Network Services: Procurement and the Role of Service Providers

This is another piece in the “Road to Mobile World Congress” blogs. First part is here.

 

One of the choices in the move toward deploying solutions “as-a-service” is how something fundamental like network and services will be delivered. Unlike software, it’s obvious that some equipment is necessary at all locations, but as we have seen in the role of virtual CPE (vCPE), it’s possible to have much of the intelligence pushed out to the central office or to the cloud as virtualized services. 

Topics: Networking Mobile SD-WAN

LTE and 5G: The Role of Wireless in Future SD-WAN

As the debut of Mobile World Congress Americas approaches, I'm writing a series of blogs to describe how the solutions related to mobile carriers affect general enterprise networking.

 

 

SD-WAN has traditionally been a solution for branch networks that involves the combination of landline networks, such as MPLS, broadband, and even DSL. What’s not well appreciated is the participation of mobile networks, specifically LTE, to provide one of the paths for branch networking.

Topics: Networking Mobile SD-WAN

Securing The New New Economy Infrastructure

Unlike many new economy players of the late 1990s, notable dotcom brands of today have staying power, not only due to more viable SaaS business models, but also due to their effective use of an increasingly mature set of cloud computing services. The likes of Uber, Airbnb, Dropbox, Netflix, and others have fundamentally changed how we get ourselves, and files, for that matter, from point A to point B and how we view content when we get there. These market leaders have disrupted established markets by not only recognizing that we, the consumer, want to do pretty much everything on our smartphones (including requesting a ride) but also, more importantly, by leveraging the agility of the cloud for continuous innovation and, thus, competitive advantage. It’s the speed of DevOps and the old guard better look out, unless the disrupters themselves get disrupted.

Topics: Cybersecurity cloud Mobile

Talking about Mobility at Ignite

I've been in Chicago this week for the MS Ignite conference, and the conversations I've seen revolving around enterprise mobility have been fascinating. I pulled together a Storify to recap some of what I've heard:

Topics: Mobile

ESG Recap of Oracle OpenWorld 2014

This year’s Oracle OpenWorld has reflected some interesting bets on the future of databases, cloud, big data, and analytics, along with many other macro-trends like social, mobile, and Internet of Things (IoT).

Oracle is doubling down on positioning itself as a cloud leader with emphasis on “pluggable” databases that can be easily hosted multi-tenant on-premises or migrated to a public cloud with a single command line. Database-as-a-service or DBaaS is clearly a priority and it’s being complemented by more cloud-oriented middleware and many new SaaS offerings.

Topics: Storage Analytics Big Data Internet of Things IT Infrastructure cloud IoT Enterprise Software Mobile Data Management Compute database Oracle

The Internet of Things (IoT)

I shall be expanding on this theme--the internet of things (IoT) over the next few years, as I find it to be the most interesting thing to happen not only in tech, but potentially in modern society, ever.

Topics: Cloud Computing Analytics End-User Computing Endpoint & Application Virtualization Internet of Things IT Infrastructure IoT Enterprise Software Mobile Data Management Compute Public Cloud Service

Figuring Out FIDO (i.e., the Fast Identity Online Alliance and Standard)

No one hates passwords more than I do and it seems like I’m asked to register for a new site each day. For those of us in the know, this situation of “password sprawl” is even more frustrating because we really should have solved this problem years ago. After all, Whit Diffie, Marty Hellman, and the RSA guys first came up with PKI back in the 1970s so you’d think that passwords would be dead and strong authentication would be ubiquitous by now!

Thankfully, there may be hope on the horizon in the form of the FIDO alliance. The group, composed on a who’s who of industry big shots like ARM, Bank of America, Discover Card, Google, Lenovo, MasterCard, Microsoft, PayPal, RSA, Samsung, and VISA, is “developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance of passwords to authenticate users.” In other words, FIDO wants to introduce “trusted convenience” by making strong authentication easy to deploy and easy to use on the front-end (i.e., for users) and back-end (i.e., for IT).

Topics: End-User Computing Information and Risk Management Mobile Security and Privacy

VMworld 2014: Top Questions ESG Analysts Hope to Have Answered

This will be my 9th year in a row attending VMworld! The event always proves to be a great display of end-user passion that is driving towards new innovation and IT vendors displaying their latest products, solutions, and services. I recently asked the ESG team attending the event if there was anything they planned to track closely or questions that they hoped to get the answers to and here is what they shared:

Topics: Cloud Computing Storage EMC End-User Computing IT Infrastructure Data Protection VMware Private Cloud Infrastructure Networking Information and Risk Management Mobile VMworld software-defined storage hybrid cloud NSX SDS Enterprise Mobility

BYOA: Bring Your Own Authentication

Most people who use IT or Internet applications would agree that the current username/password mode of authentication is cumbersome, ineffective, and obsolete. According to ESG research, 55% of information security professionals working at enterprise organizations (i.e., more than 1,000 employees) believe that username/password authentication should be completely eliminated or relegated to non-business critical applications only.

Topics: Cloud Computing Microsoft End-User Computing Private Cloud Infrastructure Information and Risk Management Mobile Security and Privacy google Lenovo multi-factor authentication RSA Security Public Cloud Service

The Apple and IBM Partnership

IBM’s announcement on July 15 2014 that they are entering into a global partnership with Apple to transform enterprise mobility has both substance and spin.

The significance of this announcement stems from the enterprise level security, lifecycle support, and integration that IBM is bringing to iOS. IBM’s MaaS360 brings comprehensive mobile device management to bear so users will have a highly secure workplace container for enterprise content. IBM and Apple are also addressing iOS lifecycle concerns. IBM will offer a managed service whereby Apple provides IBM with a beta version of the upcoming iOS release and IBM will test and remediate issues for iOS applications. This way, when Apple suggests that a user upgrade to the latest version of iOS, an enterprise can avoid the potential for broken applications. IBM will also extend BlueMix so that it supports the 4,000 APIs of Apple’s iOS 8 (BlueMix Mobile for iOS). This brings enterprise scale to Apple-based mobile environments.

Topics: IBM Apple Application Development & Deployment Enterprise Software Mobile