology isn’t a silver bullet, but it is a key component of a holistic solution that also incorporates people and process.

A mobile virus is malicious software that targets mobile phones or wireless-enabled PDAs,thereby may causing the collapse of system and loss or leak of confidential information.The insidious objectives of mobile malware range from spying to keylogging, from text messaging to phishing, from unwanted marketing to outright fraud.

Fifty-nine percent of IT and security professionals surveyed by the Ponemon Institute recently said mobile devices are increasing the prevalence of malware infections within their organizations. This is no shock: the extraordinary growth of mobile platforms has madethem an irresistible target. The only surprise would have been if these devices had escaped attack.

Years ago, PC malware exploded when Windows achieved dominance. Something similar
is occurring with mobile. As the mobile marketplace has grown and evolved, the Android platform has become dominant. Worldwide, 70% of new smartphones now run Android, with iOS running a distant second. (Microsoft’s Windows Phone 8 platform offers promise, but hasn’t yet achieved significant market penetration.)

The Android platform’s openness has made it attractive to users, device manufacturers,carriers, app developers and to malware creators. That’s where they’re focused..

In BYOD arrangements, mobile devices are often owned by users, who act as defacto administrators. Users typically decide which apps to run, and where to get them.Wider smartphone and tablet usage is often correlated with a loss of organizational control.And that, in turn, can compromise security in multiple ways. This is why some organizations are pursuing choose your own device (CYOD) approaches, where users get to pick their devices from a list the company is prepared to support, will continue to own, and plans to centrally administer. Of course, CYOD isn’t always an option, and many organizations have chosen to accept the tradeoffs associated with full BYOD.

Mobile malware risks
Organizations evaluating mobile malware risks should assess each of the ways it can damage them, including the following.

Productivity losses: Some forms of malware inconvenience users through aggressive advertising, prevent mobile devices from working properly, and increase support costs.

Direct costs: Some forms of malware and potentially unwanted applications (PUAs) have direct costs by utilizing paid mobile services such as SMS, with or without the user’s awareness or understanding.

Security, privacy, and compliance risks: Mobile malware can compromise corporate and customer data, systems, and assets that must be protected—placing the organization at competitive, reputational and legal risk.

Some mobile malware and PUAs merely annoy and frustrate. Yet as a whole, mobile malware and PUAs represent a significant and growing problem.

Sunday 3 November 2013

GREEN COMPUTING

Driven by rising electricity costs, green legislation and corporate social responsibility, green IT is increasingly on many IT professionals’ minds, particularly for the power-hungry data centre. Whatever the reasons, experts say that in the long run, having an energy-efficient data centre helps the environment and also saves businesses money.

Technologies that can help data-centre become green:

Data centre infrastructure management:
Experts rate data centre infrastructure management (Dcim) tools as one of the coolest technologies that can help companies make their infrastructure energy-efficient and green. Until 2009, Dcim had virtually no market penetration, but today it is one of the most significant areas of green computing. Dcim brings together standalone functions such as data centre design, asset discovery, systems management functions, capacity planning and energy management to provide a holistic view of the data centre, ranging from the rack or cabinet level to the cooling infrastructure and energy utilisation. it helps encourage the efficient use of energy, optimise equipment layouts, support virtualisation and consolidation, and improve data centre availability.

Free air cooling
Data centre power use is high on the agenda for most data centre developers. Energy costs have become the largest single element in the data centre’s total cost of ownership (tco) – ranging from 20% to 60% depending on the facility’s business model and as energy prices (and/or taxes) rise, the share of the total cost will only become larger. Free or natural air cooling is the practice of using outside air to cool data-centre facilities rather than running power-hungry mechanical refrigeration or air-conditioning units.

Low-power servers
Data centre operators are looking for more efficient alternatives to the current x86 standard server racks and blades to make their infrastructure sustainable in the long term. On-site wind generation or use of renewable energy.A number of large businesses, including Apple, Facebook and Google, are taking initiatives to power their data centres using wind energy.

Data centre consolidation and virtualisation
Virtualisation and data centre consolidation strategies help enterprises streamline it resources and utilise the untapped processing power of high-power server and storage devices. The combination of virtualisation, low-latency and high-bandwidth network  connectivity and specialised servers has the potential to slash data centre capital costs and improve energy efficiency.

Cloud computing
Cloud computing can help enterprises in their green it efforts, since a computing cloud offers higher CPU utilisation.

Energy-efficient cooling in the data centre
Many data centres are being run against old-style environmental designs, where the approach to cooling is based around ensuring that input cooling air is at such a low temperature that outlet air does not exceed a set temperature in many cases, the aim has been to keep the average volumetric temperature in the data centre around 20°c or lower with some running at between 15°c and 17°c.

The other technologies that can help data centre become green are:

Optimising airflow for maximum cooling
Increasing a data centre’s thermal envelope

Wednesday 2 October 2013

BUSINESS INTELLIGENCE

Business Intelligence
In the corporate sector, there is widespread need to use a range of software with different databases. We are generating a lot of data every day from software, web services etc. This data is useless if we are not able to draw insight from it. This is where BI comes into picture. BI can connect to different databases, web services and can collect all the data. On this data, it can do analysis and can provide a lot of insight. It can provide different kinds of reports, dashboards, data visualization, what if analysis etc and can help the management to make decisions which are based on data rather than on plain intuition.

For example in energy sector, a lot of data is collected from different smart devices, DISCOM, meters etc, and by properly analysing this data we can get a lot of insight .We can manage electricity usage better and tap data to realize the risks of theft and loss of energy.

BI Basics
There are a number of companies which provide BI software like SAS, Microsoft, IBM, SAP, Pentaho, Jaspersoft. The BI software can be used in any sector and often system integrators or software companies then provide services and produce a sector specific solution for their end clients.

Installation & Security:
Once a sector specific solution has been developed, the solution can be then integrated with any software, website, portal or application. Hence, the software does not really depend on the platform; via web services the solution can be integrated with any platform. Also, user access-based data security can be provided. Hence, a user will be able to view only that data which is relevant to him.

Limitations
The biggest drawback of proprietary software provided by SAS, SAP etc, is in terms of costs. Their license costs go up in crores of rupees. On the other hand, we do have open source BI software like Pentaho and Jaspersoft that are not that expensive. Moreover, often to implement these BI solutions, the end client has to take the services of a software company specializing in the BI software, which is also in a way a limitation in usage.

Cross-Departmental Advantages
A well implemented BI can help a company in areas like predictive analytics, optimising investments and data driven decisions. The BI software can be implemented across all departments. 
A brief summary of its highlights in some departments are:

  •  Marketing: helps in growing its topline with features like analyzing campaign returns, promotional yields, and provide solutions to expenditure for profitable ROI, and tracking social-media marketing
  • Sales: finding the best path and practices, customer acquisition cost, and improvement in yearly turnover and sales
  • Inventory: monitoring and adjusting inventory levels
  • Human Resources: tracking and managing employee turnover, attrition rates and recruitment processes


BI solution includes the following business areas:

  • Demand Intelligence
  • Risk Intelligence
  • Asset Intelligence (AI)
  • Customer Service Intelligence    
Trends seen in BI Adoption:
  • Information Quality
  • Master Data Management (MDM)
  • Data Governance
  • Enterprise Level BI
  • Enterprise Level Data Transparency
  • Actionable Business Intelligence

Monday 2 September 2013

DEPLOYING FLASH IN THE ENTERPRISE

Flash technology is changing the way that enterprises approach storage. After years of use in the consumer market, flash has reached a price point and level of maturity at which it is being actively deployed to address the needs of business-critical applications. Hard disk drives (HDDs) have some nagging deficiencies that make provisioning storage for applications with high-performance demands difficult. Because HDDs are capable of performing no more than 300–400 random I/O operations per second (IOPS), a storage system capable of delivering tens of thousands of IOPS requires hundreds of disks—even when the capacity is not needed. Over provisioning disks to achieve performance goals is a significant capital expense and wastes rack space, power, and cooling. High-performance workloads increasingly require 100,000 IOPS or more, further exacerbating the problem. 

Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Deployment approaches—including hybrid storage arrays, server flash, and all-flash arrays—that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements. Some storage companies offers a full range of flash solutions, including server flash, hybrid storage arrays, and all-flash arrays. We’ve done a careful analysis of the cost of each solution at various combinations of performance and capacity to help you understand how to choose the best solutions to address your storage challenges based on your performance needs (IOPS and latency), capacity requirements, working set size (amount of hot data), budget, and data protection objectives.  

The fastest HDDs have access times of 3–4 milliseconds, resulting in latencies much slower than flash-based SSDs, which have latencies measured in microseconds and perform thousands of IOPS per device. HDDs alone may no longer meet the needs of latency-sensitive applications.  Because of clear performance advantages coupled with significantly lower power consumption, flash SSDs and other flash devices are beginning to take the place of high-performance HDDs. However, because SSDs currently cost more than 10 times as much per GB of usable storage, IT teams are still  searching for the best strategies to deploy flash technology to deliver performance where it’s needed while minimizing overall storage costs.

There are a number of options for deploying flash in the data center:
  • Hybrid storage solutions combine the performance of flash with the capacity of HDD by targeting hot data to flash using either migration or caching.
  • Server flash solutions may provide persistent solid state storage or cache data from HDD storage onto flash devices installed in servers, delivering extremely low latency for data accessed from cache.
  • All-flash arrays provide maximum performance and a high level of consistency for business-critical applications.

Friday 2 August 2013

WINDOWS XP AFTER APRIL,2014

April 9, 2014, is the real red-letter day in the history of Windows XP. On that day, any zero-day exploit released into the wild will run rampant on Windows XP systems while Microsoft watches and says "I told you so." When companies beg for a fix, Microsoft will hold one document in each hand: the life-cycle information for Windows XP with a Post-it note that says "You had four years to move to Windows 7," and a contract for custom support.

As Windows XP comes to the end of its life, applications in enterprise desktop and virtualization environments everywhere will feel the effects. Luckily, there are a couple things you can do if your applications depend on XP: You can use a very old Windows Server platform or jump on the virtualization bandwagon. Microsoft isn't the only company ditching XP. Not only can Microsoft wash its hands of Windows XP support, but so can all the companies that made software for XP.

Assuming those companies stopped actively developing for the OS years ago, they are likely still supporting the applications that run on it. After Windows XP end of life on April 8, 2014, they'll have no reason to continue. The implications of this reality run far and wide. Line-of-business software is surely affected, as are any of the random applications you are using. What really is cause for concern for desktop and virtualization administrators, though, is that security software vendors will likely stop patching, updating and supporting their software.

Why would companies such as McAfee, Symantec, Kaspersky or Trend Micro bother maintaining a product for an OS that is, for all intents and purposes, dead? Those applications might still run, and it could be that their definition files will be updated with the latest viruses for a time, but do you think those companies will pay attention to viruses targeted toward XP after it's gone? Probably not.

What about activation servers?
There is one other question that has yet to be answered, and that is in regards to Microsoft’s activation servers. What happens to the part of the system that activates Windows XP? Does it go offline? Is it somehow protected and only available to people that have paid for custom support? Existing machines will no doubt work just fine, but what about rebuilds or new machines?Of course, Microsoft could simply validate all existing keys and let anyone that wants to use XP use it. There’s no precedent for this because XP was the first Microsoft OS that required activation. We may just have to wait and see.The bottom line is that running Windows XP in your organization on anything other than a desktop with no network connection, floppy drive, USB ports, or CD drive is an outright liability, bordering on irresponsible. Yes, there are situations that will require it, but if you determine that your organization can't afford to get off Windows XP on the basis of cost alone, you are wrong.

Alternatives for application support
Windows Server 2003 R2 is essentially Windows XP Server, and while the Windows XP end of life date is April 8, 2014, the end of life for Server 2003 R2 comes 15 months after that: July 14, 2015. Since they are roughly the same OS, based on the same kernel, it's likely that anything you require XP for will work on Server 2003 R2 -- and that will buy you more than a year to figure things out.

There are two ways to keep apps running with this approach.
The first is to move those troublesome applications into the data center and use Remote Desktop Services (RDS) to deliver the application. This, of course, requires that the application is capable of running on a terminal server. In fact, this is also a viable means of preserving some of those oddball applications in your RDS environments.

If the application just won't work or has to run on its own system, you have the option of installing Server 2003 R2 on the physical computer. This solution is costly, because you need to purchase server licenses for each of these machines -- but it could cost significantly less than a Custom Support Agreement. Granted, it only buys you 15 months, but you can consider that to be additional motivation to switch platforms.


The bottom line is that you're running out of both time and options when it comes to removing Windows XP from your company.  If you feel more comfortable using physical desktops, go for it. Use VDI if you can (those extra management features will help in the long run); use application virtualization and user environment virtualization, too (it will make it easier to migrate OSes in the future). But, whatever you do, make sure the OS is gone by the time of Windows XP end of life next year.

Tuesday 2 July 2013

ECONOMETRICS

Econometrics is nothing but application of mathematics, statistics, and computer science to economic data. By using the theory of Econometrics, CIOs can save costs to make a strong business case to gain management support for investments in innovation. Econometrics is the overarching business theme when an organization is trying to spur business transformation and turn the current datacenter into a next-generation information center. Convergence is the key accelerator of business velocity. Consolidation has given way to convergence to reduce opex.

Tough economic times require new perspectives and strategies for reducing the cost of infrastructure. The past several years   have left many IT organizations with over-provisioned and under-utilised IT capacity. Now, with a squeeze on capital and credit, many organizations are faced with diktats to do more with less. It is time for CIO's to understand, how they can save costs to make a strong business case to gain management support for both strategic and tactical investments.

Today, organizations should evaluate new technologies on the basis of how they can contribute to business performance. However, this is becoming increasingly difficult to do. The average IT expenditure to just keep the lights on was about 80 percent, with many of them spending over 90 percent, leaving no room for innovation. The biggest factors contributing to this is difficulty in convincing top management that a transformation project is required and that is difficult for the IT team to demonstrate the value that can be generated in terms of ROI.

One way out is applying the principles of Econometrics. Cloud computing, VM Sprawl, and capacity on-demand architectures sometimes call for a review of existing IT ecosystems especially storage. One of the first steps is to define and measure current costs. We cannot improve what we cannot measure.  This is the core of econometrics and key to providing continuous improvement of storage estate.


When seeking to control storage costs, an organization needs to determine which types of costs are most relevant to control and measure them. Reducing costs is often not simply a matter selecting products, but of designing a storage architecture that is more supportive of the organization's cost-reduction goals. Organization should use econometrics to follow the money spent on IT assets over their lifetimes, and map IT investments to business benefits and cost improvements.

Sunday 2 June 2013

VIRTUAL DESKTOP INFRASTRUCTURE (VDI)

Virtual Desktop Infrastructure or VDI is a computing model that adds layer of virtualization between the server and the desktop PCs. By installing this virtualization in place of a more traditional operating system, network administrators can provide end users with ‘access anywhere’ capabilities and a familiar desktop experience, while simultaneously heightening data security throughout the organization.

VDI Provides Greater Security, Seamless User Experience Superior Data security: Because VDI hosts the desktop image in the data center, organizations keep sensitive data safe in the corporate data center—not on the end-user’s machine which can be lost, stolen, or even destroyed. VDI effectively reduces the risks inherent in every aspect of the user environment. More productive end-users: With VDI, the end-user experience remains familiar. Their desktop looks just like their desktop and their thin client machine perform just like the desktop PC they’ve grown comfortable with and accustomed to. With virtual desktop infrastructure, there are no expensive training seminars to host and no increase in tech support issues or calls. End- user satisfaction is actually increased because they have greater control over the applications and settings that their work requires Desktops can be set up in minutes, not hours. Client PCs are more energy efficient and longer lasting than traditional desktop computers. IT costs are reduced due to a fewer tech support issues. Compatibility issues, especially with single-user software, are lessened. Data security is increased. A virtual desktop infrastructure (VDI) environment allows your company’s information technology pros to centrally manage thin client machines, leading to a mutually beneficial experience for both end-users and IT administrators. 

Adoption rates of desktop virtualization or VDI based BYOD deployments are on the rise thanks to the advantages that virtualization offers for more sophisticated use cases. The virtual deployment model centralize and simplify security and provide users with easier access to more applications, to more diverse end-points. However the virtual model also requires more infrastructures.

Pros and Cons of VDI
.

Pros:
  • ·         Less expensive than a desktop PC
  • ·         Energy-efficient
  • ·         Highly secure
  • ·         Centralized management

Cons:
  •    Expensive back end
  •    Limited peripheral support
  •    Higher level of IT skill needed to build and support back end
  •    Additional licensing may be required 
  •    Limited support for advanced multimedia

Thursday 2 May 2013

BIG DATA


Just like Cloud Computing, Social Media and BYOD. Big Data has fast emerged as one of the most popular IT terms of today. But does the expression (used to describe the explosion in the growth of data and its availability and usage) have any significance or is it just big hype? While critical data and information are getting generated at a mind-boggling pace in enterprises, it still cannot be dubbed as Big Data – massive volumes that are growing beyond the performance capacity of traditional database management systems and data warehouse. Some sectors not only generate humungous amounts of data but also need to run this data through analytics for continuous growth and performance. It is no longer a subject of debate that Big Data enables enterprises to become more productive. It helps corporate become smarter by exploiting data in a hitherto unavailable manner thereby presenting newer growth opportunities. At the same time, however, technology leaders in most sectors need to carefully evaluate whether their businesses actually demand Big Data solutions or not. They should cautiously assess vendors pushing Big Data solutions.

First Big Data solutions are expensive. Secondly, it impacts the traditional approaches to Enterprise Architecture (EA).While Big Data (both from a management and implementation perspective) could be a challenge. It is also an opportunity for technology leaders. Big Data demands new business models. Some define Big Data in terms of being larger than a certain number of terabytes. As technology advances overtime, the size of the datasets that qualify as Big Data will also increase. Also, the definition can vary by sector, depending on what kinds of software tools are commonly available and what size of datasets is common to particular industry.

Staffing could be one of the biggest challenges for big data deployments. For a large scale deployment, enterprises would need to invest into training the staff on Big Data technologies. Moreover, cultural mind mindsets need to change to allow use of open source technologies as many Big Data tools are open source.Big Data can turn into opportunity if handled well. The data can be segregated under three buckets:

Customer Centric – Required for customer services.
Business Data – Required for analytics, trend analysis and business forecast etc.
Legal Data – Managed for regulatory requirements.

Adoption of Big Data analytics will lead to faster rollout of many customer-facing services and by applying analytics one can really change the game in the market. Analytics plays a major role in making the business enlightened on the power of information that can be carved out of the Big Data mart.In the last 6-7 years, advancement in Big Data technologies has considerably improved analytics on extremely large datasets. Enterprises need to think how data in their company is getting created and how it is being stored. Storage tiering is required to get optimal level of performance before adopting Big Data analytics. The success rate of a Big Data deployment does not depend on the scale of deployment rather it is more to do with the alignment of IT and business. Value of Big Data deployment can be measured in terms of accuracy of analysis of data. IT can also be measured in terms of business efficiency improvement and insights that it offers.

Tuesday 2 April 2013

ENTERPRISE MOBILITY MANAGEMENT OPTIONS


These days, most organizations are a mobile enterprise, whether their IT departments want them to be or not.
As end users rely more on tablets, smartphones and even their personal laptops, IT needs to keep up with the latest mobile computing definitions and trends. Devices, operating systems and apps evolve quickly, so IT pros in a mobile enterprise must stay on top of the latest software and strategies for managing, securing and taking advantage of new technologies.
Enterprise mobility
With enterprise mobility, end users aren't chained to their desks and PCs anymore. More employees do work outside the office with smartphones and tablets, sharing and accessing data via cloud services. Enterprise mobility can improve employee productivity but also create security risks
Mobile operating system
A mobile operating system is software that lets devices run apps, connect to cellular and wireless networks, and perform other tasks. Popular mobile OSes include Apple's iOS, Google's Android, Research In Motion's BlackBerry OS and Microsoft's Windows Phone.
Mobile browser
Smartphones and tablets have much smaller screens than desktops and laptops, so they run Web browsers that render websites for optimal viewing. Mobile browsers also utilize lightweight software to address mobile devices' memory and bandwidth limitations. Most browsers display the mobile versions of sites by default but can display regular HTML sites if mobile versions aren't available.
Mobile device fragmentation
When there are different versions of the same mobile operating system in current use, that's known as mobile device fragmentation. Android provides the best example of a fragmented operating system: Wireless carriers control the timing of OS updates to different devices, so there are often delays (deliberate or otherwise) in delivery. Some devices in a mobile enterprise may be on Android 4.1 Jelly Bean, while others may still run Android 2.3 Gingerbread, and there's nothing IT can do to standardize.

Mobile device management
Mobile device management (MDM) software lets IT deliver apps, data and configuration settings to smartphones and tablets. A mobile enterprise typically deploys MDM for security reasons; most commonly, MDM lets IT see what users are doing on their mobile devices, blacklist and whitelist apps and remotely wipe devices in case of loss or theft.
BYOD policy
A bring-your-own-device (BYOD) policy governs how employees may use their personal smartphones, tablets and computers at work -- and the extent to which corporate IT will support these devices. BYOD policies vary widely between organizations, because no two companies will have the same use cases, IT resources and security concerns. A BYOD policy will typically state who can do what with particular apps on certain devices.
Device-agnostic
Apps and websites that work with most operating systems and device types are device-agnostic, but the term also applies to any hardware or software that is compatible across different systems without special adaptations. App development has begun to lean toward device agnosticism to help IT departments avoid unmanageable support demands. When apps work across a broad range of devices, they're better for users and for IT.

Saturday 2 March 2013

Enterprise Resource Planning (ERP)


There is no business today, without an ERP application. Many companies now are shifting their focus on ERP, including Small and Medium Enterprises. An ERP software solution seeks to streamline and integrate operations, processes and information flows in an enterprise, to synergize the resources of an organization namely men, material, money and machine. In other words, ERP systems integrate all data and processes of an organization into a unified system. A typical ERP will use multiple components of computer software and hardware to achieve the integration. A key ingredient of most ERP systems is the use of a unified database to store data for the various system modules.

Most organizations across the world have realized that in a rapidly changing business environment, it is impossible to create and maintain a custom designed software package which will cater to all their requirements and also be up-to-date. Realizing these requirements of organizations, companies have designed and developed ERP software, which offer an integrated software solution to all the functional processes in an organization.

Although, in the initial stage ERP originated in the manufacturing environment, now ERP software solutions typically cover all basic business process/functions of any organization, regardless of the organization's business or charter. A typical ERP module include: Manufacturing, Supply Chain, Financials, Customer Relationship Management (CRM), Human Resources, Warehouse Management and Decision Support System. These solutions are often incorrectly quoted as back office solutions indicating that customers and the general public are not directly involved. This is contrasted with front office systems like Customer Relationship Management (CRM) systems that directly deal with customers, or ebusiness systems such as eCommerce, eGovernment, eTelecom, and eFinance, or Supplier Relationship Management (SRM) systems. In reality, ERP modules are cross-functional and enterprise wide software solutions. All functional departments that are involved in operations or production can be integrated in one system using it. In addition to manufacturing, warehousing, logistics, and Information Technology, it also includes; accounting, human resources, marketing, and strategic management.

There are many different flavours of ERP that serve businesses' varying procedure types. An ERP solution has numerous benefits depending on the type of business that it serves; these are business solutions and industry solutions. The industry solutions are designed for people who are working in specific industries, like finance, communications, education, healthcare to name a few.

Importance of ERP software for businesses:

ERP software business solutions are designed for companies that work in a wide variety of areas. IT combines a large number of different elements into a single unit. Three of the most important ERP tools available today are manufacturing, human resources, and finance.The finance tools allow companies to successfully maintain their financial information like that of the assets, accounts, budgets and cash. ERP can also assist a company in managing internal as well as external factors affecting it. A company that uses ERP financial products can save a great deal of money over the long term, the reason being, the productivity of the organization will be improved. Enterprise Resource Planning is instrumental in getting rid of time consuming activities as paper management. A company is able to study their processes, earnings, and performance by merging their operational information with their financial information. Once this information is connected together, a company can become more competitive and productive. Synergy is an important part of ERP solutions. The concept of combining multiple processes into a single whole will allow the company to become successful in the long term.

In addition to finance and business processes, it is also important to look at materials maintenance. Enterprise Resource Planning will allow a company to successfully automate the process of buying materials and maintaining them. There are modules that track the supplies that are purchased and can also make calculations about how these materials should be distributed. It also becomes possible for a company to predict the demand of the market based on history, economic statistics, and data from their employees. They can even decide when a product should be produced, and they can do this based on the raw material that is available. 

Saturday 2 February 2013

Information Technology Infrastructure Library (ITIL)


Today’s IT systems require a disciplined and controlled approach to system management. The ITIL framework provides a great guide for organisations seeking to streamline processes, improve service delivery and enforce controls. However, a rigid one-size-fits-all strategy to ITIL is not the right answer for all.

The IT Infrastructure Library® (ITIL) is the most widely accepted approach to IT service management in the world. ITIL is a best practice framework that has been drawn from both the public and private sectors internationally. It describes how IT resources should be organised to deliver business value, documenting the processes, functions and roles of IT Service Management (ITSM).

ITIL is a set of books that provide a practical, no-nonsense framework for identifying, planning, delivering, and supporting IT services to the business. The framework is based on proven best practices developed by IT experts around the world and has evolved over the past two decades. ITIL is the most widely adopted approach for IT service management.

ITIL is a public framework that describes IT service management best practice.  It “provides a framework for the governance of IT, the ‘service wrap,’ and focuses on the continual measurement and improvement of the quality of IT service delivered, from both a business and a customer perspective”.

ITIL was first developed in the 1980s by the Office of Government Commerce (OGC), a branch of the British Government. It has become a de facto global standard, with thousands of organizations worldwide adopting it as the framework for establishing IT processes .ITIL comprises of five chapter namely  first Service Strategy, provides an overall strategy for IT services and IT service management. The remaining chapters are Service Design, Service Transition, Service Operation, and Continual Service Improvement.

It’s important to note that the ITIL tell you what to do but not how to do it.

Wednesday 2 January 2013

BRING YOUR DEVICE (BYOD)


A bring your own device (BYOD) is nothing but allowing employees to bring their own device to access enterprise network.A bring your own device (BYOD) strategy for enterprises can be a winner for both users and administrators. But switching to BYOD requires more than throwing open the barn doors and letting employees buy whatever device they want. IT still needs to manage and secure the data on mobile devices, whether they are owned by an enterprise or user.

In more traditional mobility deployments, the enterprise itself was responsible for all facets of the mobile device, including purchasing, its associated voice and data plans, as well as managing the device assets. The IT department would track what device was assigned to each user and would be the clearinghouse for any device replacement or upgrades. Essentially, IT treated mobile devices in the same way that it did other IT assets like laptops or printers.Consumers, however, are embracing smartphones and tablet devices as ways to stay personally connected. This has led to a two-device dilemma, with many enterprise users carrying both a personal and work device with them. The bring your own device movement is partially a solution for this dilemma, enabling users to carry a single device for both business and personal use.

Bring your own device (BYOD) programs, especially when they include desktop virtualization, have gained steam in organizations looking to centralize desktop management and make hardware management easier. Allowing end users to employ their own personal devices can also make them more productive, saving companies time and money. But if an organization implements BYOD poorly, it can lose control over its infrastructure and, even more importantly, its data.

It’s important to take some time and plan out a BYOD initiative by following these guidelines:

Determine the need for a BYOD program
Some organizations jump on the BYOD bandwagon too quickly, not realizing how it can affect their existing IT infrastructure. Examine how users work on their corporate PCs to gauge whether they will be able to continue this type of productivity on their personal devices. In some cases, users will be a lot more productive given the chance to use their own equipment. Other times, a BYOD initiative just won’t make sense, either because of employees’ work styles, the corporate culture or other reasons.

Consider desktop virtualization
Desktop virtualization can deliver corporate desktop images to personal endpoints, ensuring that there won’t be a drastic change for users when a BYOD program takes effect. At the same time, users can still have very powerful, personalized computing experiences because they are in charge of managing their devices. The added benefit is that IT administrators can manage desktop images directly from one interface and worry less about endpoint hardware.

Don’t forget application delivery
Even though they’ll be using their own devices, employees will still need access to corporate applications. Application delivery is an important subset of desktop management, especially when it comes to BYOD. It means not only controlling how applications get to end users, but also how to monitor and manage application settings all from a centralized location. Virtualization is one way to handle application delivery in your BYOD program.

Plan for BYOD security
Even with a BYOD program in place, IT admins still have to control and manage access to the corporate infrastructure and data. Another benefit of using desktop or application virtualization is that data and applications live in the data center. This way, a lost device doesn’t spell disaster, because the device doesn’t actually contain any sensitive corporate information. As they do with standard, corporate-owned devices, administrators will still need to create comprehensive security groups and strict policies, plus perform general security monitoring.

Get end users’ support
Keep in mind that some of your users might not be up for BYOD. Some people may take issue with the blurring of the line between their personal and work lives, for example. Educating end users and assuring them that their IT department can help them have a better work experience with their personal devices should be on the BYOD checklist. By gradually testing the program, organizations can gain employees’ support and make them much more enthusiastic about using their own devices for work.

Develop BYOD policies
Implementing a BYOD program doesn’t mean users will be able to use any device they want. For BYOD to be successful, admins must decide in advance which devices they will support for various workloads. For example, you can deliver a full desktop to an Android phone, but it probably isn’t practical because of the small screen (and other factors). But delivering that same desktop to an iPad might work for some users. Figure out what the needs of your users are, then pick a device (or devices) to fit those needs. IT also needs to develop, implement and enforce a BYOD policy that governs user access to corporate infrastructure and data on their device.

BYOD still requires mobile device management
Shifting users to a BYOD strategy does not absolve IT from responsibility for mobile device management. It doesn’t matter who is paying for the mobile device, IT will still have to manage that device as a corporate asset. Companies will need tools to support mobile devices, including tools for mobile device management (MDM), mobile security and mobile application management.