The concept of Web 2.0 has brought in a great revolution
in the way the world works today. Over the years, socializing and networking has
evolved from personal gatherings to official gatherings that incorporate our
jobs and our business. Today, social-networking
platforms like Facebook, Twitter, LinkedIn etc. need no introduction to
employees in their day-to-day work.
It was in this background that the 3rd week
of October turned out to be a ‘networking’ week for me, attending a
social-networking workshop and an interactive evening gathering with my fellow IBMers.
The workshop was about social-networking through IBM Lotus® Connections, a
robust collaboration software that empowers people to connect, collaborate, and
innovate while optimizing the way they work. It was a great learning experience
and I did install some cool and faster tools which I’ve been happily using
since then :-)
Now, the icing on the cake! The networking part! Yes,
networking is very important in any job role/any business. The workshop not
only gave me the opportunity to network with my peers from various departments
but also raise the visibility of my work. Hence, with the week, just passed,
I’m feeling richer by a network of contacts which I’m sure will be a great help
in performing my job role :-)
A note for you; You can attend Pulse 2011 and network with your peers from
across your industry.
Unless you've been hiding under a rock the last couple of months, you know that Pulse 2011 is coming to Las Vegas February 27-March 2, 2011. And you know that the Premier Service Management Event will bring together 6000 attendees, focusing on the best practices, solutions and expertise needed to help organizations design, deliver and manage new, innovative business services.
Do you also know that Pulse 2011 promises to be bigger, better and more informative yet? With two days of general session keynotes and over 350 client sessions, Pulse 2011 will demonstrate how Integrated Service Management can help organizations design, deliver, and manage innovative services across business and IT boundaries. The event's five streams have carefully been designed to reflect the ongoing evolution of service management over the last year: Service Management for the Data Center, Enterprise Asset Management, Service Assurance for Service Providers, Security and Compliance and Service Management Beyond the Data Center. Learn more about the Pulse agenda by reading the article Pulse 2011: A Wealth of Service Management Insights.
Pulse 2011 provides unlimited opportunities to hear from industry experts and network with attendees to gain the techniques and insight you need to optimize your service management strategy. Get maximum value from your Pulse 2011 experience by participating in the following additional attractions:
Birds of a Feather Sessions
Business Partner Café
Business Partner Summit
Client hospitality lounge in the Solution Expo
Service Management Simulator
Meet the Experts
Pulse Expo Theaters
User Community Networking Area
Women's Networking Reception
Post Conference Sessions and Workshops
So, lest I leave you with a bland blog post...If you're a service management sage, it's thyme for you to submit your proposal to speak at Pulse. Call for speakers ends November 23rd.
You must(ard) register before December 1st to take advantage of the early bird registration rate.
Be sure to pepper your agenda with sessions that not only interest you but benefit your organization.
And remember, Pulse is held in Las Vegas, where it's sure not to be chili in February.
You'll curry the favor of your colleagues and bosses when you bring back so much service management knowledge and best practices.
Your attendance at Pulse 2011 is, therefore, mint to be.
(I know, these spice puns were bad beyond bay leaf. Ba-dum-bum...my brother would be so proud).
Signing off for now, Your friendly roving Integrated Service Management reporter
When IBM first kicked off the Dynamic Infrastructure announcement at Pulse 2009 conference, we heard some rumblings on whether Dynamic Infrastructure was just another executive buzzword or if there was real meat behind "the concept."
Doug McClure summarized the feeling well in his blog: “While this is great for executive level folks, I think we needed to drive this message into consumable and actionable things that lower level technical attendees could take back to their companies. They may be the ones who need to execute and show how previous or planned investments could help their company become smarter and more dynamic.”
After IBM’s announcement yesterday on new Dynamic Infrastructure offerings, critics will be hard-pressed to wonder whether Dynamic Infrastructure is actionable.Not only did IBM announce new products and services in the areas of Information Infrastructure, Virtualization, Service Management, and Energy Efficiency, but they also demonstrated how these solutions are helping three of our clients--the Taiwan High Speed Rail Corporation, Tricon Geophysics and the United States Bowling Congress--build new, more dynamic infrastructures to help reduce costs, improve service and manage risk.
A key piece of the announcement is the IBM Service Management Center for Cloud Computing, which now includes new IBM Tivoli Identity and Access Assurance, IBM Tivoli Data and Application Security, and IBM Tivoli Security Management for z/OS, for Cloud environments. I don’t know about you, but all that’s more meat than this vegetarian can handle. :)
To continue driving home the Dynamic Infrastructure success, IBM is sponsoring a variety of events for the public to learn more. Register for a free, local Pulse Comes to You event to see how Service Management is a key component for enabling a DyanmicInfrastructure for a Smarter Planet.
As a reminder, all of the general session keynotes (and more!) can be found on the Livestream site.
This morning was kicked off with the band Naturally 7, who were amazing. During one of the speaker changes, they did "In The Air Tonight" and rocked the drum solo.
The opening video (which was pretty awesome) started with the fact that we have 8,000 attendees from 79 countries and then talked about how one of the things that is affecting all of us is that lower cost technologies are literally changing the planet we live on.
This is leading to a Smarter Planet where infrastructure is everywhere.
Our first customer speaker from WellPoint echoed this sentiment and both he and Scott Hebner (VP of Marketing for IBM Tivoli Software) how Visibility. Control. Automation™. (VCA) is critical to turning this "infrastructure is everywhere" reality into a successful future of innovation
Robert LeBlanc (Senior Vice President, IBM Software Middleware Group) continued this conversation about VCA.
He had a great line from one of our customers, "If you can't get excited about the change and challenges of this industry, I don't know what you're doing here."
The three things driving business imperatives are dexterity, reinventing customer relationships and uncovering new profit opportunities. Analytics followed by mobility, virtualization, cloud and then security are keys to driving these technology shifts.
Achieving desired business outcomes is about VCA.
One thing that you'll hear a lot about at Pulse is that cloud is about more than virtualization. You'll hear that message a lot, because it's true.
Technology for technology's sake doesn't work. It has to impact the business. Cloud computing has the potential to add that value. As does mobile.
Mobile + Cloud (which Danny Sabbah talked in detail about) will have the biggest impact on our customers. Two statistics that Robert gave were the fact that data has surpassed voice and that last year more smartphones shipped than PCs.
How do you manage and secure all of those devices? VCA. Specific to security, it's about security and compliance; people, data, applications and infrastructure.
And, of course, assets and facilities (smarter physical infrastructures) will play a critical role as everything becomes interconnected, intelligent and instrumented.
Robert closed out with an interesting comment - data for data's sake isn't important. It's what you do with it. It's ensuring Visibility. Control. Automation.
Applying analytics is one of the ways IBM does this across VCA:
Visibility - to see and understand your business in real-time business
Control - to transform and adapt while limiting risk & cost
Automation - to achieve greater efficiency & agility by standardizing processes
Applying IT analytics to improve business outcomes. Taking an Open/integrated approach to service management and leveraging the cloud to unify the service value chain.
Next up was Dr. Danny Sabbah (General Manager, IBM Tivoli Software) and he put cloud and mobile into context.
Danny hit the ground running, talking about the three dominant transformations happening in technology; Smarter Physical Infrastructure. Mobility. Security.
The intersection of these three has caused a lot of complexity (and confusion) for our clients.
The way to tame that complexity is Visibility. Control. Automation.
The lines of business are doing what they need to so they can compete which means that our clients must simplify, standardize and automate to get this to work efficiently and add value back to the business.
It's about going beyond virtualization. It's about Mobile + Cloud. Together.
Tennis Australia built a smarter physical infrastructure capturing and using the data in real-time. This helped build out the relationship with their customers (in this case, tennis fans).
The video (included in the Livestream) with Tennis Australia is great and the nice thing about them is that what they did is applicable to any industry. In fact, the best comment they made in the video was that, "Providing information on all platforms is table stakes these days."
Danny let that sit for a minute. Table stakes. Meaning that you need to go beyond just offering up the data and provide value at levels that won't happen with just virtualization.
It's about mobile + cloud. The infrastructure must deliver value back to the business.
CIOs are the key to driving this innovation. Technology is about real outcomes and not just playing with the latest toys.
We must simplify, standardize and automate.
Danny mentioned the over 3,000 customers we have helped with this type of transformation and one of the best examples was helping an infrastructure delivery that used to take 40 days reduce to just 20 minutes.
Our customers (you) need to be resilient to velocity of change. Have security intelligence. Be able to have the choice/flexibility (mobile, hybrid) to be workload aware and utlitize analytics.
Danny took the time to talk about the Worklight acquisition and more specifically the big announcements we made with the integration of Q1 Labs and QRadar into our security portfolio (see the press release from Feb 22).
He concluded with discussion around OSLC as a specifcation to simplify integrations and increase agility. Development and Operations (Dev/Ops) continuing to be an important aspect of how we turn isolation into integration! He also mentioned the IBM SmartCloud Control Desk (mentioned in the announcement letter from Feb 28).
Danny concluded by saying that if you wanted hype and marketing. Go somewhere else. This is about cloud done right.
And with that. We're off to the stream kickoffs and a full say of sessions.
Stay tuned for a wrap-up of tomorrow's general session keynotes, right here on the blog.
In the meantime, use the links below to stay connected to everything happening at Pulse.
Well, we are well into 2012 now and we have just about got though the ‘my predictions for 2012’ phase and in to ordinary routines again. Whatever the predictions, like with most years I predict that 2012 will look a lot like an older version of 2011.
There is still talk of recession, companies that struggled for funding in 2011 are no richer, Cloud is still talked about by a lot more people than understand it.
On a personal level 2012 has already delivered some of the improvements planned in 2011 – and I hope the same will happen workwise. Next major thing on my work horizon is IBM’s big service management show – Pulse. Back again at the MGM Grand in Las Vegas we are promised it will be bigger and better than ever. I understand that bigger is important in as Vegas but I am usually even keener on better. Actually though, to be fair I am delighted that ‘my bit’ at Pulse looks like being bigger this year – with not one but two chances to deliver the cloud-readiness simulator on the weekend before the show itself starts. In fact there will be a strong focus on simulator this year with our team being on the exhibition floor to explain what, why and how they can help you.
Of course – like I implied above – this isn’t exactly new, but it is proven. Of course there will be lots of new stuff available – geeks welcomed and catered for. The technologists will – of course – be well catered for with lots of ‘future possibles’ and indeed a vision of some possible futures too. But service management’s primary focus is not on what might happen next year; it has always been about delivering value this year. In fact one of my favourite aspects of service management is how it rests on widely applicable principles, even though how they are applied might alter. For example, while change management processes in a cloud environment might need different considerations to make them most effective –the basics remain. I was working in service management long before I ever touched a computer. I remain constantly delighted to discover that lessons learned 30 years ago in supply and transport are still relevant to the 21stcentury IT based services we manage today.
So, if you are going to be at Pulse come along and tell me whether you agree that old-fashioned service concepts are still valuable – or come and explain why dinosaurs like me should be swept away by the meteor strike that is cloud. Either way – at Pulse or elsewhere – I look forward to good, informed and enjoyable debates. Good to think of the new year building on the successes of the old – at home and at work.
 If you follow me on twitter - @ivormacf - you will know where and when I will be in terms of events. Useful, whether you want to know how to find or to avoid me – same thing works both ways.
Last week, I attended my first IBM Pulse conference. I really enjoyed the sights and sounds of Vegas, and met many of my Tivoli colleagues for the first time. I also probably walked the equivalent of 15 miles over the five days within the mammoth MGM facility. But what I found most valuable over the five days were my interactions with our customers and business partners.
On Day 1 of the conference, my focus was the ISM Simulator workshop that I helped coordinate. Given that the workshop was: a) taking place prior to any other Pulse activities, b) located in the bowels of the MGM hotel, and
c) three hours in duration...
...I was a bit apprehensive that all the customers and business partners who had RSVP'd would actually show up. But when people started rolling in 30 minutes before the start time, I was confident that this workshop was going to be a success.
When we got started, we had 21 participants sitting around four tables, which is all but ideal for this role playing workshop. Like other simulator workshops that I have attended, it started out a bit chaotic, as participants tried to process the firehose of information that was being thrust upon them. By the end of the three hours, they had come full circle, and were effectively working together to the tune of a $5 million profit for their hypothetical shipping company.
As I chatted with some of them after the session, and listened in on some of their video testimonials, the words I heard most often were "eye-opening", "outstanding" and "insightful".
On Monday and Tuesday, I worked on the expo floor and showed off our cool new ISM Simulator video game. The game allowed users to experience various issues affecting service management and corporate profitability in a simulated organization. At the ped, I got great feedback from customers and partners, who, by virtue of playing the game, were able to get a better grasp of the sometimes abstract concepts of service management.
You can play the IBM Service Management Mission game here.
All in all, it was a great conference, and stay tuned for the video from the workshop!
The secret's out...there's something coming to Vegas on Sunday, February 27th that you just don't want to miss!
And what could that something be? Hint: It's not the latest incarnation of the Red Piano show. But for those of you interested in how to apply service management concepts in the real world, it's even better....it's the Integrated Service Management Workshop (Cloud Version) at Pulse 2011!
Yes, Las Vegas is know for it's gaming, and the Service Management Simulator Workshop could turn out to be a game changer for you and your company! The Integrated Service Management Simulator Workshop is a hands-on simulation game which focuses on the challenges and business value of implementing Service Management best practices in the context of a realistic and exhilarating scenario. During the session, participants use gaming dynamics to mirror the real-world interaction between IT and the business, from both a strategic and operational perspective. Over the course of a few hours, you'll experience a transformation from chaos to order - in the context of a complex technical infrastructure - and learn what it takes to align key IT infrastructure resources to deliver on mission in measurable terms.
Note that seating is absolutely limited to 20 participants - seats will be filled on a first respond/first serve basis. Don't wait - reserve your spot by sending an email to firstname.lastname@example.org.
Take advantage of this great opportunity to share your experiences with your peers, get feedback from the most influential industry experts and promote your organization by submitting an abstract to speak at Pulse 2010.
Accepted client speakers will have high profile exposure to over 5,000 industry experts, press and analysts. Approved client submissions will receive a full conference pass ($1,995 value) and admission to our on-site VIP client lounge. In addition, to your paper may be published in the Pulse 2010 proceedings.
I talked with Pete Marshall, the lead for the Pulse 2010 Hot Topics track, and he offered the following insights and suggestions on how to submit a winning proposal.
One definition of a hot topic, is something not covered at last years conference and something that might not be covered next year. We’re looking for breaking trends—a snapshot of the industry and challenges service management professionals are facing right now. Themes like cloud computing, or serving the real-time web are good examples. Security is a perennial issue that always presents new challenges: it’s a hot topic every year, but every year there’s something different at the forefront. Things in our industry keep evolving and in the Hot Topics track, we want to look at and share information and experiences about what is really happening in the bleeding edge of service management. Some possible topics include:
Integrated Service Management
Process management and integration
The Hot Topics track is aimed at business leaders, decision makers and strategists puzzling over things like how to integrate physical and digital assets, what process models to use, and what are the best approaches to managing in a rapidly changing business and IT environment. Pete said he would encourage anyone working to solve emerging challenges—industry experts who may have a wider purview across the industry and very specialized customers who have done these projects themselves--to submit an abstract so together, we can share best practices, insights and create effective solutions as we move into uncharted territory.
Pete described two key aspects of a winning proposal—relevance and real life experience.
Is the topic relevant to where the industry is today? Is it something new and ground breaking? If the answer to these questions is yes, your abstract is a good candidate for the Hot Topics track. Going back to the security example, an overview of security might not qualify as a hot topic, but some current trend or challenge in the security landscape most certainly would.
While there is always a place for theorizing, in the Hot Topic track, we are looking for people who have been there and done that. We want presenters to share how they have solved or are working to solve a challenge.
The benefits of participating as a speaker are huge. Speaking is a very different dynamic than just listening. Not only will you have the opportunity to share your experience and get feedback from your peers, you will receive a full conference pass and get to experience the conference in a deeper, more involved way.
Just about my very first experience in IT –
brought onto a project as a customer ‘expert’ – was listening to the IT guys
debating how to make use of the data we already had on the old system. In my naivety
at the time I had thought computers used ‘computer language’. Quickly I
realised they were more like people than I had suspected – that there were lots
of computer languages, and each computer spoke only one of them, and could make
no sense of the others.
Now, in the interceding years (some 27 of
them L) great progress has been made – we expect computers to talk to each
other. This almost universal technological communication ability sometimes
blinds IT people to the fact that human communication has not evolved
Until we perfect direct thought
transference, all the communication we do, whether written or spoken, texted,
tweeted or painted on the walls, relies on a two stage process. First you put
your ideas into words (usually words and sometimes also gestures or pictures –
or a combination of all three). Then someone else has to take those words etc
and turn them into thoughts inside their head. There is always an ‘encrypt/decrypt’
section to human communication.
Now that can get messy, confusing and
create all sorts of mistakes in delivering the message. You probably wouldn’t
design it that way. In fact in a pure IT context we would be looking at ways to
deliver direct communication in a standard format from one system to the other.
But people don’t work that way; it is what we have and we need to work with it.
Communication isn’t just about being accurate;
I think it is better measured by whether it is useful. In IT, people still manage
to get the communication spectacularly wrong by not thinking about the whether
the customer (or client or user) is equipped to decrypt the message. As one
example, here is an error message I got on my screen the other day, apparently
intended to inform me why the software couldn’t do what I had asked it to do: “Unable to contact the target back-end forwarding host (proxy target)”. I presume that made perfect sense to the person who set the
software up to deliver that. They were maybe a great programmer, but evidently
not a human communications specialist.
It’s easy enough just to dismiss this as
one more version of ‘Computer says no’, but why is it no surprise? Maybe it’s because
we still seem to think it OK to throw our jargon at others who don’t share it.
Or maybe we forget they don't know what we do. Actually, to be fair this is not
only an IT thing – ask anyone who has been caught on a French train having
failed to quite understand the printed message exhorting them “composter votre
billet”. (And if you don't already know but intend to travel on a French train,
trust me, you need to find out what it means, but it isn’t a French word that
they usually teach you in basic language classes. A classic case of
encrypt/decrypt failure in a service management situation that has nothing to
do with IT.)
The technologists amongst us love the
challenge of integration, communication across platforms etc. but there is
recognition that this is expensive and should be unnecessary – an area where
standards and commonality help everyone. Why do we forget our most common
encrypt/decrypt situation – getting a message from one mind to another.
I hope that the irresistible tide of
universal cloud adoption and pervasive social media communication will solve
all these troubles – and allow us to concentrate on the people issues more. But
so far the social media snowball doesn’t seemed to have reduced jargon – quite
the opposite. Those of at a certain age are now totally incapable of
understanding what are children are saying, even when they give us access to
their on-line worlds.
Actually, this is fresh in my mind now
because it forms a little game we will play during my talk at Monday 5th
March at Pulse – our big SM event in Vegas next month. I plan to have people
encrypting and decrypting during that session. I am interested to see how they
get on, and hopefully to make them realise there are some simple tools we can
use to make things better. Nothing magic, and the same techniques we
demonstrate in the simulator. Mostly they rely on establishing common ground –
establishing communication channels and learning what will work, by finding
shared understandings, and by relying on more than words alone when it makes a
The best part about all that is that from
the outside it might look like gossip and drinking at the bar – but we realise
it is building business critical communicating platforms and channels. The message
that things can be both fun and relevant at the same time is also part of the
So, if you are at Pulse maybe you will be
able to come along at 6pm on Monday. If not I hope to get the chance to
encrypt/decrypt with you at another event this year. And thank you for your
efforts in decrypting this message, I hope it wasn’t too difficult – and I hope
it has some resemblance inside your head to the one that was in mine.
A bit different from yesterday, I spent the morning helping our customers register for industry round tables and then followed that up with showing customers the new Integrated Service Management Simulator Game in the Expo Center.
Tuesday, as you know, is when IBM makes product announcements and this Tuesday was no different.
Jamie Thomas talked about a number of announcements (including the ones below) in her portion of the general session (which can be found on the Livestream)
I would call your attention to the following two Announcement Letters that were released today:
The adoption of cloud and virtualization technologies by the market is increasing.
For these technologies to be meaningful to our customers, it is on us to ensure that we can provide the levels of Visibility, Control and Automation (TM) they require to match their Integrated Service Management best practice. (and that's just what we're doing)
Press Release Round Up
The press team put out some great articles that I'd also like to call your attention to:
Some great coverage of the successful client relationships we've built with our industry solutions. They are worth a read (especially the Cities one).
I'd also point you to the excellent blog post Christina wrote about Intelligent Metering Network Management
Speaking of Coverage
As a sequel to yesterday's general session visual note-taking adventure, I present to you my notes from day 2 (Flickr link:
What's Next For Noah?
Tomorrow, I'll be talking to Scott Laningham on the Livestream at 12:40pm PST about Integrated Service Management and then closing out the conference and staffing the Simulator Game in the Expo Center.
If you want, stop by and say hello. I'll show you the demo and can also talk to you about anything Integrated Service Management -related.
In his keynote address yesterday, Al Zollar talked about how customers are leveraging Integrated Service Management. Capital Region of Denmark in Copenhagen, is in the process of leveraging Integrated Service Management to track missing assets, improve maintenance schedules and get their company back on track.
Capital Region of Denmark is a conglomerate of hospitals with data distributed across three different storage tiers and four sites, with an online disk capacity of 500 Terabytes and backup and archive data exceeding 1.5 Petabytes.
They have solved their storage complexity issues with Integrated Service Management and are managing their entire storage infrastructure with only four people.
He also talked about how the U.S. Air Force is leveraging Integrated Service Management. The U.S. Air Force defense and intelligence network manages the operations of nine major commands, nearly 100 bases, and 700,000 active military personnel around the world. They are leveraging Integrated Service Management solutions to design and deliver a cloud infrastructure with unprecedented levels of security and resiliency.
It's not just a vision for the future--it's happening now. Integrated Service Management can help your company get past the complexity and risk you deal with on a daily basis.
The final day of Infosec has now finished and what a fantastic event it has been. We had a total of NINE excellent sessions and many many great conversations with attendees wanting to know more about IBMs wide range of security solutions. We also made two new security product announcements at the show – for more details go to the press room on the IBM website here - http://ibm.co/Ii9Nfm
We had one session in the technical theatre today, given by Robert Freeman on IBM XFORCE cyber security threat landscape. The session was very well attended, with over ninety people in the room as well as it being live streamed into conference hall. Robert began the talk by explaining the IBMs X-Force team mission, giving some great stats around the analysis they do. For more information on this and to download the report etc please see below.
Robert then explained how IBM viewed 2011 as the year of security breach. He gave examples of notable security breaches during the last twelve months, including some of the high profile ones we have all seen in the national press. These includedSQL injection attacks against web servers, URL tampering, shell command injection attacks, SSH brute force activity, and phishing based malware distribution and click fraud - which is back up to where it was in early 2008. As had been mentioned in other IBM sessions, Robert spoke about the decline seen in web app vulnerabilities - a decline of 8% from 2011 and the lowest it's been since 2005. He also talked about how there are now much better patching policies due to pressure from public at large and he predicted there will be continued investment in this. Robert closed the session by talking about the security challenges emerging in the emerging areas of cloud and mobile. Smartphones and tablets are ever increasingly being brought into the workplace and attackers are finally warming to the opportunities these devices represent. Unfortunately 3rd party apps can lack secure permission coding etc leaving them vulnerable to attacks. He finished by talking about some of the high profile cloud breaches which are affecting known organisations and large amounts of customers. Good Cloud security requires cloud appropriate workloads, a flexible provider and effective due defence on part of the customer. If anyone is ingesting in learning more about IBMs many security solutions, then please register for our Pulse Comes to You event in London on the 30th May here -http://ibm.co/JgmnZD If you can't attend the event then follow me on @Rswindell or @IBMPulse, as I will be posting updates through out the day. I will also be blogging here both pre and post the event. Please follow @IBMSecurity for more information specifically on our security events, news, collateral and more. If you attended the event, I hope you enjoyed it as much as I did. See you next year!!
The conference aimed to help those working in the public sector,
specifically addressing the problem of improving “services whilst managing with reduced budgets”. The sessions looked into
how the need for a greater flexibility of work styles, has created “new ways of
working” that mean work can be carried out “anytime and anywhere”.
previously attended the fantastic Government Property event run by the same
company (Public Sector Connect) I was sceptical about whether this event could
live up to the high standard they had set. I needn’t have worried! The sessions
were highly educational and
enlightening. This blog will cover what I thought were the key learning’s from
the day – so I hope you find it interesting.
The plenary session
was opened by Colin Mair, Chief Exec of Improvement Services, who discussed the
theme of why we need “New Ways of Working” and what it means. He spoke about
the need to manage resource constraints, decrease overheads, increase flexibility
and optimise capacity through sharing services, all the while meeting the public’s
expectations, and increasing the value of the public pound in Scotland.
Next up was Derek MacKay – the minister for local government
& planning, who wanted the audience to remember that the current budget
costs should not be seen as restrictive but
instead should be viewed as an impetus for change. He continued that if we continued to do what
we have always done, we will get what we have always got. He emphasised the need for joint, collaborative
working. Derek talked about the four
pillars of Public Sector reform – prevention, closer integration and partnership,
improved performance and a workforce focus. There is a new for “radical change”,
alongside job security. He spoke about
how successful reform is dependent upon managing the culture within and between
organisations, which is part of the mantra of “working smarter”. Other things that would come under this
umbrella include flexibility, new technology, new office designs, and co-location,
all being implemented with an open mind. He concluded by saying there were “big
challenges ahead, but immense opportunities too”.
The next plenary speaker was John McClelland CBE - Scottish
Further & Higher Funding Council, who talked about how these new ways of working
must be citizen driven, but unfortunately
this is not always the case. These changes should be “pull and not push”, and
the public sector has the opportunity to reset the bar. John talked about the need for online
services, and how it is growing exponentially, and these services have to be
seamless. He spoke about how, from an
adoption of new technologies point of view, a lot more could be done, for
instance in Cloud Computing. The deployment of ICT, with the exception of the
health service, has been disappointing, with very little sharing of services
and deployment. John thought there needs
to be a paradigm shift in doing things differently. ICT should be seen as a productivity tool to
save more and work more efficiently.
John was followed by Colin Proctor, director of Scottish
Futures Trust, continued discussing the theme of new ways of working, stating
that we now have a window of opportunity to push the boundaries, and it is a
time for accountability. Property should
be a major consideration; we should
be aiming to do more – with less property.
He believed that a 25% reduction in property is readably achievable,
especially if the public sector can leverage investment in buildings from the
private sector. Colin talked about the 3
Cs – Corporate, Collaborative and Commercial, which he mixed with another C –
Commonsense! He talked about thinking
about the long term game, and the need to act strategically. He urged the audience to think about a move to
open working and efficient space planning by eliminating duplicate desks and space hungry and inflexible systems (incidentally all of which IBM can help you
with, by using the Tririga platform!!) . He concluded by talking about the
need for employees to be able to work anytime, anyplace and anywhere, which
means a wider home and mobile working team. He suggested 10 desks to 8 people
ratio as a starting point. This will
save costs in business miles savings, time spending commuting and reduce carbon
Dr Claire Penny ran the IBM work session to a packed room. She wanted to address the question of whether
ICT is a “help of hindrance”. Claire
began by looking at the iGov survey, which looked at real estate management
challenges and pain points, in which 54% of central government respondents did
NOT see ICT as an inhibitor to realising property savings. She took the
audience through IBMs’ real estate history – especially looking at the acquisitions
we have made such as Tririga and MRO. Claire continued by looking at how IBM has
approached its own real estate transformation, working towards common systems
and process and minimal vacancy. She gave the recent West London strategic rationalisation
project as an example of where IBM have identified 12, 500 m² of office space
that could be vacated.
Claire continued by talked about how important data is when thinking about
Smarter Buildings, and how IBMs Intelligent Building Management software can
help, which she described as “the all seeing eye that enables you to maintain
your buildings as they should be”. She
gave the example of how IBM has implemented this at IBM’s Rochester site, which
saw energy cost reductions of between 5 to 7% consistently year on year.
Claire finished the session by looking at the capabilities of IBMs
latest Smarter Buildings acquisition – Tririga. This product is split into modules of – Real
Estate Portfolio Mgmt, Space & Facilities Mgmt, Operations &
Maintenance Mgmt, Capital Project Mgmt and Energy & Environmental Sustainability.
These modules can be implemented separately, or part of a complete IWMS. Claire
concluded the session by discussing what some of IBMs clients are using Tririga
for – the main points being – improving the utilisation of their portfolio,
operate in an environmentally sustainable way, simplify & improve user
experience, simplify processes, & align their portfolio rapidly to meet
changing business needs. She gave the example of GE, who reportedly save $925M
in the first four years of using the product!
The final session was a panel debate – which included IBM’s Dr Claire
Penny, Mark Baker – Aberdeenshire Council, Harjinder Gharyal & John Dawson – Glasgow City Council, and was led
bySimon Haston, Change
Champion: Improvement Service.
Lots of interesting
questions were asked by the audience, all around the theme of new ways of
working. Claire specifically spoke about how IBM approaches flexible working, whilst
still maintaining important security standards for our mobile devices. The
question was posed, what are the critical success factors for new ways of
working? Many interesting opinions given, with our expert explaining she
thought leadership and a clear strategy were key.
If you are
interested in learning more why not come to Pulse Comes To You on 30th May at
The Grange, Tower Hill – where our customers & prospects can learn more
about the entire Tivoli portfolio. Please register here - http://ibm.co/JgmnZD.
It’s now just one week until the biggest security
event of the year – Infosec!! Once again IBM will be attending, this year we
will be giving NINE speaking sessions.
Note Session -
Presentation Title: 2011 was the year of the
Security Breach...what are the security & risk trends for 2012? Speaker:
Robert Freeman, Manager, X-Force Advanced ResearchStrategy, IBM Theatre: Technical Theatre Date: 26/04/2012 Time: 12:00
over the three days:
Workshop Title: The Advanced Persistent Threat in
- Robert Freeman, Manager, X-Force Advanced Research Strategy, IBM
- In years past, there was a common misperception that Advanced Persistent
Threat (APT) was just a problem for governments and government contractors. In 2011,
there were many high-profile security breaches that were influential in
affecting this misperception. Organizations of different sizes and focus areas
face the threat of operationally sophisticated, targeted attacks to their
computer networks. These attacks are amongst the greatest challenges facing
network security professionals and researchers alike. To meet this challenge,
IBM X-Force thinks it is important to consider new perspective and approaches
to network hardening, breach detection and incident response. One needs to
think beyond thinking like an attacker and see it as the game that it is. We
have been on the forefront of understanding these threats and this talk will
provide updated information from IBM X-Force on this threat and the mindset required
to meet the APT challenge.
Workshop Title: Providing Your Business, Total
Speaker: Steve Durkin, EMEA Channels Director at Q1
Labs, an IBM Company
Synopsis: As the world becoming more digitised and
interconnected, more doors are being opened to emerging threats and leaks.
Security is needed to be made a top concern, from the boardroom down. A report
published by Verizon on Business Data Breaches in 2011, found that 48% of total
data breaches were caused by insiders and 48% of breaches involved a misuse of
an insider’s privileges. All organisations, no matter the size or industry,
need to put security first, allowing for the analysis of people, data,
applications and infrastructure to be carried out easily and intelligently and
providing instant information and visibility into business risks.
Securing Mobile Devices in the Enterprise
Speaker: Vijay Dheap, Security Systems Product
Manager - IBM Mobile Security Solutions
Synopsis: Enterprises want to fully capitalise on
the business value of mobility but still have significant concerns about the
security implications. To address these
challenges, mobile security needs to be viewed and understood holistically from
securing the device and the data on the device to secure access to enterprise
systems and application security. In
this session we will highlight the spectrum of requirements that Mobile
Security covers, describe how some organisations have gotten started and
introduce the concept of mobile security intelligence. Given the innate dynamic nature of mobility,
an intelligent, adaptable mobile security solution is required to provide an
enterprise with the necessary visibility, and control in managing threats and
risks without degrading user experience.
Workshop Title - Infrastructure Protection - Towards an Optimised
Speaker - Simon Smith, CISSP - Client Technical Professional, IBM Security
Synopsis - As the nature of the threat to business
changes it is important that companies review their position with regard to
security and particularly how mature their detection and prevention
capabilities are. This session looks at
some of the technology that can be used for Infrastructure protection and how
this might be integrated with other systems and data sources to provide a more
optimised solution. We will discuss the
way that a company can move from a basic security position, through proficient
and finally to optimised, giving the capability to be pre-emptive with
protection and use Security Intelligence and Analytics to provide better
protection and thus stay ahead of the threat.
Workshop Title: Application Security Hacking 101
John Smith - IBM Application Security Specialist
Synopsis: Despite a decreased share of the
vulnerability disclosures in 2011 (X-Force
Trends and Risks report, 2011) Web Application
vulnerabilities still represent the single largest category of issues. This
session will examine some of the common types of attacks and show how they work
and how to defend against them.
Workshop Title: Integrated,
Intelligent Security Analytics for the Enterprise
Speaker(s): Rob Ford - Architect - IBM Security
Services, Global OM&D
Jef Gielkens - Managed Security Services Executive,
Europe IBM Security Services
a hyper-connected era can we ever achieve strong security? The answer is yes,
but it requires some fundamental changes on how information and events are
aggregated from the enterprise. The very strengths of these interconnected
networks — their speed and openness, the easy access anywhere on the globe —
also create a myriad of vulnerabilities. This session focuses on how you can
enhance the levels of security intelligence and visibility provided by your
existing security infrastructure, by leveraging the benefits of Security
focused Cloud Based Data Analytics and protection technologies, in an efficient
We will also have a smoothie bar on the stand (F40), so if you are attending, why not
come along to the stand at grab a FREE refreshing fruit drink! You will also
get the chance to talk one on one with our many experts – perhaps getting a
demo of our latest products/solutions, use our Touchscope technology to browse
key IBM Security pieces of collateral, or check out our Tweetwally, which will
show all the twitter conversations during the day.
To join in our Twitter activity on the day – please
use #infosec12 with #IBM. You can
follow me @RSwindell, or our main
security account @IBMSecurity.
Several of our security experts are on Twitter –
John Paul Ballerini - @jpballerini, Bharat Bhusan - @_bharat_, Tom Mellow -
@vintage1951, Glenn Ambler - @gambler2073, Marc Van Zadelhoff - @mvzadel and
Nick Coleman - @teamsecurity. Darren Argyle - @D_Argyle
One of the experts – Vijay Dheap (@dheap) -
recently shared his views with me, on what he saw the main topics of
conversation at the event being. With many organisations needing to for address
the speed of mobile adoption in the workplace, what their options are and how
to get started. He added that the most mature organizations have one or more
solutions deployed and trying to be more proactive in designing their security
posture – of course all of which our IBM experts at the event would be able to
Vijay also has a blog that I am sure you would find
interesting - http://ow.ly/aj7Z9
If you are not attending the event, but keen to
speak to IBM about their sessions, then please visit –email me at email@example.com and I will be happy to send the decks to you,
and put you in touch with one of our experts!
We also have Pulse Comes To You on 30th May at The
Grange, Tower Hill – where our customers & prospects can learn more about
the entire Security Systems and Tivoli division. Registration is now open at - http://ow.ly/aiP1C
As you know, the team held a Cloud Service Management Simulator Workshop at Pulse 2012 and I was in the room for a portion of the session (look for me in the background at 1:03) and I know that the attendees had their eyes opened.
The team cut together a pretty cool trailer to give you an idea of what goes on at one of these simulator sessions.
If it looks like chaos, that's because there is a good bit of chaos in the process of role-playing the real-world interaction between IT and business when they are not aligned properly.
The goal is to keep the company profitable. That lasts for about 3 minutes...
But here's the thing. As the workshop progresses, the transformation occurs and balance is achieved (and money starts to be made).
Every service management practitioner should bring their co-workers to this workshop. It is an experience that will help drive your company towards innovation.
Watch the video to see what I mean, and for more information on the simulator, send an email to tivmktg [at] us [dot] ibm [dot] com.