Cloud Computing + Things = "Information Excellence", Not IoT

July 30, 2015 0 Comments A+ a-


The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is also feared as the real- life instantiation of The Terminator’s Skynet, where sentient robots team with an omnipresent and all-knowing entity that uses technology to control, and ultimately destroy, all of humanity.

Not there yet

Lucky for the humans among us, the technical capabilities of both cloud computing and IoT are way behind these Orwellian fears. Although the technology is promising, research and technical hurdles still abound. Challenges include:
  • Datasets that span multiple continents and are independently managed by hundreds of suppliers and distributors;
  • Volume and velocity of IoT dataflows exceed the capacity ad capability of any single centralized datacenter;
  • Current inability to conduct “Big IoT” data processing across multiple distributed datacenters due to technical issues related to basic service stack for datacenter computing infrastructure, massive data processing models, trusted data management services, data-intensive workflow computing; and
  • Benchmark limitations associated with heterogeneous datacenter application kernels.
Despite these current challenges, the blending of Things and cloud computing can deliver real value today in the creation of “Information Excellence”. Joe Weinman, author of “Cloudonomics: The Business Value of Cloud Computing”, eloquently explains this in his new book, “Digital Disciplines: Attaining Market Leadership via the Cloud, Big Data, Social, Mobile, and the Internet of Things”, information excellence is an extension of traditional operational excellence and its traditional static process design towards a business model that leverages real-time data to maximize process throughput and minimize process costs.[1]

Using cloud to optimize productivity

Also known as dynamic optimization, “Solving these types of problems requires big data collected in real time from things and people, processed in near real time through an optimal combination of edge
and cloud, and then enacted through people and things.” This approach is aggressively used by modern distribution companies when they abandon fixed delivery routes in favor of dynamic rerouting that minimizes fuel, carbon footprint, labor costs and capital requirements while simultaneously maximizing customer satisfaction.

Broader use of dynamic optimization can also have an effect on how governments can leverage cloud computing services to improve society at large. While it is well known that delivery companies such as UPS avoid left turns in the construction of delivery routes to improve productivity, New York City has recently requested that Google help reduce left turns for Google Maps users to enhance pedestrian safety.[2]

Even more exciting than this are possible subsequent business enhancements Weinman envisions which include:
  • Solution Leadership – Connecting products and services via cloud computing in order to enable ongoing customer relationships, encouraging stickiness and transforming one-time transactions focused on sales to ongoing subscription relationships focused on customer outcomes
  • Collective Intimacy – Using cloud computing to collect, aggregate and process data in order to personalize services and recommendations; and
  • Accelerated Innovation – Connecting firms with problems to prospective solvers through idea markets, challenges and innovation networks.
Although security and privacy of personally identifiable information (PII) remain vexing problems, the use of anonymized and aggregated data to improve business processes avoids many of the pitfalls attached with improving services for an individual. A less obtrusive approach to IoT could also avoid many of the legal and regulatory obstacles associated with the storage and transmission of PII data. Companies that have successfully replaced traditionally static business processes with data-centric dynamic optimization and information excellence are well known and include:
  •         Airbnb
  •         Uber
  •         Netflix
  •         Google
  •         Amazon

Data-centric, service-centric means excellence

The lesson here is that a data-centric approach to business process improvement may be the true low hanging fruit when it comes to leveraging cloud computing quickly and profitably. These companies have also left behind the product-centric, regionally managed, manufacturing economic model in order to embrace the new model of service-centric, globally managed and networked economies. By targeting information excellence as the next step up from operational excellence, a legacy business can be fairly quickly renovated into a modern data-driven enterprise. Information excellence also enables customer personalization, process flexibility and business agility, all the key components needed for corporate success today.



[1] Joe Weinman, Digital Disciplines: Attaining Market Leadership via the Cloud, Big Data, Social, Mobile, and the Internet of Things (Wiley CIO, 2015).
[2] Sarah Goodyear, “New York Wants Google Maps to Discourage Left Turns,” CityLab from The Atlantic, July 9, 2015


This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell's thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.



Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



Cloud Computing Price-Performance Could Vary By 1000%!

July 14, 2015 0 Comments A+ a-




Yes, you read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This also means that the cost to you of processing the exact same job in the cloud could vary by this much as well.
This surprising result was discovered by a Rice University group, headed by Dr. T. S. Eugene Ng, that has been focusing on cloud computing. Recently they published their joint work with Purdue University: Application-Specific Configuration Selection in the Cloud: Impact of Provider Policy and Potential of Systematic Testing, in the IEEE INFOCOM 2015 Conference Proceedings. That paper took a first step towards understanding the impact of cloud service provider policy and tackling the complexity of selecting configurations that can best meet the price and performance requirements of applications. That work resulted in a collaboration between Rice University and Burstorm, a developer of computer aided design (CAD) software specifically built to support cloud computing architects.
The Burstorm platform contains a product catalog of over 36,000 products across 900 CSP product sets. Working with Dr. Ng’s group, the study looked at seven suppliers across three continents (Asia, North America and Europe) with a total of 266 computer products spread over three locations per vendor, where available. Raw data was collected every day, for 15 days. The results were then normalized to reflect a 720-hour, monthly pricing model. The final output were price-performance metrics graphs that were used to look at performance and price variance both between the CSPs and geographic regions.
Analysis of the final output showed a 622 percent variation of performance within a same instance type and a price/performance variance of 1000 percent. Performance of the exact same virtual machine instance can also vary by as much as 60 percent over time. The best performing instance also did not show the best price-performance. Availability and behavior of instances was also very dependent on location, even when the instance was provisioned by the same CSP. Dave Hansen, Vice President and General Manager of sales, marketing and services for Dell Software sums up the importance of these results saying:

Dave Hansen, VP and General Manager, Dell
“…[This] report is incredibly valuable. I’ve looked at this problem many times over the years and it is very difficult to make buying decisions on cloud services without this context.”
These results also show that today’s enterprise desperately needs to use active metering and monitoring when procuring cloud-based services. Changes in instance types, pricing, performance over time and availability of services by location highlights the inadequacy of traditional benchmarking philosophies and processes. Another hidden gem in this report is the use of “performance quota” by some service providers. When a customer meets this CSP management quota, the performance of the relevant instance will be reduced. In other words, exceeding this limit will drive up your usage bill. These findings also drive home the need for enterprises to ramp up their due diligence when selecting CSPs. They should
also investigate the use of third party brokers and automated solution design tools when developing their cloud migration strategy.
As the use of cloud computing advances, consumers must take active steps toward being more sophisticated, automated and dynamic in their use of cloud service providers. At a minimum, these steps should include:
  • The use of computer aid design tools when conducting due diligence on cloud service providers;
  • Use of organic or independent third parties to meter, monitor and report on the performance of cloud-based resources;
  • Clear understanding of the use and associated limits of “performance quotas”; and
  • The identification of one or more alternative sources for the provisioning of all cloud-based resources.
This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell's thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.





Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)



E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

July 10, 2015 0 Comments A+ a-


Data security breaches and hacker attacks on private businesses, health organizations and government agencies in the U.S. have grabbed headlines with increasing frequency, it seems. There is zero doubt about the damage these events cause. Cybercriminals and hackers walk away with customers’ payment card information and employee data while companies and federal authorities investigate the source of the leaks and spend millions of dollars to repair the harm.
Some see these breaches as a threat to national security and in response, the U.S. government has launched the “30-day Cybersecurity Sprint” as a tactic designed to beef up cybersecurity protocols. According to media reports, specific program steps include:
  • Immediately fixing any cybersecurity vulnerabilities
  • Tightening policies and practices for privileged users who can access sensitive information
  • Implementing multifactor authentication procedures for accessing federal networks
  • Employing electronic “indicators” provided by the Department of Homeland Security that show when there has been a malicious cyberattack
Do your part in supporting the sprint by educating yourself about cybersecurity. The “Insight Partner Views on Cybersecurity” e-book can help. By addressing security from multiple viewpoints, the e-book reinforces the need for society to build a culture that embraces information risk management.
The “Insight Partner Views on Cybersecurity” captures the latest news, trends and best practices surrounding cybersecurity by influential bloggers in the Dell Insight Partner program. Topics include:
  • The chief information security officer (CISO) role in cybersecurity
  • Security attacks and countermeasures
  • Mobile device security
  • U.S. Department of Defense cloud security guidelines
  • The emerging science of digital forensics
http://www.slideshare.net/kvjacksn/security-e-bookv5pg



Share the “Insight Partner Views on Cybersecurity” e-book within your personal and professional social networks. In doing so, you will support the “30-day Cybersecurity Sprint,” be more informed about the subject and serve as a crucial partner in guarding data privacy for yourself, your organization and your nation.



This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell's thought leadership site Power More. Dell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.



Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015)