Articles

Affichage des articles du septembre, 2011

Disrupt Yourself Before Others Disrupt You: DVD To Streaming Transition Is Same As On-Premise To Cloud

Image
Recently, Netflix separated their streaming and DVD subscription plans. As per Netflix's forecast, they will lose about 1 million subscribers by the end of this quarter. The customers did not like what Netflix did. A few days back, Netflix's CEO, Reed Hastings, wrote a blog post explaining why Netflix separated their plans . He also announced their new brand, Qwikster, which will be a separate DVD service from Netflix's streaming website. These two services won't share the queues and movie recommendations even if you subscribe to both of them. A lot has been said and discussed about how poorly Netlflix communicated the overall situation and made wrong decisions. I have no insider information about these decisions. They might seem wrong in short term but I am on Netflix's side and agree with the co-founder Marc Randolph that Netflix didn't screw up . I believe it was the right thing to do, but they could have executed it a little better. Not only I am on their si

Implementation of Cloud Computing Solutions in Federal Agencies: Part 4 - Cloud Computing for Defense and Intelligence

Image
(This is part 4 of the series entitled "Implementation of Cloud Computing Solutions in Federal Agencies". First published on Forbes.com , this series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper will be available at NJVC.com starting September 7, 2011.) The defense and intelligence communities are not immune to cloud computing. Arguably more than any other government agencies, their missions require a fabric of utility computing that scales on demand and enables self discovery and self-service access to secure, timely and relevant information in support of mission: individual or shared. The traditional IT model requires system engineering that binds most software to the hardware and does not provide an enterprise suite of functionality or allow for increased flexibility and a governed lifecycle of services. Designing software independence from the hardware allows an operating system, applications and data to “live” across the en

Implementation of Cloud Computing Solutions in Federal Agencies : Part 3 - Cloud Transition Lessons Learned

Image
(This is part 3 of the series entitled "Implementation of Cloud Computing Solutions in Federal Agencies". First published on Forbes.com , this series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper will be available at NJVC.com starting September 7, 2011.) While the benefits and value of the federal cloud computing policy can be debated, the world’s transition to cloud computing as an integral component of any IT infrastructure cannot be denied. The prudent government executive should, therefore, heed the lessons learned from the many private industry corporations that already have miles behind them on this journey. When identifying a potential cloud computing project, one should always count on a multi-year transition. Organizations should always use a consistent cloud opportunity identification process to reduce the risk of project failure by leveraging data from successful cloud implementations. Clients need to determine set met

Implementation of Cloud Computing Solutions in Federal Agencies : Part 2 - Challenges of Cloud Computing

Image
(This is part 2 of the series entitled "Implementation of Cloud Computing Solutions in Federal Agencies" that first appeared on Forbes.com . This series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper will be available at NJVC.com starting September 7, 2011.) Despite the myriad benefits of cloud computing solutions, several challenges still exist . Being a young industry, there are few tools, procedures or standard data formats or service interfaces in place to guarantee data, computer application and service portability. As evidenced with the recent situation involving the services failure of Amazon’s Elastic Compute Cloud , outages can be a potential risk—and can have widespread implications for consumers of cloud services. This risk becomes even more severe if a mission-critical environment could be impacted. A benefit as well as a challenge, security concerns have also slowed the widespread adoption of cloud computing. A variet

Implementation of Cloud Computing Solutions in Federal Agencies : Part 1-Introduction

Image
(This post first appeared on "Cloud Musings on Forbes". This series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper is available at NJVC.com starting September 7, 2011.) Introduction Cloud computing is a new approach in the provisioning and consumption of information technology (IT). While technology is a crucial component, the real value of cloud computing lies in its ability to enable new capabilities or in the execution of current capabilities in more efficient and effective ways. Although the current hype around cloud computing has focused on expected cost savings, the true value is really found in the mission and business enhancements these techniques can provide. When properly deployed, the cloud computing model provides greatly enhanced mission and business capability without a commensurate increase in resource (time, people or money) expenditures. Cloud Computing: Changing the Game The use of commodity components, coupled

Freemium Is The New Piracy In The SaaS World

Image
It is estimated that approximately 41% of revenue, close to $53 billion, is "lost" in software piracy . This number is totally misleading since it assumes that all the people who knowingly or unknowingly pirated software would have bought the software at the published price had they not pirated it. RIAA also applies the same nonsense logic to blow the music piracy number way out of proportion. The most people who pirate software are similar to the people who pirate music. They may not necessarily buy software at all. If they can't pirate your software, they will pirate something else. If they can't do that, they will find some other alternative to get the job done. Fortunately, some software companies understand this very well and they have a two-pronged approach to deal with this situation: prevent large scale piracy and leverage piracy when you can't prevent it. If an individual has access to free (pirated) software, as a vendor, you're essentially encouragi