What happens after Windows 7’s retirement?
The January end-of-support deadline for Windows 7 is fast approaching. Here’s a rundown of some of the issues companies should keep in mind as that date draws near.By Gregg Keizer
The Redmond doctor came into the room, huffed a chair into place, but wouldn’t meet Windows 7’s eyes, just stared at the desk. “I’m afraid it’s bad news,” the physician said.
Windows 7 let out a long sigh.
“It’s terminal,” the M.D. said. As if Windows 7 hadn’t known it was on borrowed time since July 2015. That scare in the fall of 2012 had been irksome, nothing more. But then three years later, the end was clearly in sight. And here it was.
“Ten weeks,” the doctor said, gazing out the window at the fall leaves. “Maybe eleven. But then….”
What happens to Windows 7 then?
Nothing immediately.
The operating system will continue to work or not, as it did or didn’t, for each user the day before support retirement. That’s important to remember, if only because some still don’t — assuming that after midnight on Jan. 14, 2020, the OS screeches to a stop.
Even Microsoft reminds customers that Windows 7 will continue to run post-retirement, although it could move those reminders closer to the top of its to-do list. In this FAQ about the end of support, Microsoft waited until the fifth item before making note of the operating system’s resilience. “If you continue to use Windows 7 after support has ended, your PC will still work,” Microsoft pledged, also noting, “Your PC will continue to start and run.”
But customer support comes to a halt — theoretically, Microsoft’s phone- and chat-based support won’t answer questions — as do security updates. Yet unless Microsoft issues an emergency update in the four weeks after Jan. 14, the first fixes Windows 7 users will miss arrive Feb. 11. Until then, an out-of-date Windows 7 system will be as patched as if support had continued.
What happens to Office when Windows 7 drops from support?
That depends on the type of Office. Office 365, the version paid by subscription — whether for one, as in Office 365 Personal, or for thousands, as in Office 365 Enterprise E5 — will continue to receive security updates on unsupported copies of Windows 7 until January 2023.
That’s the good news. The bad? Office 365, whose premise is one of constant evolution, will not upgrade to new features or functionality. The feature set, in other words, will lock down and stay that way.
On the Office flip side — those versions sold as “perpetual licenses,” such as Office 2010 or 2016 — will be supported through each suite’s standard span. (Remember: Perpetually licensed Office, a.k.a. non-subscription Office, only receives bug fixes, never feature updates or improvements.) Office 2010, for instance, will be supported until Oct. 13, 2020; Office 2013, until April 10, 2023; and Office 2016, until Oct. 14, 2025.
The most recent perpetually licensed suite, Office 2019, is supported only on Windows 10.
Microsoft did set a caveat, however, on Office support. “If the problem is a result of the combination of Office and an unsupported operating system, the problem will not be supported (emphasis added),” the company stated.
The January 2023 end-of-security-updates deadline wasn’t plucked from the air. It was chosen because that’s how long Microsoft will provide Windows 7 patches for payment through its Extended Security Updates (ESU). Microsoft realized that if it sold ESU to commercial customers, it also had to keep patching Office.
What about Internet Explorer?
Unlike Office, Microsoft will stop patching Internet Explorer 11 (IE11) at the same time it halts updates to Windows 7. In other words, on Jan. 14, 2020.
“As a component of Windows, Internet Explorer follows the support lifecycle of the Windows operating system it’s installed on,” Microsoft says — and has for ages, since that’s been boilerplate for seemingly forever. But elsewhere, the firm put it plainly. “Support for Internet Explorer on a Windows 7 device will also be discontinued on January 14, 2020,” it said here.
The only way to keep receiving IE11 security updates in Windows 7 is to pay for Extended Security Updates (ESU).
What happens to the antivirus defense we use?
That depends on the antivirus vendor’s policies and practices.
Just as happened at the retirement of Windows XP in April 2014, expect that most credible AV makers will continue to pump out new definition updates — the “fingerprints” that identify newly-found malware to the scanner — for Windows 7 long after the OS has fallen off the support list. The three-year availability of Extended Security Updates (ESU) to business customers will guarantee AV vendors that cater to the corporate market will keep definition releases going.
AV support may quickly be limited to issuing definition updates, although some vendors will continue to refresh products with new or enhanced features.
For reference, Symantec moved Windows XP (retired 4/14) and Vista (4/17) to what it calls “Maintenance Mode” only in June 2018. As of that date, Symantec said, “New product capabilities will no longer be provided.” But already-installed software “Will continue to receive the latest malware definitions” as well as “vulnerability updates and compatibility fixes.”
Microsoft has not yet said what it will do for Security Essentials, the free anti-malware product for Windows 7. Again, a look to Windows XP is worthwhile: Microsoft provided definition updates for more than a year after XP’s retirement.
What happens if we can’t get off Windows 7, but can’t run unpatched PCs?
Microsoft will gladly sell commercial customers, from the smallest businesses to the largest enterprises, what it calls “Extended Security Updates,” or ESUs, that provide security updates to patch “Critical” and “Important” vulnerabilities through mid-January 2023…for a price.
The per-device plans will be sold in one-year increments for up to three years, with prices for larger customers running as high as $350 per PC for all three years. (Costs for smaller businesses won’t be revealed until Dec. 1.)
Although Microsoft dubbed ESU the “last resort” for Windows 7 customers, it spent a large chunk of this “End of Support FAQ” describing the service, drawing its boundaries and extolling its benefits. ESU is, by far and away, the most transparent post-retirement security support concept Microsoft has launched. The company recognizes that many businesses will not make the deadline and so it wants a solution, temporary if that, or is eager to use what may be the last ever such OS transition to generate additional revenue.
Or both.
Note that ESU has no bearing on security updates for Office 365 ProPlus — the part of an Office 365 subscription that provides the locally installed applications — on Windows 7.
Even Windows 7-powered PCs that are not covered by ESU will continue to receive patches for Office 365 ProPlus. Microsoft made that clear in the FAQ: “Windows 7 ESU will have no impact on support for Office 365 ProPlus on Windows 7,” it read.
Wysetek accelerates datacentre practice for digital world
High performance network and security will be the top priority for modern data centres across organisations says Rajesh Mathkar at Wysetek.
The data centres are transforming at break need speed in terms of their Infra that is accelerated by the emergence of digital technologies and new age business demands. Wysetek Systems Technologists as Pan India systems integrator and IT services company today encompasses datacentre solutions portfolio that includes Hyper Converged Infra (HCI), Virtualization, Cloud, Cyber Security, Data management and Open source. Rajesh Mathkar, director at Wysetek Systems Technologists talks on the modern datacentre world and how Wysetek is realigning it’s teams to customers demands.
What are the prime technology trends across the datacentres at customers end? Any new datacentre solutions to be in more demand in 2020?
Software-defined IT, Consumption-based IT and Data controls will be the main trends across data centres.
Customer need for improved agility, better manageability and enhanced asset usage will force many companies pursuing digital transformations to migrate over 50% of their IT infrastructure in their data centre and edge locations to a software-defined model. These customers might need new infrastructure because their existing solutions are aging and no longer able to meet their performance requirements. Simply adding more hardware does nothing to address the customer’s deeper issues: a complex hybrid environment with silos of traditional infrastructure that resists automation and with pockets of cloud services that are unmonitored and unregulated.
Consumption-based IT is picking up across Indian organisations. A strong consumption-based IT vendor gives a choice of technologies, expertise in solutions, enterprise-grade support, and advanced remote infrastructure management capabilities to get it right with the same flexibility and cost. An interactive portal that helps customers monitor, manage, and optimize their consumption-based IT services is the need of the hour. The consumption-based procurement in customers’ data centre will have eclipsed traditional procurement through improved “as a service” models, thus accounting for as much as 40% of enterprises’ IT Infra spending.
Large enterprises will have added mandated regulatory compliance investments to their advantage by using them to set and enforce automated data controls across their clouds, core data centres and edge locations. Managing the sheer volume of data across devices and clouds is beginning to be a bigger challenge for CIOs and their organisations. Companies must analyze the data and derive insights that can help them drive innovation and give them a competitive edge.
What are the key offerings by Wysetek for its customers in the datacentre domain?
The key datacentre solutions includes Hyper Converged Infra (HCI), Virtualization, Cloud , Cyber Security,Data management & Open source. Wysetek also encompasses a strong 24 X 7 services and support network that is crucial for the datacentre projects.
Wysetek’s USP in datacentre domain heralds from the fact that we have more than two decades of expertise in compute and storage infra including strong practice across various verticals. Our team has deep skill sets in information security and most data centres need holistic security solutions. And the technology solutions practice is backed by strong 24 X 7 services and support network.
What are the top expectations of CIOs and IT managers in terms of datacentre solutions and services?
Wysetek has separate team for datacentre solutions as a dedicated focus since over a decade. The teams comprises of DC design Solution Architects, Project Managers, Virtualization & Cloud tech specialists, Implementation engineers.
CIOs today are looking at service providers who can be partners in making their vision a reality, which includes hyper Converged Infra (HCI), Virtualization, Cloud , Cyber Security, Data management & Open source. And Wysetek has the bandwidth to be a competent datacentre partner with the organisations.
What is the main agenda of the datacentre team at Wysetek ?
Data center solutions have always been key focus for Wysetek. We want to be the trusted partner for organizations in their digital transformation (Dx) journey.
We want to help organisations meet both ends of keeping cost under control and derive more productivity. Another priority for our datacentre team is to help them choose from wide area of new technologies like Hyper Converged Infra (HCI), Virtualization, Cloud , Cyber Security, Data management & Open source, mobility. Our team is committed to assist our customers’ IT team with an end-to-end project to simplify their complex IT Infra.
What will be the top accelerators to grow your datacentre business in 2019 and 2020?
High performance networking will be the new demand from modern datacentres as data continues to increase at a rapid pace. The Apps and workloads will demand more bandwidth with faster access. And hence high performance network is the key for data centres to be flexible, scalable and secure for the App world.
Security has to be now in both directions – north south as well as East West traffic – across datacentres. Hence a holistic security strategy across data centres including server security, App security, network security will be an accelerator for Wysetek’s datacentre business.
“CIOs today are looking at service providers who can be partners in making their vision a reality, which includes hyper Converged Infra (HCI), Virtualization, Cloud , Cyber Security, Data management & Open source. And Wysetek has the bandwidth to be a competent datacentre partner with the organisations.”
Rajesh Mathkar, Director, Wysetek Systems Technologists
Wysetek’s USPs in datacentre domain
Two decades expertise in compute and storage infra.
Strong virtualization practice across various verticals.
Team with deep skill sets in information security.
Backed by strong 24 X 7 services & support network.
Why we shouldn’t let AI write for us
Artificial intelligence will benefit business in myriad ways. But AI that writes for us should be rejected completely. By Mike Elgan
Machines are getting better at writing. They can finish our sentences. They can reply to our emails. They can write news reports and even novels. But just because they can doesn’t mean they should.
Artificial intelligence (AI) is launching a technology revolution that will transform business over the next decade. The most powerful use for AI may be in the area of decision support, where algorithms feed us streams of knowledge and advice as we go about our work. Gartner says AI augmentation alone will create $2.9 trillion (with a “t”) in business value in 2021.
AI evolution is necessary for enterprise security, too, if only because the cybercriminals will use it to build better malware. We’ll benefit from AI in manufacturing, design, transportation and in countless other areas.
In short, AI will prove to be a huge boost to business.
But as we embark on this partnership with artificial intelligence, it’s important that we safeguard human intelligence. And the biggest threat to human intelligence is software that writes.
The creeping takeover of business writing
The mainstreaming of AI business writing began with Google Smart Reply four years ago. Google Inbox users were offered a few colorless options for a reply to most emails. The feature still exists in Gmail, and with a single click you can respond with “Thanks!” or “I’ll send it to you” or “Let’s do Friday!”
Last year Google added Smart Compose, which finishes the sentences you start. You can choose Google’s words by pressing the tab key.
Using Smart Reply and Smart Compose saves time but makes replies dull. They’re dull because Google makes sure the replies are generic and designed to not annoy or offend anyone (for example, Google’s AI never uses gendered pronouns like “he” or “she”), and also because millions of other Gmail users are using the exact same wording for their replies. We all sound the same in our replies.
Google is not alone. Lightkey makes a Windows application that works like Google’s Smart Compose.
Quillbot is a cloud-based tool that can rephrase what you write (or what you copy and paste from others’ writing). It typically produces awkward prose. Machines have no ear for language.
StoryAI is a tool based on OpenAI that will write a whole story if you write the beginning. I tried it by pasting in the opening paragraph of this column. You can read the column StoryAI wrote and decide who did a better job.
We find ourselves in the tragicomic place where AI writes financial news stories mainly for human consumption, but other AI also reads those stories to provide input for automated trading systems. AI does the writing. AI does the reading. And at some point AI is just going to cut humans out of the trade and keep all the money.
Automated writing will not only get better, it will be increasingly built into the tools we use to write things. The temptation to just let the machines do the writing will only grow. What’s wrong with that?
Here’s what’s wrong with that
The main problem with letting AI write for us is that writing isn’t just writing. Writing is one component of literacy, which includes reading, writing and thinking.
Writing involves revision, which clarifies thinking. We think. We write what we think. Then by reading what we write we realize the errors in our thinking, or at least in the way we have expressed our thinking. We rewrite until our thoughts are clearly and accurately and fully expressed. This practice is at the core of our ability to analyze, create, make good decisions and make progress in our lives and in our work.
Literacy and thinking are connected. This was the point of George Orwell’s Newspeak idea in the novel 1984. The totalitarian government in that book used restrictions on language to make complex thought impossible. Its purpose was “to diminish the range of thought” in order to pacify and enervate the public.
Writing, even writing business emails, forces us to confront our own thoughts in black and white. And this makes us cultivate our ability to think clearly.
It’s also the foundation of our ability to talk with logic and coherence. You’ll notice that good writers tend to speak well.
And writing aids memory. Just letting AI communicate for us, even if we choose from a menu of options, makes it easier to forget what “we” said.
More to the point, writing ability is a use-it-or-lose-it proposition, and AI systems that write for us could make us gradually lose it.
By allowing writing tools to do the writing for us, our literacy fades, and we begin to base our decisions on superficial impressions, rather than critical or analytical thinking.
The critical faculty is already under siege with conventions like emoji. By using cartoons in place of words, we communicate vague impressions rather than specific thoughts. As such, it’s not necessary to think specific thoughts in the first place. Textspeak, SMS abbreviations, autocorrect, emojis —- we’re slouching toward idiocracy. AI that writes our business communication for us is the professional version of all that.
Our relationship with literacy exists on a spectrum.
At one end, we’re fully realized humans with language and literacy to think and communicate better. At the other end we’re less human. We’re “echoborgs” — meat puppets who mindlessly regurgitate the words fed to us by AI.
We should be trying to move toward the good end of that spectrum, not the bad one.
Fear mongering over AI is common nowadays — AI, we’re told, will take our jobs and ultimately have no use for us, other than to keep us as pets. This AI techno panic is based on the knowledge that the machines will just keep getting smarter. We should be more worried that AI will make us all dumber.
The most efficient way for AI to make us dumber is to take the task of writing away from us. Our critical and creative faculties will atrophy. Our minds will become dull. And we’ll all become so boring that the machines may not even want us around as pets.
If you’re concerned about AI making us all redundant, you can do something about it today and every day: Don’t let AI put words in your mouth. Reject automated writing in all its forms. Do your own writing. Think for yourself.
The risk isn’t that machines will get smarter. It’s that humans will get dumber.
Wysetek to showcase its security prowess at CLOUDSEC 2019
One of the biggest cyber security events in India CLOUDSEC 2019 will be held in Mumbai on 10 October 2019.
Wysetek is the silver sponsor at next month’s CLOUDSEC 2019
The annual event is scheduled on 10th October 2019 at Mumbai.
CLOUDSEC is one of the biggest cyber security conferences held in India that’s hosted by Trend Micro.
The event gathers together renowned experts, industry thought leaders and organizations from across the globe to re-evaluate and refine their understanding of threats, risks and solutions.
Mumbai headquartered Wysetek Systems Technologists has been deploying IT projects since past twenty years across enterprises and mid-market customers across India.
Wysetek is a gold level partner with Trend Micro offering Trend Micro solutions like Deep Security (Specialist Security for virtual infrastructure) & Deep Discovery (Anti APT) to the organizations across different verticals in India.
“We’re pleased to be a Silver Sponsor of CLOUDSEC 2019 event in Mumbai hosted by Trend Micro. The event is a leading industry standard that encapsulates global experts’ insights on the rising threats ranging from ransom ware, intrusion prevention, solutions for security teams, data centre and virtualization for security professionals and CIOs, says Rajesh Mathkar, Director, Wysetek Systems Technologists.
This years’s conference has lined up interesting sessions, panel discussions and break away on Advanced Persistent Threats (Targeted Attacks), Big Data Security, Cybercrime & Forensics, Cloud Security, Data Privacy & Protection, Internet of Everything
Last year, CLOUDSEC 2018 had more than 800 attendees including CSOs, CIOs, cyber security professionals, ITDMs of end customers.
Wysetek began a dedicated focus on security a decade back for its customer base and new customers too. Enterprise security is a must-have for enterprises to secure their internal and customer data from the menace of breaches as per Rajesh of Wysetek.
Wysetek was also sponsor for CLOUDSEC 2017 event.
Wysetek has deployed many complex security projects with Trend Micro Deep Security across banking, PSU, manufacturing to name a few exhibiting the domain expertise and team knowledge of the new age world of security.
Founded in 2011, CLOUDSEC are the leading internet security conferences in Asia Pacific and Europe. These events are vendor-neutral and feature presentations by global and regional industry experts. These industry events are held in major cities and they are supported by industry leaders, government agencies, NGOs, professional associations, technology vendors, and internet security professionals from around the world.
An organisation has to prepare for, withstand, and recover from any cyber security threat —one that’s so resilient that nothing can hinder its success. How can it easily adapt to increasingly complex and shifting IT environments. How companies sees cyber security as a strategy, and how it has a clear vision of how ever-changing threats and risks should be managed. CLOUDSEC 2019 will provide answers to these important questions for modern age organisations and their security posture.
Organisations need to see things from a different perspective as they need to have visibility through the power of collective and connected intelligence helps them build cyber resilience, and allows them to go further and do more as per Rajesh at Wysetek.
CLOUDSEC 2019 Conference Highlights
Thought leadership and keynote on internet security, panel discussion by global and regional security experts, Multimedia & interactive presentations, Guidelines and best practices for internet security, Internet security education and certification, Breakout tracks, workshops and tutorials, Industry announcements and awards, Networking opportunities |
Organisations need to see things from a different perspective as they need to have visibility through the power of collective and connected intelligence helps them build cyber resilience, and allows them to go further and do more
Rajesh Mathkar, Director, Wysetek Systems Technologists |
HISTORY OF CLOUDSEC
Founded in 2011, CLOUDSEC are the leading internet security conferences in Asia Pacific and Europe. These events are vendor-neutral and feature presentations by global and regional industry experts. The summit tagline aims to inspire technology professionals and users to embark on a continuous learning journey to manage the information technology and computer systems that support their corporate goals safely. These industry events are held in major cities and they are supported by industry leaders, government agencies, non-government organisations, professional associations, technology vendors, and internet security professionals from around the world. |
7 blockchain mistakes and how to avoid them
The blockchain industry is still something of a wild west, with many cloud service offerings and a large universe of platforms that can vary greatly in their capabilities. So enterprises should beware jumping to conclusions about the technology. By Lucas Mearian
Companies are still cautiously dipping their toes into the blockchain trough, hoping to discover where the distributed ledger technology can create efficiencies in their business processes. But for those who are ready to take the plunge, there are common missteps to avoid.
Based on its research of blockchain implementations, Gartner this week published a guide to the seven most common mistakes companies should avoid. Gartner gauges the maturation of new technology through a “Hype Cycle,” a graphic-based lifecycle that follows five phases: from the Technology Trigger, when proof-of-concept stories and media interest emerges, to the Plateau of Productivity, when mainstream adoption occurs – if the technology is more than niche.
Adrian Leow, senior research director at Gartner, said blockchain is currently sliding down toward the “Trough of Disillusionment.” That’s where interest wanes as pilots and proofs-of-concept fail to deliver forcing tech providers to either work out the kinks or allow a technology to fail and die out.
“The blockchain platforms and technologies market is still nascent and there is no industry consensus on key components such as product concept, feature set and core application requirements,” Leow said in a statement. “We do not expect that there will be a single dominant platform within the next five years.”
In fact, last week, Gartner in a separate study claimed that by 2021, 90% of current enterprise blockchain platform implementations will require replacement to remain competitive, secure and relevant.
“Many CIOs overestimate the capabilities and short-term benefits of blockchain as a technology to help them achieve their business goals, thus creating unrealistic expectations when assessing offerings from blockchain platform vendors and service providers,” Adrian Lee, a senior research director at Gartner, said in that study.
By 2025, the business value added by blockchain is expected to grow to slightly more than $176 billion – then surge past $3.1 trillion by 2030, according to Gartner. “Product managers should prepare for rapid evolution, early obsolescence, a shifting competitive landscape, future consolidation of offerings and the potential failure of early stage technologies/functionality in the blockchain platform market,” Lee said.
Consulting firms working in blockchain were surveyed by Gartner earlier this year and confirmed that CIOs aren’t even using the technology for its most valuable features. Mainly, companies are using blockchain as a database for shared record keeping and asset tracking while ignoring a key attribute: it’s an immutable audit trail.
“That no one is using those innovative features calls into question why they’re using blockchain. Just go use a database,”
Avivah Litan, a Gartner vice president and distinguished analyst, said in an earlier interview.
The perception that the technology is not meeting business expectations has resulted in a palpable disillusionment among IT leaders because of the misalignment of expectations and the real-world requirements of enterprise projects. The problem also stems from a simple fact: blockchain is not yet mature enough for all enterprise use cases.
Here’s a rundown on the mistakes companies are making.
- Not using blockchain to create immutable data audit trails
IT leaders who’ve taken the plunge into blockchain are mainly deploying it in proofs-of-concept tests, often to address the same problems a conventional database could handle, according to Gartner and other research agencies such as ABI Research.
“They’re not using it as a decentralized ledger able to support immutable data audit trails for exchanging a single version of transactional truth – the core mission at the heart of blockchain. For many, blockchain remains a technology in search of a problem,” according to Gartner.
- Assuming the technology is mature
A second mistake enterprises make is assuming blockchain technology is ready for production use when the market remains largely composed of fragmented platform offerings that try to differentiate themselves in various ways.
Some blockchain platforms are developed more for confidentiality, others for tokenization or the digital representation of fiat currency or goods; still others are created for universal transactions. Most, Gartner said, are too immature for large-scale production work that comes with the accompanying and requisite systems, security and network management services. However, this will likely change within the next few years.
“CIOs should monitor the evolving capabilities of blockchain platforms and align their blockchain project timeline accordingly,” the report said.
- Confusing protocol with complete business solution
A third misstep is confusing protocol with business solution, as blockchain is a foundational-level technology that requires applications on top of it to fulfill specific business needs.
While blockchain can and is being used in a variety of scenarios ranging from supply chain management to sharing data across medical information systems, it must also include features such as user interface, business logic and interoperability.
“When it comes to blockchain, there is the implicit assumption that the foundation-level technology is not far removed from a complete application solution. This is not the case,” Leow said. “It helps to view blockchain as a protocol to perform a certain task within a full application. No one would assume a protocol can be the sole base for a whole e-commerce system or a social network.”
- Misconceptions about scale
A fourth misconception is that blockchain should be considered as purely a database or data storage system. The technology does not yet scale well, as each node in the peer-to-peer network receives a full copy of the distributed ledger each time it’s updated; as it grows, performance slows.
Blockchain, Gartner said, was designed to provide an authoritative, immutable, trusted record of events arising out of a dynamic collection of untrusted parties. That architecture comes at the price of database management capabilities.
In its current form, the technology does not implement the full “create, read, update, delete” model found in conventional database management technology. Instead, it should be seen as a write-once, append-many electronic ledger. “A conventional data management solution might be the better option in some cases,” Leow said.
- Expecting interoperability too soon
A fifth mistake businesses make is assuming the blockchain universe includes interoperability standards. While some vendors of blockchain platforms talk about interoperability with other blockchains, it is difficult to envision interoperability when most platforms and their underlying protocols are still being designed or developed, Gartner said.
Currently, any vendor conversations about platform interoperability should be seen by CIOs and others as a marketing.
“Never select a blockchain platform with the expectation that it will interoperate with next year’s technology from a different vendor,” Leow said.
- Assuming smart contracts are fully baked
A sixth mistake some make is assuming that smart contract technology is mature. While smart contracts arguably represent the most powerful aspect of blockchain because they are business automation applications that add dynamic behavior to transactions, problems remain.
Conceptually, smart contracts are software scripts that store procedures associated with specific transaction records. For example, a smart contract could ensure that when cargo reaches a point of entry, a manufacturer awaiting the parts is notified. Unlike a stored procedure in a centralized system, smart contracts are executed by all nodes in the peer-to-peer network, resulting in scalability and manageability challenges that haven’t been fully addressed.
Smart contract technology will undergo significant changes. So CIOs should not plan for full adoption yet, opting instead to run small experiments first. That area of blockchain will continue to mature over the next two or three years, Gartner said.
- Misunderstanding governance
In a private or permissioned blockchain, governance of the network is typically handed by the owner of the blockchain. So while a supply chain consortium may have dozens of members, the originating company is typically in charge of onboarding, verifying identifiable and financial information, and resolving any disputes that may arise. That’s not the case with public blockchains.
“Governance in public blockchains such as Ethereum and Bitcoin is mostly aimed at technical issues. Human behaviors or motivation are rarely addressed,” Leow said. “CIOs must be aware of the risk that blockchain governance issues might pose for the success of their project. Especially larger organizations should think about joining or forming consortia to help define governance models for the public blockchain.”
Digital transformation brings IT and LOB together
CIOs have an opportunity to shrink the distance between technology and line of business as IT takes a leadership role with digital business initiatives. By Beth Stackpole
With IT leading digital business initiatives, the longstanding delta between technology and line of business (LOB) is shrinking as collaboration and cross pollination of strategic expertise becomes the epicentre for enterprise advancement.
The CIO’s rising stature and expanding portfolio of responsibilities are among the key drivers for movement on the ever-elusive goal of IT/LOB alignment. CIOs’ traditional role as technologist with oversight of back-office operations has significantly broadened to a strategist charter, increasing exposure and clout among business counterparts. According to the 2019 State of the CIO, which surveyed 683 IT leaders, 67 percent of respondents said a significant portion of their time is now spent on business strategist activities in pursuit of innovation and advancing go-to-market plans.
“The evolution of technology is exponentially increasing and shaping how consumers think about engaging with different companies, and the technology function is now a strategic leadership role,” notes Angela Yochem, executive vice president and chief digital and technology officer for Novant Health. “CIOs are the digital product and services leads.”
Even with the shift, CIOs are not abdicating functional duties in areas like security management or improving IT operations and systems performance. On the contrary, the 2019 State of the CIO research found CIOs are still wearing the traditional hat in addition to picking up responsibility and oversight of areas far outside of their typical domain.
Respondents to the survey confirmed they are devoting a higher percentage of time to functional activities (85 percent) in addition to transformational efforts (88 percent) like aligning IT initiatives with business goals and cultivating the IT business partnership. At the same time, the strategist portion of the CIO agenda has taken off this year, illustrating an increasing reliance on IT to steer technology-driven business initiatives and digital transformation. In comparison, only 53 percent of respondents to the prior Year State of the CIO spent any significant time on business strategist duties.
As part of the new emphasis, CIOs are channelling energy to efforts they haven’t spent much time on in the past. For example, 35 percent of respondents to the 2019 State of the CIO are actively driving business innovation compared to only 28 percent last year, and 23 percent are developing and refining business strategy, a 2 percent hike over 2018.
Other activities newly heaped on the CIO’s plate include identifying opportunities for competitive differentiation (21 percent), crafting new go-to-market strategies and technologies (19 percent), and studying up on market trends and customer requirements in order to identify new commercial opportunities (16 percent). CIOs are also taking ownership of new domains and responsibilities, among them: Data analytics (64 percent), operations (43 percent), business development (38 percent) and customer service (32 percent).
CIOs new role transcends tradition
As CIOs embrace a portfolio that transcends traditional IT boundaries, there’s no question a tighter partnership with LOB and closer alignment on shared priorities is a foundational element for success. “Everything we do, we do as a collaboration with business,” says Shannon Gath, vice president and head of technology at AMAG Pharmaceuticals. “We co-create the value proposition together and there is alignment around delivering scalable, secure innovative solutions that drive patients’ health.”
Even when LOB spearheads the purchase of their own technology products and services, there remains a desire to work in concert with IT. The rise of cloud services has made it easier for business users to circumvent official IT channels, yet LOB continues to lean on the technology organization for both advisory and oversight assistance. Eighty-five percent of IT heads responding to the 2019 State of the CIO said the department stays involved in some capacity, most (43 percent) maintaining shared project oversight. At 67 percent of responding companies, IT and business are cooperating more frequently on collaborative projects where IT shares responsibility and oversight, another indicator of greater IT/LOB synergy.
While IT is being recognized for stepping up to the strategic advisor role, there remains a gap in perception between CIOs and their LOB counterparts. In this year’s survey, more than half of CIOs interviewed (59 percent) characterized IT as a strategic advisor for technology initiatives (up from 52 percent last year), spending time identifying business opportunities and recommending technology and provider selections. Far fewer LOB respondents characterized IT in that capacity, at only 41 percent; 18 percent still viewed IT as a cautious voice of reason compared to a tiny fraction (4 percent) of CIOs.
To empower the transition, IT organizations are shoring up their ranks with talent versed in business-oriented skills, which helps improve communication between the two functional areas. Technology roles like cloud architects and data scientists are in hot demand, but IT organizations are also seeking out candidates with proficiency in business and soft skills to foster more effective interaction with LOB counterparts and to ensure collaborative efforts don’t get waylaid by miscommunication or competing goals. Forty percent of respondents to the 2019 State of the CIO were on the hunt for employees with change management and strategy building skills while 32 percent were targeting project management acumen and 25 percent business relationship management skills.
Some disconnect remains
While enterprises have made significant strides to align IT and LOB goals, some longstanding perceptions remain a barrier. For example, despite recognition of IT’s contribution to business strategy, there is still a disconnect between how CIOs view their role in digital transformation and how their business counterparts see them. The vast majority of IT leader respondents to the 2019 State of the CIO survey (88 percent) believe CIOs are driving digital transformation efforts more aggressively than any of their business counterparts. Yet that view is only shared by 47 percent of LOB respondents.
There are also differences in both business and technology priorities among the different groups. CIOs are putting emphasis on increasing operational efficiency (40 percent), bolstering cybersecurity protections (40 percent), and improving customer experience (35 percent) as the key areas driving IT investments—a view mostly shared by LOB. However, instead of a focus on cybersecurity protections, which fell lower on LOB’s list, that segment placed a greater priority on growing the business (32 percent).
In terms of the technology agenda, IT leader respondents to the 2019 State of the CIO put the highest priority on data/business analytics (30 percent) followed by cloud computing (27 percent), and enterprise applications and security/risk management (both cited by 26 percent of respondents). LOB, on the other hand, is championing cloud computing (25 percent) followed by security/risk management (23 percent), business process management (19 percent), and data/business analytics (18 percent).
LOB and IT leaders also have slightly diverging views on the challenges CIOs face as they settle into the strategist role. With more on their plate, CIOs continue to struggle with balancing responsibilities that span operational excellence and innovation—an uphill battle for 80 percent of IT leaders responding to the 2019 State of the CIO compared to only 73 percent last year. In comparison, only half of LOB respondents believe CIOs are being stretched too thin by having to juggle simultaneous objectives and agendas.
With digital transformation, CIOs have a real opportunity to take a front-seat leadership role. Yet their success hinges on forging a tight partnership with LOB and creating synergies that put the age-old alignment issue permanently in the rear-view mirror.
In this year’s survey, more than half of CIOs interviewed (59 percent) characterized IT as a strategic advisor for technology initiatives (up from 52 percent last year), spending time identifying business opportunities and recommending technology and provider selections. Far fewer LOB respondents characterized IT in that capacity, at only 41 percent; 18 percent still viewed IT as a cautious voice of reason compared to a tiny fraction (4 percent) of CIOs. |
Technology Agenda : 2019 State of the CIO
Data/business analytics – 30 % Cloud computing – 27 % Enterprise applications – 26 % Security/risk management – 26 % |
Network monitoring in the multi-cloud era
Most enterprises now use two or more cloud service providers, and 35% use up to five monitoring tools to keep tabs on hybrid cloud and multi-cloud environments. What’s the best approach to full network visibility? By Stacy Collett
Network monitoring in the enterprise has never been easy. Even before organizations began moving software and infrastructure to the cloud, a typical enterprise used four to 10 tools just to monitor and troubleshoot their own networks, according to analyst and consulting firm Enterprise Management Associates.
The public cloud adds another complex wrinkle to network visibility. Traditional monitoring tools center around the health and performance of individual network elements. Today’s digital business era requires a more holistic view of networks with the ability to glean and correlate data from diverse cloud environments using big data analytics and machine learning.
Today 40% of organizations consider themselves multi-cloud users, having two or more cloud service providers for their organization, according to a survey by Kentik. One-third of organizations have a hybrid cloud environment, with at least one cloud service provider and some type of traditional infrastructure that is company-owned, co-located, or a third-party data center.
“There’s a lot of different types of data that people collect and analyze on the network – everything from device metrics to NetFlow to packets to logs to active synthetic monitoring, and no one vendor does it all very well. Most of them don’t even try to do all of it,” says Shamus McGillicuddy, research director at EMA.
As a result, 35% of multi-cloud users have three to five monitoring tools, including log management tools (48%), application performance management tools (40%), open-source tools (34%), and network performance management tools (25%).
“Network people tell me they just can’t find end-to-end tools. They have a really good view of the data center, a good view of AWS, a good view of Azure, but they can’t pull it all together,” McGillicuddy says.
“The environment is getting far more complex,” says Bob Laliberte, senior analyst at Enterprise Strategy Group. “So it will be critical for them to find very sophisticated tools that will allow that complex environment to become simple to manage.”
Easier said than done. Network professionals often complain that existing device-centric network monitoring does not scale or provide the needed visibility for cloud and digital-business-era applications. Cloud-native monitoring tools, such as Amazon CloudWatch, Azure Monitor or GCP Stackdriver, are less piecemeal and can observe all infrastructure and application layers, but some users find cloud tools often lacking in features and visibility, not to mention that they don’t integrate well with on-premises tools.
No vendor has come up with a “big picture” monitoring solution, and one shouldn’t be expected anytime soon because of the vast differences between the networks you own and those you rent, analysts say. But there are ways to close the gap just a little and achieve better visibility across the networks.
Connecting islands of network insight
In a hybrid cloud environment, “you’re always going to have islands of visibility. The important thing is to look for opportunities to integrate those islands,” McGillicuddy says.
One of the most valuable sources of data for a network monitoring tool is a management system API used to pull data from other platforms, whether it’s from AWS, or an IT service management platform like ServiceNow that’s sending ticket data, or a security monitoring tool.
“If you’re going to try to pull these things together, you need a network monitoring vendor that has a very modern API on the tool that gives you access to things like custom data collection, tool customization, and the ability to build new dashboards that allow you to see the cloud in the way you want to see it,” McGillicuddy says.
Most new vendors will have a good API, he adds. Older ones might be slower to open up APIs to customers because they consider the data they produce with their analytics to be proprietary.
“Infrastructure teams may have an advantage with some of the legacy tools that they currently have that are expanding into cloud-native environments,” Laliberte says. Tool sets like Riverbed, which integrates SNMP polling, flow and packet capture to get an enterprise network view of performance in hybrid cloud environments, and SolarWinds advanced network monitoring for on-premises, hybrid, and cloud, “give the opportunity to tie in both the legacy and cloud” monitoring, he adds.
Many traditional network monitoring tools, however, have been slow to adopt a roadmap for the cloud. Some 74% of network managers surveyed by EMA say they had a network management tool fail to meet their public cloud requirements. Among those network managers, 28% said this failure was due to vendor inaction or lack of a cloud support roadmap.
“I think we’ll get to the place where all the vendors are ‘good’ at incorporating some insight into the cloud with their tool – but I don’t think you’ll ever see a time where there is true parity,” McGillicuddy says.
Cloud service providers make some progress
For cloud native and multi-cloud environments, “the cloud providers are starting to provide a little more consistent access to tools to monitor the networks that cross their perimeters,” says Gregg Siegfried, research director, cloud and IT operations at Gartner.
Microsoft Azure, for example, has added Virtual Network TAP (currently in preview in all Azure regions), which allows you to continuously stream your virtual machine network traffic to a network packet collector or analytics tool. The collector or analytics tool is provided by a network virtual appliance partner.
“Those are much more akin to what network engineers are seeing from their onsite [systems] – so the ability to integrate things like that will certainly assist in those hybrid environments,” Siegfried says.
Despite the progress being made, many cloud users don’t know about or take advantage of some of the monitoring features already in place, according to Kentik. For instance, more than half of AWS users surveyed say they are using the cloud-specific monitoring tools offered by AWS, such as flow logs.
“I generally recommend that clients try the cloud providers’ tools first and cloud-native tools first before spending time and money on third parties,” Siegfried says, “but there is absolutely a delta between the visibility you get from a cloud provider and the visibility you can get with one of these [add-on] products.”
Crossing the lines: multi-cloud monitoring
New tools have emerged that combine monitoring across multi-cloud environments.
The types of features that are important in these tools are their ability to be adaptable, their ability to support collaboration with product development and other infrastructure teams, and their ability to integrate data from multiple sources. It should also be able to factor in things like cost and capacity management that are important in a hybrid network, Siegfried says.
Some of these tools include ThousandEyes, Kentik and APM tools, such as New Relic and Dynatrace, to name a few, Siegfried adds.
Kentik in April announced integrated support for Microsoft Azure. Kentik began using flow data from AWS and Google Cloud Platform late last year. The platform also integrates with other cloud infrastructure data sources, such as host-level instrumentation, virtual network appliances, and container orchestration or service mesh.
Kentik primarily collects NetFlow or real traffic data between two points. It’s telling you what happened on your network and enhances it with other data sources.
Internet monitoring vendor ThousandEyes last year extended its Network Intelligence product to multi-cloud environments. The company has pre-provisioned IaaS vantage points, including 15 AWS, 25 Azure, and 15 GCP regions, giving them visibility into how specific cloud providers are performing in various geographies. It can also do agent-to-agent testing between clouds, giving IT the ability to measure inter-region, hybrid, inter and intra-cloud performance.
While Kentik monitors live traffic, ThousandEyes generates synthetic traffic that emulates a user, and then tells you what could be happening with a hypothetical network transaction.
Interest in active synthetic monitoring solutions has grown over the last three years, McGillicuddy says. “It’s two different ways of looking at things. Synthetic is good because some transactions you can’t see from both sides.”
AIOps and advanced analytics platforms
As network monitoring becomes as much about data acquisition and ingestion as it does about troubleshooting, analysts see the emergence of artificial intelligence for IT Operations (AIOps) and advanced analytics platforms that perform big data analysis and machine learning to correlate insights across tools.
“You see some vendors like CA doing that with their big data stack they’ve built called Jarvis that plugs into different parts of their tool portfolio to correlate insights across them,” McGillicuddy says. “They’ve also tried to make it easier to pull data from third-party vendors to correlate insights. Some specialist vendors can also plug into all your monitoring stuff and correlate everything for you in a way that’s easy to see,” he adds. “We see some indication in our research so far that that’s actually a good approach.”
Looking ahead: Distributed network monitoring
Gartner recommends a data-driven network monitoring framework for boosting network visibility across multiple cloud services, rather than rely on traditional infrastructure tools.
“Use cloud native tools, as opposed to trying to bring your internal tools in the cloud, and wait to see how the market [develops],” says Simon Richard, senior director and analyst at Gartner. “I suspect that the better tools to do multi-cloud monitoring will be coming from the cloud [providers].”
“Whether we call it hybrid, cloud or SD networking, the future of networking is software defined – with distributed rather than centralized intelligence or control,” Siegfried says. “The same automation philosophy, infrastructure and code techniques that have disrupted other areas of infrastructure management are applying to networking as well. Consider a data-centric network monitor framework … for building the types of network monitoring platforms that will survive or support some of these evolving architectures.”
Holistic services portfolio delivers customer delight: Ventakesh Pai, Wysetek
Wysetek has been at forefront to deliver services to Indian enterprises since two decades across its pan India presence.
The Systems Integration services are much in demand by the organizations to keep their IT infra updates, secure and agile in digital transformation era of cloud, big data, SDDC, next generation security, HCI to name a few. Ventakesh Pai, GM – Customer Support at Wysetek Systems Technologists talks on modern organizations’ expectations from system integrator and services provider companies.
What is the plan ahead for the services business at Wysetek in 2019?
Services is an important aspect for any SI or service provider company and its relevance will only increase with IT becoming more of business-outcome based than purely tech-led. The key services offering by Wysetek to its organizations includes Technology Services, SI Services, Professional Services and FMS (Facility management Services).
Technology Services and FMS(Facility management Services) and Technology Services contribute around 70% of total services revenues, while SI(Systems Integration) Services contributes 20 % and Professional Services around 10% to the services business at Wysetek
What are the key offerings by Wysetek for its customers in the managed services space?
Wysetek has been at forefront to deliver services to Indian enterprises since two decades across its pan India presence. We provide integrated multipractice services, completely flexible SOW’s, SLA’s and professional monitoring. The main offerings in SI services domain includes End Point Support, Datacenter Management, Network monitoring, Security Management and Inventory Management
Do you see SI services picking up in India and why?
Wysetek has a separate dedicatedunit and team for SI services since 1990. The main KRAs of the services team includes providing quick response and faster resolution to the customers, providing timely technology updates to the customer and ensuring customer delight.
In today’s age, when companies want to stay ahead of the game they need all their systems to work synchronously. Systems that are not integrated result in significant increase in cost and resource consumption. Through our SI services we help our customers by saving on costs, bring innovation and provide right skill set for project management & execution.
Any new initiatives you have introduced to increase services business?
The verticals of BFSI, IT/ITES and PSUs gives the maximum services revenues to Wysetek. Wysetek has maximum customer base in these verticals since past two decades and hence the services revenues too comes from these sectors as customers are seeking a SI or solution provider company that is end to end in terms of hardware, software and services
Many market accelerators (business wise and technology wise) will further help us increase our services business in 2019. We intent to grow our resources in services team and also add more focus by introducing new types of services for our customers.
What are the top expectations of CIOs and IT leaders from Wysetek?
Today’s CIOs must also balance a broader role on the executive team and new responsibilities that directly influence business strategy. This has resulted in a significant change in their expectations from SI companies like us.
Today a CIO expects us to recommend solutions which are agile and in line with the business needs. Another trend we are experiencing is that CIOs expect real time response both in solutioning as well as support.
What is the future roadmap of the services team at Wysetek In 2019?
Providing quick response and faster resolution to the Customers has been and will always be the prime focus of services business. Wysetek also believes in providing timely technology updates to the customer and ensuring customer delight.
About ten percentage of total revenues for Wysetek for FY18-19 were from services business. We expect more than twelve percent of services revenues for this fiscal year.
Services revenues split for Wysetek
Facility Management Services – 40% Technology Services – 30 % Systems Integration Services – 20 % Professional Services – 10% |
Systems that are not integrated result in significant increase in cost and resource consumption. Through SI services we help our customers to save on costs, bring innovation and provide right skill sets for project management and execution.
Ventakesh Pai, GM – Customer Support, Wysetek Systems Technologists |
Wysetek’s Top managed services for customers
End Point Support Datacenter Management Network monitoring Security Management Inventory Management |
Wysetek and Dell evangelize customers on HCI
The joint event held at Mumbai evangelized Wysetek’s customers on the efficiencies and innovations of HCI solutions by Dell EMC.
Wysetek Systems Technologists conducted a technology event in association with Dell EMC on 10th July, 2019 at The Lalit Mumbai.
The event focused on Wysetek’s customers highlighted the efficiencies and innovations with Hyper Converged Infrastructure solutions.
Wysetek Systems Technologists is a titanium partner for Dell Technologies.
Wysetek has been implementing HCI projects for the end organizations across various verticals in past couple of years. Infact, Hyper Converged Infrastructure is one of the five focused technologies for Wysetek and its team.
More than 25 customers’ delegates (CIOs and IT managers) attended the event.
The spokespersons for the event were Nilesh Chobhe -Channel Specialist – MDC at Dell EMC India and Jude Mathias, GM – Sales, Wysetek Systems Technologists.
The theme’ Bring efficiencies and innovation with Hyperconverged solutions’ for the event highlighted DELL EMC VxRail as the exclusive HCI appliance optimized for VMware environment at the customer end.
The DELL EMC spokesperson spoke about VxRail Appliances’ capability to deliver highly predictable performance across millions of configuration options to meet any HCI use case.
Jude Mathias, GM – Sales at Wysetek Systems Technologists spoke on the strong points of Wysetek team to value add in offering Hyperconverged solutions from Dell EMC to the end organizations. He said, ”Wysetek strives to stay on top of the technology curve, in this era of digital transformation with leading technology providers like Dell EMC and in-house strong technical team and domain expertise in new technologies like HCI.
The Dell EMC VxRail Appliance family simplifies deployment of virtualized applications with 73% faster deployment & 619% ROI as per IDC whitepaper “The Business Value of Modernizing Infrastructure with Hyper-Converged Systems”, October 2017 sponsored by Dell EMC.
At the event, the delegates learnt on how to create IT certainty with seamless integration into VMware ecosystems; predictably evolve with streamlined deployment and lifecycle management and continuously innovate with technology that helps you focus on your goals.
With HCI adoption becoming popular across Indian companies, Wysetek team expects more than twenty percent of its total revenues form hyper converged infrastructure business by the year 2021.
Key Learnings for Delegates at HCI Event
1. Create IT certainty with seamless integration into VMware ecosystems 2. Predictably evolve with streamlined deployment and lifecycle management 3. Continuously innovate with technology that helps you focus on your goals |
”Wysetek strives to stay on top of the technology curve, in this era of digital transformation with leading technology providers like Dell EMC and in-house strong technical team and domain expertise in new technologies like HCI.”
Jude Mathias, GM – Sales, Wysetek Systems Technologists |
BFSI sectoris the biggest contributor to Wysetek’s revenues
More than 60% of Wysetek’s revenues emerge from BFSI customers in India, says Rahul Nalawade, GM – Enterprise Sales, Wysetek Systems Technologists
Wysetek has been associated with BFSI for many years and emerged as a complete solution player offering enterprise security, enterprise IT infra, virtualization, storage management, cloud services, HCI to name a few.
The top three technology trends in BFSI segment in India where CIOs and IT leaders of the sector will invest are HCI, Cloud, Mobility
Is there uptake for HCI and Cloud in BFSI segment? “HCI and Cloud have become main stream in the sense that these technologies are more stable, more standardized and more affordable. They provide much-required agility for banks in their drive for expansion and importantly gives better experience to their customers,” says Rahul Nalawade, GM – Enterprise Sales, Wysetek Systems Technologists.
The top accelerators to grow your business from this segment in 2019?
Customer delight
Build and maintain meaningful long term relations
Timely services
To increase business from this high growth segment, Wysetek is expanding its team of sales, pre sales and support.
What is the main agenda of BFSI team at Wysetek In 2019?
- Walking that extra mile to genuinely attain the customer delight in every transaction that we do.
- Leverage our skills, partnerships and resources to offer the right solution at the right price to the customer.
- Genuinely build and maintain meaningful long term relations with our customers, vendors, partners & employees.
BFSI segment requires a lot of IT services including professional services from Wysetek including Enterprise security, Integration and the migration to HCI. The portfolio of SI services includes strong Service Network with own Branches at Pan India level. It has a Certified & Experienced Services Team. It is also backed by a 24×7 NOC.
Key Agenda of BFSI team at Wysetek in 2019
1. Walk that extra mile to genuinely attain the customer delight in every transaction that we do. 2. Leverage our skills, partnerships and resources to offer the right solution at the right price to the customer. 3. Genuinely build and maintain meaningful long term relations with our customers, vendors, partners & employees.
|
HCI and Cloud have become main stream in the sense that these technologies are more stable, more standardized and more affordable. They provide much-required agility for banks in their drive for expansion and importantly gives better experience to their customers.”
Rahul Nalawade, GM – Enterprise Sales, Wysetek Systems Technologists |