tag:blogger.com,1999:blog-35606416968934901342024-02-19T08:58:41.314-08:00Computer Systems Today<center><b><big><big>Computer Systems Today</big></big></b></center><br><br>
What a computer system organization should look like!Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.comBlogger63125tag:blogger.com,1999:blog-3560641696893490134.post-40128976061007535402019-10-14T14:23:00.003-07:002019-10-14T14:23:50.561-07:00Back to BusinessIt’s been a while since I’ve posted to this blog. I hope to post much more frequently. I’ve recently been working with a major consulting firm moving companies from local IT to Cloud. We work with and under the authority of senior C-Level executives and not IT management. In many cases we are phasing out local IT organizations.<br />
<br />
Today’s modern IT organizations have lost focus and no longer server the purpose that they were created for. Today, from the CIO to the lowest level of technician IT departments focus on and hire young recent college graduates highly skilled in various technical disciplines, but with virtually no business knowledge or experience. The departments focus on technological innovation and the expense of business problem solving. Many IT employees have no clue what their enterprises actually do or how the business is run.<br />
<br />
My associates and I including some very major names in IT innovation have developed a multi-part model that first moves existing legacy systems from local IT to the Cloud and eliminates the many employees that provide systems and technical support. This can save a company millions of dollars.<br />
<br />
We also work with corporate management to develop an IT modernization plan that focuses on the current needs and objectives of the enterprise and not on technology. <br />
<br />
When I say modernization, I don’t mean converting old COBOL, RPG, PL1, or FORTRAN code to a modern language, or converting green screen applications to web, tablet, or phone based apps, but rather looking at how the old legacy systems meet current business objectives and replacing the old legacy systems with modern business focused solutions to real business problems.<br />
<br />
Our focus is to leverage highly skilled business and systems analysts who analyze, define, and solve real business problems. We then contract out the actual development to highly skilled contract labor. Note that this is a much more cost effective solution than traditional in-house IT.<br />
<br />
This is particularly true in company’s stuck with old IBM legacy systems (i.e. ZOS mainframes, System i based midrange systems, etc.). We find that many of these companies are stuck with developers to support old systems with legacy skills and which often have to hire additional people to provide modern skill sets often doubling the cost of IT with no direct or measurable return on the investment.<br />
<br />
Our model is totally business centric and cost effective. More later.<br />
<br />Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-67621090417780246882018-12-02T09:42:00.002-08:002018-12-02T09:42:46.432-08:00Time for Business to Regain Control Over Their Computer SystemsThe world of modern computer systems changes on a daily basis with new technology constantly emerging and changing with some wonderful new technology. Sadly, too many senior business executives have become overwhelmed with the technology and have stepped away from computer systems and relinquished responsibility to some wonderfully technically skilled people.<br />
<br />
The modern IT executive or CIO has advanced degrees in technology and surrounds themselves with other equally skilled and highly educated technologists. While these are truly talented and brilliant people, they have little or no background in business and have caused computer systems to drift away from the current strategic needs of the modern enterprise.<br />
<br />
Just recently some major industry giants, Sears Roebuck and Company, Toys-Are-Us, are just two that have succumbed to a failure to embrace technology and have closed their doors. Many other major enterprises are faced with a need to embrace new and emerging markets or join these once great leaders.<br />
<br />
To understand how the modern enterprise must move forward, lets take a look at the current state of IT today.<br />
<br />
Large enterprise IT is most often divided into two distinct camps: 1) Legacy, and 2) Modern technologies.<br />
<br />
1) Legacy -- these systems are often based on IBM mainframe computers with 60 plus year old systems running in legacy languages such as COBOL, FORTRAN, and even RPG (an old language running on the AS/400 line of IBM mid-range computers). These systems use old database systems such as IBM's DB2 or Oracle and others. These systems are old, complex, and have been modified countless times over the years. With IBM's advent of WebSphere and Java, interfaces to the mainframe have been built with now 20 year old systems built on Linux or Unix platforms and integrally linked to the old mainframe based system which remain the core processing systems for the enterprise. Note that enterprises are spending millions of dollars per year in supporting these old legacy systems in terms of hardware, software licenses, maintenance costs as well as salaries of people who provide no value to the enterprise other than technically supporting the hardware and purchased (or leased) software.<br />
<br />
2) Modern technologies -- including Java based, Microsoft .NET, C#, etc. have been developed to front end old legacy systems and support current requirements. The real issue here is that the new technology based systems are tied to the old legacy systems and are limited in terms of their capabilities and results.<br />
<br />
In addition to a mix of legacy and modern technology, new methodologies have been implemented to manage systems development. The most common today is Agile. The concept being that Agile delivers systems more rapidly than traditional waterfall or other methodologies.<br />
<br />
Agile however does not embrace enterprise wide system development, but rather focuses on individual project requests from the business. These requests are based on a limited high level requirements document written by someone in the business who has no IT background or formal training in analysis. These are passed to the IT organization who interprets the requirements and breaks the requirement into Agile "stories". The IT development team then places the stories in their "backlog" and selects what they want to work on with limited input from the business. All too often pieces of the requirement get implemented but other parts of the requirement are deferred in light of other more "important" requirements and stories.<br />
<br />
The bottom line is that the modern enterprises spends 30% to 40% more than they should be spending on IT today and get very little in terms of strategic advantage for their money.<br />
<br />
<h2>
Regaining Control</h2>
<div>
It is time for enterprise management to regain control over their computer systems. The following is an outline of the steps necessary.</div>
<div>
<br /></div>
<div>
<ul>
<li><b>Senior Management Steering Committee</b> -- form a steering committee consisting of the CEO and the senior most executives of the enterprise including the CIO and a consultant such as myself to guide the process. This steering committee will make take control over all IT initiatives.</li>
<li><b>Cloud Strategy and Cost Reduction</b> - All modern systems (Unix, Linux, Microsoft) can be moved directly into a cloud environment. Databases including legacy mainframe databases can be moved into the Cloud reducing system usage and enabling downsizing and cost reduction. Mainframe modernization and elimination would come later. Moving to the cloud reduces hardware cost, software costs, and eliminates many people who maintain these systems and computer network. NOTE: these are administrative support staff, not application developers and provide no direct benefit to the enterprise. This should result in approximately a 30% reduction in total IT costs.</li>
<li><b>New Financial Responsibility</b> -- metrics today exist to allocate all IT costs directly back to business units. This includes all systems development as well has hardware usage and even data storage. All cost related decisions need to be made by the business executive governing a business area with oversight by the steering committee.</li>
<li><b>Enterprise Project Responsibility</b> -- all new project must be approved by business unit executives with oversight by the steering committee. To justify a project, a business ROI prepared by the business unit must be created, reviewed, and approved.</li>
<li>Hybrid Development Methodology -- While Agile development is a wonderful systems development methodology it is not project oriented and a hybrid methodology such as the following should be implemented:</li>
<ul>
<li>Project Charter and objectives -- written by enterprise management</li>
<li>Project Requirements -- a very specific document with measurable results including a direct measurable ROI</li>
<li>Detail requirements -- produced by Business or Systems analysts documenting workflows, needed enhancements, etc. </li>
<li>Review and approval -- by business management (note this includes a written set of testing and acceptance criteria that must be met for a project to be completed)</li>
<li>Project Implementation </li>
<ul>
<li>Requirements to be broken down into a Work Break Down Structure (WBS)</li>
<li>WBS tasks mapped to Agile EPIC's and Stories</li>
<li>Stories broken down into tasks as required by developers</li>
<li>Story implementation by developers</li>
<li>QA testing by professional independent testers</li>
<li>Acceptance testing by designated end users with written acceptance</li>
<li>Training and deployment</li>
</ul>
</ul>
</ul>
<div>
A key element of this process is two integrated reporting systems to document every step of the process. All projects need to be written and stored in a system such as Microsoft SharePoint along with all requirements and record all approvals. Agile development must be tracked in a reporting system such as JIRA (by Altassian). Access to these reporting systems must be available to all involved parties as well as the Steering Committee members and designee s of steering committee executives. </div>
</div>
<div>
<br /></div>
<div>
For more details contact me: <a href="mailto:rcancill@mac.com" target="_blank">Bob Cancilla</a></div>
Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-311113971818179022016-02-20T10:29:00.003-08:002016-02-20T10:29:53.364-08:00Cloud Computing -- Buyer beware!I am a huge advocate of cloud computing. I've spent over 45 years managing IT organizations and have been responsible for equipment as well as application development. I have agonized over hardware budgets, capacity forecasts, and performance analysis. <br />
<br />
I firmly believe that cloud computing offers the smallest to the very largest organizations a huge advantage of over traditional own it and run it yourself environments. <br />
<br />
In today's world we have many risks in operating computer systems. Today it is assumed that your computer systems will be available over the Internet and reach out to your employees working in a distributed environment as well as trading partners and customers. <br />
<br />
This introduces issues of capacity, availability, and security. If I am going to put my business into a cloud computing environment, I want to be darn sure I am dealing with a financially stable and secure environment. I want my cloud vendor to provide 100% availability. I want to be sure that my applications and my data are replicated not only across multiple machines, but across multiple locations in geographically diverse locations that will protect the site and my business from acts of nature such as earthquake, hurricanes, tornadoes, fire, or any other exposure that could disrupt a data center's operation.<br />
<br />
I want to be sure that the vendor provides an extreme level of security for everything from their physical plant to Internet access and offer me services like ethical hacking as well as monitoring to protect against hackers. I want to insure that the vendor provides a better team of security expertise than I could afford to employ via employees.<br />
<br />
I want the vendor to handle all of the "systems programming" activities such as upgrading OS's, and middleware. I want the vendor to provide staff that assists me in managing the deployment of new or upgrades to my software. <br />
<b><br /></b>
<b>What I don't want!</b><br />
<br />
What I don't want is a "cloud provider" that has one data center with limited equipment and no real time fail over or disaster recovery program. I met a gentleman selling IBM AS/400 based cloud applications. The had a couple of machines in a data center in their garage. They sold this to a large number of governmental entities that didn't do their homework. This is a disaster waiting to happen. <br />
<br />
I met a sales rep for a much larger company, but they had one data center in Atlanta, Georgia with no mealtime fail over or recovery capabilities and very limited technical support. <br />
<br />
I personally support Microsoft, Amazon, and a few other major well established cloud providers that an provide continuous, uninterruptible computing environments that can withstand anything and companies that can provide the people that I no longer need to employ (i.e. the systems programmers, admins, architects, performance managers, etc.). <br />
<br />
<b>Are you a small company?</b><br />
<br />
If you are a small company with a need for one or maybe two small servers, why on earth would you NOT use a cloud? You can obtain all the computing power you might need for about $100 per month with a major company. You get security, reliability, performance, and technical support that you would never be able to afford on your own.<br />
<b><br /></b>
<b>Large or Small?</b><br />
<br />
Cloud computing can meet everyone's needs and save you huge sums of money.<b><br /></b><br />
<b> </b><br />
<br />Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-69035007197618838312016-02-17T19:02:00.001-08:002016-02-17T19:02:23.911-08:00Can you afford to have an in-house IT development staff?I was going to start this post by listing dozens of technologies that are in common use today by many IT organizations and software development companies. I've been in the IT industry for close to 50 years and have seen literally hundreds of technologies come and go.<br />
<br />
You can rest assured that the technologies you are using to run your business today will be obsolete in the very near future. If you are a large company, just look around and you will visibly see many technologies such as that old mainframe in the computer room, maybe an IBM midrange computer stuck in a corner, dozens of PC based applications often running on isolated servers in specific departments around your organization.<br />
<br />
Do you support all the modern web browsers? Do you support all of the popular mobile phones? Tablets? Personal computers? These technologies all require specialized skills. Can you afford to hire people with these skills? <br />
<br />
Sadly, I no longer believe that you (the largest or smallest) company or organization should have in-house application developers on your staff. Today, I strongly recommend outsourcing your software development and/or implementation of purchased package software products.<br />
<br />
If you try to maintain your own IT development staff, you will over staff with people who are not productive often called architects who constantly review emerging technologies. Some of you will attempt to cross train existing people who never develop a proficiency in the new technology. <br />
<br />
Why not just contract for experts that you need. This technique can work, but there are some major changes you must make in order to be successful in outsourcing your IT development.<br />
<br />
First and foremost you need a small but strong staff of systems analysts who know your business and your requirements. You do need a small but expert staff that can lead your systems analysts in writing requests for proposal and statement's of work that clearly define what a vendor will deliver. Note, I recommend always using fixed price contracts putting the development partner in a position to share the risk with you of delivering a system that meets requirements and does so within the time frame you agree to.<br />
<br />Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-62224047186051759282016-02-14T10:16:00.001-08:002016-02-14T10:16:45.358-08:00Agile Development for Your Business?Agile Development and Your Business<br />
<br />
Have your IT people been pushing you to get rid of that bad old waterfall project methodology where projects and objectives are clearly defined before you begin to do development? Then the developers get to figure out what is important and what is not? <br />
<br />
Agile development when applied to software development can be of great value, but... Don't let your IT organization push you into abandoning proven project and requirement definition methodologies. <br />
<br />
The AGILE methodology was developed to facilitate rapid software development by programmers with an improved level of quality. It was never intended to define what should be built and what components are more important than others.<br />
<br />
Companies that utilize Agile successfully use a hybrid model of software development. Project and requirements for a project are developed and controlled by the business. The business and only the business can prioritize the various requirements into "Must Have", "Should Have" and "Nice to Have" general categories. A well managed project would implement all of the MUST and SHOUD have's and a large percentage of the Nice to have's.<br />
<br />
Only the business should be allowed to prioritize and change a MUST have to a SHOULD or "NICE" to have. Only the business can decide than an item may be deferred to a later project after the primary deliverables are completed.<br />
<br />
IBM is a classic example of such a hybrid methodology. IBM has an elaborate and formal process for vetting and prioritizing items that will be included in the next release of a product. The vetting process includes accounting and finance, marketing, sales, development, and legal. It works up through several layers until it is reviewed and approved by senior executives in the Software division. Then and only then is a set of requirements turned over to the developers who use Agile to implement the requirements. The development manager had better be certain that all of the "MUST Haves, along with the SHOULD haves and some of the Nice to Have's are implemented by the product's release date.<br />
<br />
Additionally a representative of the business should participate in the daily scrum meetings and insure that developers are meeting the requirements set forth by the business.<br />
<br />
Note that a structure that places responsibility for all IT projects and requirements along with final acceptance of a development project belongs to the business insures success. IT must be a service organization that supports the business.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-59011794356030996702016-02-13T08:38:00.001-08:002016-02-13T08:38:13.279-08:00What is happening to IT today?<div class="MsoNormal">
Something is radically wrong with IT today!<span style="mso-spacerun: yes;"> </span>Spending ranges between 3.2% for enterprises
with revenue over $2 Billion in revenue to as much as 6.9% for organizations
with revenue under $50 million<a href="https://www.blogger.com/blogger.g?blogID=3560641696893490134#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: Cambria; font-size: 12.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "MS 明朝"; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>.<span style="mso-spacerun: yes;"> </span>Not too long ago IT costs were at a firm 1%
of revenue where they remained for nearly 50 years!<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Interestingly enough, computing equipment is much more
powerful than it ever has been and costs a fraction of what it once cost.<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
So where does the money go?<span style="mso-spacerun: yes;">
</span>The majority of spending today in your IT organization is on
people!<span style="mso-spacerun: yes;"> </span>Your money is spent on both
salaried employees and on 3<sup>rd</sup> party consultants. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Tech Pro Research reports that the number one priority for organizations
in 2016 is improving efficiency of business processes<a href="https://www.blogger.com/blogger.g?blogID=3560641696893490134#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: Cambria; font-size: 12.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "MS 明朝"; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>.<span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
How can this be?<span style="mso-spacerun: yes;">
</span>Haven’t you been investing in systems that provide process improvement
for the past 50 years?<span style="mso-spacerun: yes;"> </span>What is going on
within IT today.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
In this post I introduce key concepts which I will drill
into in future posts, but lets look at the mess that IT has become today.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Most organizations have many different technologies today,
both hardware and software.<span style="mso-spacerun: yes;"> </span>There is a
mix of purchased business applications and those developed internally or via 3<sup>rd</sup>
party consultants.<span style="mso-spacerun: yes;"> </span>If you look at your
IT staff you will find job titles of people like various types of “architects”
that provide no direct return on your investment but cost you very significant
salaries.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
You’ll find new methodologies like AGILE which take control
away from the business including control over what is important to be delivered
and when!<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
You will see a vast array of internal “frameworks” and
technologies that were supposed to improve IT productivity when in fact they do
they exact opposite providing little or no value.<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
While the cost of hardware has dropped to all time lows,
your total cost of supporting computing infrastructure has increased.<span style="mso-spacerun: yes;"> </span>Factor in security and privacy concerns that
are now a major part of your infrastructure cost and the costs have spiraled
way beyond that old IBM Mainframe that used to run your entire company!<span style="mso-spacerun: yes;"> </span>I’m not advocating a return to IBM
mainframes, but think back to the organization and productivity of those days.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
It’s time to take assess what is happening in your
organization and how IT is performing for you.<span style="mso-spacerun: yes;">
</span>If you think you are not getting a good rate of return for your
investment in IT and if you feel that IT is holding back your company instead
of helping you leverage new and emerging markets, its time for an in-depth
independent assessment.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
I have done these assessments studying every aspect of your
IT organization and its value and concluding with a recommendation on how to
reduce your costs and improve the ROI on what you do need and get from IT.<span style="mso-spacerun: yes;"> </span>Additionally, I have helped put management
structure and processes in place that put control over IT directly in the hands
of the business where it should be and provide a means of isolating business
executives from the techno-babble of modern technology.<span style="mso-spacerun: yes;"> </span><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
I will describe my assessment process further in coming
articles, but 2016 is the time to regain control over IT and insure it is
meeting the needs of the business instead of being a playground for
technologists.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>JA</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
<w:UseFELayout/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="276">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]-->
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:Cambria;
mso-ascii-font-family:Cambria;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Cambria;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<!--StartFragment-->
<!--EndFragment--><br />
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=3560641696893490134#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: Cambria; font-size: 12.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "MS 明朝"; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
Tech Target Feb, 2016 - <a href="http://searchcio.techtarget.com/magazineContent/How-Company-Size-Relates-to-IT-Spending">http://searchcio.techtarget.com/magazineContent/How-Company-Size-Relates-to-IT-Spending</a>
<o:p></o:p></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=3560641696893490134#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: Cambria; font-size: 12.0pt; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "MS 明朝"; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
Tech Pro - <a href="http://www.zdnet.com/article/it-budgets-2016-surveys-software-and-services/">http://www.zdnet.com/article/it-budgets-2016-surveys-software-and-services/</a>
<o:p></o:p></div>
</div>
</div>
Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-90035948403728550702016-01-23T16:09:00.003-08:002016-01-23T16:09:51.504-08:00Loss of a HeroI just found out today that Ed Yourdon passed away on January 20, 2016. This is a major loss to the IT community. Ed made a huge difference and revolutionized programming as we know it today. Modern frameworks, architectures, etc. all have their origins in Ed's work! <br />
<br />
If you remember rats nest programming with GO TO's and worse and were part of the transition to structured programming, analysis, and design you will know the value Ed brought to the world of modern computing.<br />
<br />
Just after Sun Micro systems released Java Ed wrote a book on object oriented programming and design. Ed totally understood OO and more importantly what an OBJECT really is! Sadly a bunch of geeks have obfuscated his work in this area, but If you red his <a href="http://www.amazon.com/Oriented-Analysis-Edition-Yourdon-Computing/dp/0136299814" target="_blank">book</a> you will look at OO very differently.<br />
<br />
I had the privilege of meeting Ed and having the ability to discuss OO design and development with him. <br />
<br />
Ed will be missed! He was a great man and made an incredible contribution to modern IT.<br />
<br />
-- Bob C.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-61149576680970049422015-12-19T14:04:00.001-08:002015-12-19T14:04:17.811-08:00What happened to IT?I've been in this business a very long time (over 40 years). When I started our objective was to help our company or client improve their business processes, leveraging the power of "modern" computer technology.<br />
<br />
My first corporate job was as a Sr Systems Analyst and AVP (Assistant Vice President). I worked with and for the senior executives of the company. My role was look at key business processes which were often bogged down in tedious manual processes. <br />
<br />
I would analyze the process and propose the introduction of automation via computer processing. Initially we used punch cards and paper forms and reports. <br />
<br />
I was there when IBM introduced CICS and "on-line" processing. I saw the evolution from clerical people using terminals to the spread of terminals to very desktop. I remember specialized computers like DEC's PDP-11 permeate manufacturing and engineering departments beginning to build islands of computing (i.e. business and engineering or manufacturing would "never" talk to each other).<br />
<br />
I was there and had the opportunity to work with Dr. C.F. Codd and had dinner with James Martin after relational database and enterprise engineering took off.<br />
<br />
I saw the introduction of the personal computer. Here we saw accountants flock to these machines as well as various other individuals in the business units. We began to see programs emerge and more islands of computing that corporate IT often did not even know existed!<br />
<br />
I recall getting a call one day from the VP of Finance who had just bought an AS/400 computer from a vendor that sold it with the McComack & Dodge General Ledger package. He asked if he could get some data downloaded from the company's mainframe.<br />
<br />
I was there when in in 1997 the Internet was opened up for general commercial use. I was there later in 1997 when James Gosling and Scott McNally introduced Java to the world. I led the adoption of Java by my company and was the first commercial insurance company to implement an interactive customer service based web site. <br />
<br />
Java and technology have evolved. IBM still has a foot hold in the Mainframe and Midrage platform business with zOS, AIX, and IBM i, but their clients would like to modernize and move away from COBOL, RPG, and other dated technologies. <br />
<br />
Over the past 15 years we have experienced a period of technological growth that has negatively impacted most businesses. Today technical folks (the geeks) have introduced layer after layer of framework and middleware that almost hides the business functionality of the system they have built.<br />
<br />
Today a developer must weave through a complex web of technology and learn how that all interacts before they can get to the basics of business programming such as changing a simple sales calculation. <br />
<br />
We have seen so called technical experts advocate design patterns and other mystical gibberish that has made the world too complex.<br />
<br />
Today you can look at many major enterprises and see isolated islands of developers working on isolated systems that may interact with other systems via complex interfaces using SOA or more often the REST API framework today.<br />
<br />
While there are some technical advantages of REST over other technologies a key issue becomes "how do you represent a business problem" to REST...<br />
<br />
Add to this a jumble of hardware platforms and operating systems ranging from IBM Mainframes with zOS to No-name Intel clones running Linux with a whole flock of Windows servers competing for attention and revenue.<br />
<br />
IMHO it is time to get back to basics! Lets refocus IT on business solutions! Lets put control over IT back in the hands of the CEO and get rid of the CIO as we know them today! Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com1tag:blogger.com,1999:blog-3560641696893490134.post-83951405260920462582015-09-05T11:02:00.002-07:002015-09-05T11:02:53.327-07:00What Happened to Enterprise Systems Architecture?I spent many years designing and implementing enterprise systems. On two separate occasions I had the privilege of leading the design of enterprise wide systems for two major Fortune 100 insurance companies. <br />
<br />
In one case we moved from a collection of batch programs (remember when keypunch operators would key punch forms and we ran programs that read the cards, validated the data and updated master files then produced reports?)... to a mainframe CICS based on-line system using an integrated relational database.<br />
<br />
In the second case we replaced an AS/400 5250 based system with a relational database and Web Based model. <br />
<br />
I studied enterprise modeling and had the privilege of meeting James Martin and Dr. C.F. Codd as well as several other notable meteorologists of the 1980's and 1990's. <br />
<br />
I got into a battle which I won with the head of the computer science department of a major southern California university over CRUD based data base application design and enterprise systems design (I was the enterprise systems advocate and I won)! I not only won but had a major convert.<br />
<br />
I was working for IBM when SOA was introduced and became the architecture DE-jour. During my short stay with IBM I noticed a major disconnect between business and technology. Thanks to Lou Gersnter, IBM had dismantled its sales organization and basically lost contact with its customers.<br />
<br />
IBM has some of the finest technical minds in the world working in its labs, but they lacked the control and guidance of business centered focus and requirement definition. <br />
<br />
Today I am studying REST and trying to fit RESTful API's into a major corporation and support the business. I have read paper after paper on REST and they all describe the HTTP interface, the concept of dealing with nouns instead of verbs, and the technology to implement REST... <br />
<br />
Virtually every paper I have read or video I have watched at best have a trivial application like creating, updating and maintaining a blog used as an example... No one talks about processing an insurance application, adjudicating and paying a claim, or even billing a client for a service rendered or product purchased and shipped.<br />
<br />
I am in total agreement with the technical concepts of REST which is a stateless interface that allows your application to be deployed across multiple machines located at multiple data centers around the globe with data replicated as well providing a bullet proof (failure proof) system in a cloud based implementation. <br />
<br />
BUT, how do you map this thing (REST) back to the basics of conducting business? If I find a solution, I'll share it here, but for now, I would love to hear from anyone who thinks they have a solution to building business systems with REST.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-68327352645210691982015-06-17T10:18:00.003-07:002015-06-17T10:18:54.905-07:00The Internet is Getting SlowerI heard this headline on my 11pm local TV news last night and figured I better do some checking to see what was going on. Well it seems that they were right. As of yesterday, the FCC ruled in favor (a 3 - 2 vote along political lines) of Obama's "Net Neutrality" regulations which will put the Internet back into the dark ages.<br />
<br />
It basically imposes three new rules:<br />
<br />
<br />
<ul>
<li><b>no blocking content</b> -- this means that any content including streaming audio & video are fair game for any provider or customer.</li>
<li><b>no slowing down</b> -- an ISP may not slow down particular sites or type of content due to the load it places on their networks.</li>
<li><b>no paid fast lanes</b> -- ISP's may not create special high speed paths for customers willing to pay more. All bandwidth must be equal... </li>
</ul>
The reaction from the major ISP's has been extremely negative, especially about providing high speed services for customers willing to pay for it... The ISP's are placing major infrastructure and network upgrades on hold pending on how this regulation all settles out. While on the surface it seems beneficial, this is akin to California's energy crisis of 2000 where the PUC forced providers who owned generation facilities to sell off their generation capabilities and buy power from a network of providers. This instead of lowering prices created brownouts (from artificial shortages) and increase rates over 800%. <br />
<br />
Here are four articles with much more detail on Net Neutrality:<br />
<br />
<ul>
<li><a href="http://tinyurl.com/lyl5l2r" target="_blank">Slate.com</a> </li>
<li><a href="http://tinyurl.com/pzn2rqt" target="_blank">Forbes Magazine</a> </li>
<li><a href="http://tinyurl.com/kpobtg9" target="_blank">Wired</a></li>
<li><a href="http://tinyurl.com/mq2nkgt" target="_blank">The Guardian</a></li>
</ul>
<br />
Read these articles for yourself. We need to do something about this ASAP probably with legislation that both parties can support and is veto proof until Obama leaves office.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-91471157828961420332015-06-10T06:53:00.002-07:002015-06-10T06:53:21.984-07:00Cloud as it Should BeYesterday I wrote a short blog about private cloud and IaaS which is where many vendors and IT executives are trying to divert their companies in terms of cloud initiatives. This maintains IT staff jobs and vendors are able to sell hardware and middleware to the clients.<br />
<br />
My view of cloud is complete and total outsourcing of hardware and the middleware or technical software required to support applications development such as operating systems, database management systems, messaging systems, etc. <br />
<br />
To me the ideal cloud vendor provides a complete environment where the client need only install (or have someone) install their business applications and use them. This means that the client need only provide a simple Internet connection for their employees to the cloud provider.<br />
<br />
The cloud provider needs to provide and maintain all computing equipment, networking facilities, and software required to run and operate the facility. They should also provide real time replication to at least one other site that meets disaster recovery requirements such as being geographically separated from points of risk (i.e. the same earthquake, tornado, hurricane, etc.). <br />
<br />
The cloud provider should provide security services running sophisticated security monitoring services with a staff of experts to insure that the clients are fully protected. Ideally they would provide ethical hackers to check the integrity of the client's applications and identify all security risks and assist in mitigation.<br />
<br />
The cloud provider should be highly scalable to accommodate seasonal peak period processing on a excess capacity fee schedule that reverts to normal pricing after the peak period subsides.<br />
<br />
The net benefit to large organizations is savings of millions of dollars in hardware, software, and the human resource cost of those people who do nothing but support your hardware, infrastructure, or software that runs your computers (operating systems and middleware).<br />
<br />
It is not unusual to see a large company with over 100 people doing nothing but supporting computer hardware and providing no direct benefit to the organization. <br />
<br />
Most organizations have disaster recovery facilities including equipment that is never used that sits and waits for a disaster. Disaster Recovery is often treated like an insurance policy costing the organization millions of dollars per year. This can be eliminated with cloud.<br />
<br />
The ability to scale to meet peak seasonal processing can result in a huge savings since most company buy computers that have the capacity to handle peak periods and remain idle most of the year. Imagine a company that has peak processing from mid-November to the end of December. They could be wasting millions of dollars buying hardware that supports a 45 day period. Note that while some vendors have a "capacity on demand" program, many do not allow you to turn off the capacity when you activate it and others charge huge fees to activate. <br />
<br />
The downside is you will be laying off a large number of employees as you embrace cloud which will cause issues within your IT and Human Resources organizations, but often early retirement or transfer to other areas of the company can mitigate the blow.<br />
<br />
Note one final benefit is improved risk mitigation. You will very likely receive a higher quality of technical support from the cloud provider due to their need to support many clients and their ability to hire the very best employees that you may not be able to hire. <br />
<br />
Choosing your cloud provider is the real key. You must have a well funded, reliable company that will survive and grow vs others that may run the risk of going out of business, or being acquired. Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-30225666233887833032015-06-09T11:09:00.004-07:002015-06-09T11:09:50.791-07:00Is Private Cloud or IaaS for You?My involvement in corporate IT seems to be rapidly moving towards and embracing Cloud technology to assist my clients. The deeper I get involved with Cloud, the more I see a great deal of confusion both by customers who do not understand what cloud is or should be, and by vendors who like to maintain the confusion to maximize their revenues.<br />
<br />
A key issue today is vendors who attempt to sell cloud technology to the existing CIO's leveraging the idea that public cloud is a big risk and the customers should create their own private cloud. IBM happens to be one of the biggest vendors of private cloud technology. This is a logical outcropping of C-Level executives asking their CIO to look into Cloud computing. Private Cloud (meaning that your company buys the equipment, installs, and operates it in your own private facilities) is a good way for IT to maintain control over the computer hardware and systems software used to support the companies IT initiatives. <br />
<br />
There are some benefits to "private" cloud. If you aggressively adopt cloud based technology, all of your applications move into the cloud and are no longer dependent upon proprietary hardware solutions. Your application development teams or vendors that you purchase software must support the technology you have deployed in your cloud and there are certainly benefits of standardization. In large companies, there are additional benefits using common hardware, software, and infrastructure. Additionally if done right, you eliminate the costs of traditional Disaster Recovery by distributing your applications across multiple "peer level" data centers and balancing work across the data centers giving you DR by default. No longer do you have idle equipment or resources waiting for a disaster to happen! <br />
<br />
The downside of this approach is you still have a significant investment in computer hardware, systems software, and human resources to maintain the environment. <br />
<br />
A second approach is IaaS which is popular with CIO's where their management team have pushed them to outsource the hardware to a third party vendor. So lets say you contract with IBM who drives all of the computer equipment in IBM data centers that you access via the Internet. Your IT organization is responsible for maintaining the system software deploying applications and supporting the environment. The difference? You don't own the machines.<br />
<br />
IaaS (InfraStructure as a Service) can be advantageous for companies with season peak processing periods. You can contract for normal day to day processing levels and have a peak period option that charges you for the resources you use during the peak period and reverts back to normal when the peak period demand subsides. This requires a vendor who has this type of capability as well and the knowledge and infrastructure to support it.<br />
<br />
I recognize that these are popular "cloud" solutions, but not my favorite by far. I much prefer the models that let your company focus only on your actual business applications and let the vendor handle all of the hardware, middleware, and infrastructure including security, replication, etc. <br />
<br />
More on this soon. <br />
<br />
<br />
<br />
Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-26992379264914772882015-05-29T06:44:00.004-07:002015-05-29T06:44:42.051-07:00Open Source to the Next Level with Incredible MySQL Database SupportA friend sent me a note telling me about the latest release of MySQL Clustering support that has been benchmarked at over 1 Billion queries per hour or 7.6 million rows retrieved per second! That is incredible performance. What is even more amazing is the fact that this is FREE open source software that you can download and install. <br />
<br />
To my knowledge this is the first and only high performance relational database management system (RDBMS) available as open source. This new clustered release outperforms commercial databases costing as much as $20,000 per processor and not beginning to reach this level of performance. <br />
<br />
What is significant here is that Oracle actually owns and controls MySQL but releases it through the standard open source GPL license. They also offer a commercial version of the product with full 24 x 7 support, but if you have access to the technical skills you can use the open source version. <br />
<br />
Once again, open source is rivaling and exceeding features and benefits of commercial software. <br />
<br />
Check this out at: <span style="font-family: Helvetica; font-size: 12px;"><a href="https://dev.mysql.com/tech-resources/articles/mysql-cluster-7.2-ga.html%C2%A0">MySQL Cluster 7.2 Delivers 1 Billion queries per minute</a> </span><br />
<span style="font-family: Helvetica; font-size: 12px;"><br /></span>
<br />Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-62608129307748621112015-04-24T09:57:00.003-07:002015-04-24T09:57:49.419-07:00Cloud and Mobile Devices are the FutureI just read an article that Microsoft's new CEO, Satya Nadella is leading Microsoft aggressively into cloud technology and services refocusing Microsoft away from the PC.<br />
<br />
I happen to believe he is on the absolute right track. At present the vast majority of corporate employees use a laptop or some still use desktop PC's as their workstation of choice. I think that Mr. Nadella is 100% on the right track. Many companies are moving all of their Microsoft Office applications to Office 365 and storing all of their Word, Excel, PowerPoint and other documents in the cloud... <br />
<br />
Apple is equally competitive with their iCloud offering storing output from their Pages, Keynote, and Numbers products in the cloud. <br />
<br />
Most corporate systems utilize a web interface today which is immediately accessible via a mobile devise and true mobile applications are rapidly spreading throughout the corporate world.<br />
<br />
The device of the future will be a tablet with a reasonable size screen and the ability to connect to a large monitor or monitors on a desktop but also portable to move to a meeting or travel anywhere with the user of the device. I think these devices will be equipped with optional keyboards to insure ease of use. A corporate employee should be able to use their smart phone or even perhaps Google Glasses or Apple watch... for total portability.<br />
<br />
Look at the advantages that cloud based technology along with mobile devices bring to the corporate world:<br />
<br />
<br />
<ul>
<li>No lost data! No data exists on a local device and all data from reminders to corporate documents, spreadsheets, powerpoint presentations, etc. live on a shared server. When an employee leaves the company their documents are preserved and can be index and shared to those who need them. The cloud protects against local disk failures or other local disasters including stolen laptops... </li>
<li>Increased security! Only people authorized to access your data can get to it. If the device is stolen there is nothing of value on the device to the their other than device itself. </li>
<li>Insuring that your employees use current versions of your applications. You can implement change management like that used by Apple or Google to automatically update the apps stored on the devices when changes are published! No more worrying about what version a user is using. </li>
</ul>
<div>
Portability, improved security, elimination of risk and insurance that everyone is on current software are huge benefits to corporations today. The high speed office networks and wifi connectivity all ready exists in most corporations today to support PC's. </div>
<div>
<br /></div>
<div>
BTW, did I mention the reduction in human support costs by getting rid of PC's? What are you waiting for? Cloud based systems with mobile devices can save you time money and headaches!</div>
Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-40892116136566430712015-03-07T16:10:00.000-08:002015-03-07T16:10:10.143-08:00Vendor Loyalty?Do you recall the old saying "No one got fired for recommending IBM"? More importantly are you old enough to remember when it was a true statement. Today I wonder how long IBM will be in the computer hardware business... <br />
<br />
I grew up with IBM. I did recommend IBM because back in the day you could trust them to provide solutions (expensive solutions) that met the needs of your business enterprise. I remember when IBM told us to move to COBOL. I remember when the told us to use CICS for this new "On-Line" processing... I joined the throng when in 1997 IBM embraced Java and introduced WebSphere. I used to laugh that I was one of the first kids on my planet to embrace Java via WebSphere. I spent over $3000 per developer for IBM's RAD based development toolset. <br />
<br />
I adopted other IBM technologies and bought into SOA when it was being promoted as the latest architecture of the future. Over the years I have been responsible for recommending and encouraging the companies that I have worked for to spend millions on IBM technologies, including IBM hardware which we dependent on for high performance and reliability. I recalled when everyone laughed at Microsoft based systems and joked about the three fingered salute (Control, Alt, Delete) as the three most used keystrokes... <br />
<br />
Today, the world has changed. First of all the hardware has matured. You can buy a $200 no-name clone computer most likely built in China where you can swap out disk drives while the machine is running without it missing a beat. You can build incredibly powerful and reliable clusters of computers that not only replicate data, but applications throughout a data center and across data centers, often at many locations world wide. <br />
<br />
The fantastic thing about today's world is you need only buy the hardware, cabling, networking technology, and facility to put the equipment.<br />
<br />
The software is free and open source! I'm working with a company that is using Redhat Linux, Jboss, along with several other open source technologies to implement robust distributed systems in their own private "cloud" environment. Note that data is replicated to another site and the system is available 24 x 7 with no outages. <br />
<br />
Interestingly enough, IBM is releasing new high performance technology, but losing market share and revenue with a drop of nearly 50% of its server market share between 2013 and 2014 according to Gartner. That is significant as Gartner most definitely favors IBM in all of its reports, but can no longer cover IBM's decline as a major provider of server technology.<br />
<br />
While IBM still sells its WebSphere line of application servers it has dropped to less than 1% marketshare in the <a href="http://w3techs.com/technologies/details/ws-websphere/all/all">Application Server market place</a>. <br />
<br />
SOA has been replaced with REST and the world is moving towards cloud based technology. <br />
<br />
The world is changing! Change with it, but so so in a sensible manner.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-40999950482504587842014-08-03T18:15:00.003-07:002014-08-03T18:15:20.600-07:00System Modernization<h2>
<b>Where people are today:</b></h2>
<br />
Do you use IBM Mainframes, IBM i (OS/400) based systems? Do you have a large inventory of custom written COBOL or RPG programs? Do you use CICS 3270 or IBM 5250 green screen applications? <br />
<br />
Do you have an inventory of old mainframe based 3rd party systems running on your mainframe or IBM i system? <br />
<br />
Today, the cost of the hardware alone is a major factor driving many companies to seek alternatives. The average mainframe runs between $4 and $15 million to purchase. Add to that monthly software rental for zOS based IBM software often scaling between $30k and $100k per month and you have one huge base cost to justify in hardware and basic system software that does nothing for you other than to provide a base platform where you can install your own home grown systems or those purchased from various 3rd party vendors.<br />
<br />
The IBM i environment is a bit less expensive with hardware plus OS base costs ranging between $20k for a small machine that does very little and usually requires many machines to support your company to about $2 Million for a large high end machines. Again add the cost of 3rd party application software or the cost of maintaining in-house developed systems.<br />
<br />
Add to all of this the cost of disaster recovery. That can vary depending upon what approach you take. Some companies operate their own backup or redundant data center and use various software products to replicate programs and data to the back up site. Others use service bureaus with a strategy of loading backup media should a disaster occur. <br />
<br />
Look at your people cost! Even in small mainframe shops you will need several people dedicated to supporting the IBM software that runs the machine. You need additional operators, capacity planners, performance managers, and other specialists that provide no value other than to keep the machine and its software running.<br />
<br />
IBM i is a bit better in that respect as you can get buy with between 2 and 6 specialists for most small shops. The number grows with the size of your IT organization.<br />
<br />
Next, lets look at your existing staff. If your primary legacy languages are RPG or COBOL, look at the people that support your applications. Many of these folks are in their sixties and many at or beyond retirement age. You can lose many of these people each year for the next several years. Note that you probably have few if any developers under 50 years of age with the skills to support these applications. This is becoming an increasingly high risk. Additionally it is becoming exceedingly more difficult to replace these people when they leave. <br />
<br />
Are COBOL and RPG applications dead? Well, the fact is that thousands of companies continue to run millions of COBOL and RPG programs. These programs were developed over the past 50 years and have been modified countless times over the years. While many of your mainframe systems were extremely well designed when they were first created, the sheer number of changes by a large number of programmers over the years with varying skills have placed the maintainability of these programs at significant risk.<br />
<br />
Modifying one of these programs today can result in production system failures, even with extensive testing prior to deployment. Often times you make a modification only to find that the modification was required not only to one but many programs and that you missed some of these programs. <br />
<br />
Many companies find that they spend well in excess of 80% of their IT budget on maintaining old systems.<br />
<br />
The need to move away from old COBOL or RPG based systems as well as expensive proprietary IBM hardware and system software is increasingly clear. Risks and Costs are increasing, it is becoming difficult to find experienced staff to support your systems and mandatory modifications can cause system failures. <br />
<br />
There are cost effective alternatives.<br />
<br />
<h2>
Cloud Computing</h2>
The direction that many organizations are taking is to prepare for and move to cloud computing. While there are variations in the implementation of cloud computing including some people who claim you can build your own cloud (not a good idea), the best definition is the use of computers hosted by a reputable 3rd party company with a strong financial footing that will survive changes in our economy. <br />
<br />
This company must have resources spread across multiple locations with the ability to replicate your data and programs across multiple locations eliminating the need for specialized disaster recovery. The vendor should provide automatic real-time failover meaning that if a location were to be destroyed (earthquake, flood, or other natural disaster) that your systems would continue function at a minimum of one and preferably several alternate locations. <br />
<br />
In a cloud environment you pay a monthly fee for computer resources consumed. You generally pay based on CPU usage, DASD storage usage, and BANDWIDTH (telephone traffic between your users and the computer sites). Normally these companies calculate and offer you a fixed monthly price that covers up to a maximum CPU, DASD, and Bandwidth utilization. The contract has provisions on how to charge for usage over the agreed upon maximums and allows you to immediately via vendor provided software to readjust your agreement increasing or decreasing your agreed upon usage in real time. <br />
<br />
You then upload software to the cloud and run it using REST based API's. <br />
<br />
In my next post we will discuss approaches on modernizing old legacy systems and the risks associated with various approaches.<br />
<br />
<br />
References:<br />
<a href="http://searchdatacenter.techtarget.com/news/2240213002/IBM-cloud-efforts-intensify-as-System-z-Power-hardware-revenues-tank">IBM cloud efforts intensify as System z, Power hardware revenues tank</a><br />
<a href="http://www.gartner.com/research/attributes/attr_47450_115.pdf">Gartner IT Spending Analysis</a>Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-67266870512993540912014-05-24T19:04:00.003-07:002014-05-24T19:04:48.354-07:00System Documentation?I've been speaking to a number of very large IT organizations many which have large IBM mainframes, and a host of other systems dating back to the 1950's. The common thread is that very few companies have any documentation of systems that have spanned over 50 years of use. <br />
<br />
The knowledge of these systems is contained in the heads of developers that are nearing retirement age. As companies lose key people, they lose tremendous knowledge of existing systems. <br />
<br />
In a world where we have tools to automate documentation of systems few companies have invested in these tools. I am astounded that companies put themselves at risk over a tiny sum of money when compared to the total IT budget. <br />
<br />
<br />Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-67091092244713475882014-03-28T08:35:00.001-07:002014-03-28T08:35:11.311-07:00IBM Watson and Cognitive ComputingAlmost everyone knows that IBM put their Watson computer system up against humans to win Jeopardy and made headlines. What many do not know is that IBM in January created a new business unit at the highest levels of the company headed by a Senior Vice President (Mike Rhodin) with a huge investment dedicated the commercial implementation of Watson and Cognitive Computing.<br />
<br />
First let me give you the link to a <a href="https://www.youtube.com/watch?v=rB7VkrUYCAg">YouTube video of the announcement</a>. Let me caution you that this is a 2 hour video so allow yourself plenty of time to watch this. <br />
<br />
The whole point of Watson is for you to interact with a computer system, process huge amounts of data, find relevant facts, issues, and opportunities that you could not have found with a mere human brain.<br />
<br />
Examples include the medical profession where huge sums of research are analyzed in addition to patient information to come up with suggested courses of treatment along with the probabilities of success.<br />
<br />
Retail systems that ask you what you want and find exactly what you need based on your requirements.<br />
<br />
Travel systems that customize trips to your needs and desires.<br />
<br />
The list goes on. <br />
<br />
IBM has dedicated ⅓ of IBM Research to Watson and is currently working to have it learn to hear and understand what it is hearing, to see by interpreting content in still and video images, and much much more.<br />
<br />
Click the link and watch the video. This is an example of a major company like IBM shifting directions. Please note that Watson is based on IBM super computers, Big Data, and Cloud computing. IBM has promised a sandbox where everyone can interact and experience Watson. I'll post more once I try it out.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-11444592551143332162014-03-09T11:57:00.001-07:002014-03-09T11:57:27.726-07:00Big Changes in ComputingI've been following IBM's Q4 results along with its 2013 year end results and statements being made by Virginia Rometty, President and CEO about IBM's future. It is clear that Cloud and Big Data are IBM's strategic direction. <br />
<br />
In Rometty's letter to shareholders she was pretty clear about big changes in IBM's Power Systems division in light of its dismal 2013 performance. She indicates a clear focus on Linux and participation in Cloud and Big Data.<br />
<br />
See: <a href="http://www.ibm.com/annualreport/2013/chairmans-letter.html?cmp=ibmsocial&ct=chq&cr=annualreport&cm=h&ccy=us">Letter to Shareholders, 2013 Annual Report</a><br />
<br />
It seems that Ms Rometty may have spoken to soon and too harshly in her letter above as a news release came out on Saturday, March 8, 2014 The Street published a letter from Rometty stating <a href="http://www.thestreet.com/story/12522109/1/ibm-ceo-rometty-we-are-not-exiting-hardware.html">"We are not getting out of the hardware business"</a><br />
<br />
We are we? Or are we not Mr Rometty? <br />
<br />
This whole debacle is the result of IBM hardware sales being down by over 18% year to year and actually generating a substantial operating loss. There is followed reports of over a 25% world wide reduction in staff for IBM STG (Systems & Technology Group -- responsible for computer hardware) in all areas from sales to manufacturing and support.<br />
<br />
So what does all this mean?<br />
<br />
It means that Cloud computing is where IBM see's the future. Instead of owning computers as in the past with all the technology challenges, security challenges, and risk, organizations like IBM, Google Amazon, and others will become utilities selling computer resources as a service and providing a vastly superior service than owning your own systems.<br />
<br />
Just something to think about.Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-36405719986891079052014-01-12T09:08:00.005-08:002014-01-12T09:08:51.707-08:00How Effective are Your Systems?Many companies today are using systems that were built 20, 30, or even 40 or 50 years ago and modified constantly over time as the business has changed. <br />
<br />
It is time to stand back and take an objective look at the functionality and cost effectiveness of these systems. In all too many companies, both corporate and IT management avoid the thought of making major changes to their computer systems and adopt the infamous adage:<br />
<br />
<div style="text-align: center;">
<b>IF IT AIN'T BROKE DON'T FIX IT!</b></div>
<br />
Well, guess what? If your systems have been around for many years they are very likely broke and very likely costing you a fortune for systems that do not meet today's business requirements. Have you heard young people say why can't we have this, or why doesn't the system do that? The answer seems to be it just does... <br />
<br />
In today's world of constant change, you cannot leave your systems alone, but must at a minimum modify them to meet current regulatory requirements or other pressing and mandatory changes demanded by your business operations. How long does a change take to make? What does it cost you? What risk do you incur when modifying old systems. In this and the following series of blog posts, I will attempt to address some of these issues. My new book "Managing Computer Systems in the 21st Century" (<a href="http://www.lulu.com/shop/robert-cancilla/managing-computer-systems-in-the-21st-century/paperback/product-21351531.html">http://www.lulu.com/shop/robert-cancilla/managing-computer-systems-in-the-21st-century/paperback/product-21351531.html</a>) give you a step by step approach to assessing your systems.<br />
<br />
In my book I describe the following methodology for assessing your systems and formulating a strategic plan to insure your systems meet your needs. It includes the following elements:<br />
<br />
<b>IT Governance</b><br />
<br />
Make sure that you have a strong set of IT governance processes and procedures in place that insure that your board of directors (or owners) and your senior business executives are not only involved but in direct control of all system initiatives and expenditures. Your IT organization should be providing services, not dictating what should be done... The business must control all IT expenditures and initiatives...<br />
<br />
<b>Validate Your System Requirements</b><br />
<br />
Meet with key functional area (i.e. the head of sales, marketing, operations, accounting, etc.) executives and determine what their expectations of computer systems support for their area of the company are and should be. Additionally obtain their opinion of how well existing systems are meeting these objectives. Identify additional people within the executives organization and in the operational areas of the company to interview to drill deeper into the system requirements. The objective of this process is to collect requirements from the users as to what the systems should be doing, how well they are doing it, and what could be better or is missing.<br />
<br />
<b>Assess the Systems</b><br />
<br />
Look at the programming languages the systems were written in, the quality of the code, the number of defects reported, the severity of the defects, the frequency defects are reported, and the time and cost to resolve defects. Also look at the number of enhancement requests implemented over the previous year and how many are in a queue waiting to be implemented. If the queue is significant determine the reasons for the delay. <br />
<br />
Look at the computer hardware and the cost of the hardware required to support each system. In addition to the actual system and hardware, look at the cost of middleware such as database management systems application servers, etc. required to support the system. Look at the people required to support the physical environment and keep the systems running. <br />
<br />
Also determine if there any features in the systems that make them unique or provide a specific competitive advantage over other companies of the same type.<br />
<br />
<b>Assess Your IT Department </b><br />
<br />
Collect a skills inventory from the people who work in IT and evaluate the workload of each person and any objective metrics of quality and productivity. How many projects they have worked on, duration, defects, etc. <br />
<br />
<b>Evaluate your Assessment Data</b><br />
<br />
Based on the data you have collected determine how well each system meets the business requirements you have identified and how reliable each system is as well as the cost of the system. Look at the cost and value based on modern alternatives. <br />
<br />
The result of this assessment is to determine whether systems are cost effective and meet business requirements or need to be replaced or perhaps modernized. Additional work may be required if modernization is an option to determine the cost of modernization.<br />
<br />
All of this should result in a business centric strategic plan to modernize your IT organization and computer systems. It may involve outsourcing and replacing employees with external contractors. It may involve purchasing new systems or using open source software. It may also involve looking at cloud computing and moving from company owned hardware to reputable cloud provider systems. <br />
<br />
A key issue is who helps you do the assessment. You need someone who is objective and has no preconceived notions of the outcome... Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-65762289539450746952013-12-14T07:49:00.003-08:002013-12-14T07:49:28.507-08:00My New bookWell, Its finally done and publuished. My new book entitled "Managing Computer Systems in the 21st Century" is designed to guid business executives through the process to assessing and evaluating both their current systems and their IT staff to determine if both are meeting and supporting today's business enterprise.<br />
<br />
I've worked over two years on this book and brought almost all of my 45 years of IT management experience to this work focusing on what has happened to systems and IT organizations today. I've also taken a look at alternative means of supporting computer systems such as cloud, outsourcing open source. I have taken a look at the impact of social media, modern devices like tablets and smart phones and a key emerging technology: Big Data. <br />
<br />
I hope that people find this book valuable and use it to take an in depth introspective look at their IT organizations and the computer systems they are using today. <br />
<br />
It is available on Lulu.com -- <a href="http://www.lulu.com/shop/robert-cancilla/managing-computer-systems-in-the-21st-century/paperback/product-21351531.html">Click Here</a>Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-90221029928572441782013-08-11T13:46:00.001-07:002013-08-11T13:46:04.351-07:00Will NSA Spying Affect Cloud?I've recently read a couple of articles suggesting that customers will now avoid cloud computing because of the NSA (National Security Agency) forcing major commercial vendors like Microsoft, Facebook, Google, and others to provide access to their customer's data. <br />
<br />
I think these authors are trying to make a name for themselves with no solid facts to back them up and scare people in the process. <br />
<br />
The bottom line of all of this NSA spying is that if you have something subversive to say against the U.S. Government, keep it out of your computer systems and web sites! The United States government and most governments will not be going after your customer lists, trade secrets, etc. that if compromised could cause you damage! So even if the NSA scans your web sites or private data stored in a cloud based environment what is the risk? <br />
<br />
Governments like France, China, and others have been scanning their citizens data for years! The NSA which generally keeps an incredibly low profile has been monitoring world wide communications for decades now. They captured voice transfers, digital transfers, encoded transfers and decoded them, and have for years. Other governments have done exactly the same thing. So what is the issue? <br />
<br />
On a personal level, I do not like the idea that the NSA or any other government agency can look at my communications, but then again, I am not terribly worried as I am not saying anything that would cause me a problem. <br />
<br />
From a purist sense, I think it is a violation of our civil rights for NSA to look a a US Citizen's data without a court order, but the idea of scanning data sources, cloud data, etc. is not that big a deal. <br />
<br />
I think that as companies become more and more aware of the value of cloud computing which many are pursuing in lieu of their own local data centers they will continue to rapidly move to the cloud regardless of snooping by NSA or any other agency. I also think you will see new and stronger encryption and security measures implemented as a result of this and the threat that government decryption technology may get in the wrong hands. <br />
<br />
Cloud and security businesses will continue to grow at astronomical rates and many companies who have had in-house data center's for decades will abandon them to the cloud! <br />
<br />
I for one feel very strongly about the value of cloud computing. It is interesting but Thomas Watson's 1943 Quote "<a href="http://www.anvari.org/fortune/Famous_Last_Words/5_i-think-there-is-a-world-market-for-maybe-five-computers.html" style="background-color: white; color: #5378b4; cursor: pointer; font-family: lato, 'open sans', 'Lucida Grande CY', 'Lucida Grande', 'Lucida Sans', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; text-decoration: none;">I think there is a world market for maybe five computers.</a>" may finally becoming true :-)Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-58744318198938368292013-07-26T16:20:00.001-07:002013-07-26T16:20:08.621-07:00The lost art of User Interface Design?I have recently had to visit over 100 websites of different types, fill out forms of different types with all sorts of information required. I have been appalled at the horribly low quality of human engineering that goes into these designs in 2013! <br />
<br />
We have more powerful technology available to us today than we have ever had, yet web form designers seem to be stuck in the dark ages.<br />
<br />
Just today I visited nearly twenty different sites asking me for both personal information and info about my company. I dutifully filled out the forms, but was appalled when:<br />
<br />
I was not properly prompted for amounts in amount fields, dates in date fields, and none of these errors appeared until I hit the submit button! Then to add injury to insult all of my entries were cleared and I had re-enter everything. One side had a prompt "Enter amount as $100,000 annual fee" which you would presume wanted the text! I have no idea what they wanted as I tried everything I could think of and nothing worked... You guessed it I had to start over each time I hit submit...<br />
<br />
In today's world with AJAX, JavaScript, PHP, Java and other sophisticated web development tools there is no excuse for web forms that do not validate entries in real time and prompt the user for the correct formats. Heck with AJAX you can validate in real time against a remote database. <br />
<br />
One of my pet peeves is why web sites that require name and addresses do not do things like look up the City and State (for US locations) from the Zip Code? This is simple SOA call to the USPS web services. It makes life easy for the user and validates your address entry process! <br />
<br />
Do you recall when we eliminated "Systems Analysts" creating a morphed monster called a "Programmer Analyst"? We lost all of the business expertise of the "Systems Analysts" and got programmers who needed help finding their home after work! It appears that companies that once employed human factors engineers or at least people well trained in UI design have let those folks go and now have a trained ape developing web pages!<br />
<br />
We bring new and exciting technologies like speech recognition at unthinkable levels of quality, or Big Data analysis that can understand written posts on web sites and make perform incredible analysis of the written word to the point of determining if an author is male or female by their writing style. <br />
<br />
Wonderful new things every day, but we can't validate a number field? HELLO?Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com1tag:blogger.com,1999:blog-3560641696893490134.post-33575489182257512222013-06-11T12:47:00.000-07:002013-06-11T12:47:05.211-07:00Cloud Computing - Buyer BewareI feel that Cloud Computing is a huge part of the Next Generation in Modern computer systems. <br />
<br />
Cloud computing can mean many things depending on who you talk to. To me Cloud represents a web based system that runs on a vendor like LiquidWeb.com, RackSpace, or Amazon where you can rent dedicated or shared virtual hardware and middleware for a small monthly fee. The vendor provides and supports the servers, operating systems, communications, and in many cases much or all of the middleware needed to run your applications. A cloud hosting company generally has multiple geographically separate redundant data centers with fully replicated systems to provide uninterruptible availability.<br />
<br />
If you eat organic food, you know that there is no official definition of "organic"! Likewise, there is no official definition of "cloud". Therefore anyone who provides some kind of hosting or applications run on computers that they own on your behalf can claim to be "cloud" providers.<br />
<b><br /></b>
<b>Captive Proprietary Systems</b><br />
<br />
The biggest one claiming to be a "cloud" provider is Oracle who runs their application software on their machines and rents you the use of their systems. A similar company is Salesforce.com offering their CRM systems which are hosted on their computers. The downside of both companies is the fact that both your data and their applications are stored on the vendor's computers. If you wish to move to another vendor or application package you may have issues in retrieving your data and you most certainly will not be able to utilize their software. In other words you are locked into the vendor and their system. I've only mentioned two large vendors, but there are hundreds exploiting this model. <br />
<br />
Note that what I consider a viable alternative to the model described above is Software As A Service where you store data on your systems, but link out and run programs on the vendors systems creating a hybrid, but not true form of cloud.<br />
<br />
<b>Disaster Recovery Systems</b><br />
<br />
Some disaster recovery companies including huge companies like SunGard, VMWare, along with many others are offering varying degrees of what they call cloud computing. There are various limitations of these solutions. They are design to provide a disaster recovery solution for companies who have their own hardware.<br />
<br />
One company in the Southern United States specializes in supporting IBM Power Systems including support for the IBM i operating system. This company helps you replicate your IBM i data to one of their systems and assists you in switching to their system in the event of an emergency or disaster. The biggest limitation of this vendor is the fact that they have only one data center located in a major Southern city where many of their clients are located. It is entirely possible that a hurricane could destroy both the vendor's data center and their customers data centers leaving the customer completely under water with no back up system.<br />
<br />
A major disaster recovery system needs to provide geographically secure computing facilities that most certainly will not be affected by the same event that caused the customer's outage! Think hurricane, earthquake, tornado, and other natural disaster. <br />
<br />
<b>Hosting With No Failure Proofing</b><br />
<br />
Some small ISV's (Independent Software Vendors) of specialized software, especially companies who have specialized in OS/400 or IBM i applications written in RPG over the years are now claiming to be "cloud" providers and hosting customer systems on their computers in their single data center with no disaster recovery or realtime back up. These companies lack expertise in hosting as well as cloud or disaster recovery. You are most definitely putting yourself at risk by trusting a small ISV.<br />
<br />
<b>The Problem</b><br />
Cloud computing as I define it is running your own custom software, third party vendor supplied software, or open source software on computer resources that you rent from a reputable cloud provider. To meet my definition of reputable, the vendor must operate not less than two and preferably more data centers that are geographically dispersed to insure that a single natural disaster will not disrupt your business operations. <br />
<br />
Theres vendors should provide all of the hardware and software technical support necessary for you to keep your applications running so that all your users have to do is use an Internet browser or VPN client to access them. <br />
<br />
A viable vendor will provide real time data and application replication so that a user may access any computer where your application is located regardless of physical location. In fact the vendor's Internet routing should find the best path to the servers. Your applications may be running on multiple servers at the same time and replicating data between the servers. This approach will provide a 24 x 7 uninterruptible computing environment.<br />
<br />
These vendors will enable you to eliminate the people on your payroll that support your computer systems including but not limited to network specialists, computer operators, system administrators, system programmers, etc. often offering you huge savings in labor and benefits. Note these savings are not available at all in the alternatives described above.<br />
<br />
<b>Private Cloud and other Variants</b><br />
<br />
While I do not rule out the idea of private cloud, I do see that very few companies can benefit from this as a computer strategy. Generally, private cloud means building your own cloud environment and hosting applications for people within your enterprise. This often means hiring specialists or spend large sums on consultants with expertise in setting up a cloud based environment. You not only continue to support all of the people you currently employ, but will very likely increase your staff. <br />
<br />
<b>Buyer Beware</b><br />
<br />
Do not let cloud computing be an IT based decision! It is most definitely a business decision and must be carefully evaluated with an eye towards risk and cost savings. I am a strong advocate of publicly hosted private cloud environments hosted by a reputable vendor at a reasonable price and eliminating all of the overhead of your computer operations and technical services organization within your IT organization.<br />
<br />
Keep in mind that you may very well be able to pay for a switch to cloud in testing and test systems alone. With a could environment you create a test environment when a project requires it and you discard it when you are done testing. You pay only for what you use and the cost disappears upon project completion.<br />
<br />
If you are like many companies you may very well be buying computers, and licensing software for testing purposes and this equipment rarely ever goes away! The cost is generally absorbed into the project in substantial amounts. <br />
<br />
Be smart buy carefully and you will enjoy the benefits of cloud computing.<br />
<br />
<br />
<br />
<br />Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0tag:blogger.com,1999:blog-3560641696893490134.post-12328393156189264082013-06-11T12:10:00.002-07:002013-06-11T12:10:33.751-07:00Can Your Current Computer Systems Utilize Today's Computers Effectively?I just read a fascinating article in IBM Mainframe Extra supplement to the IBM Mainframe magazine. It seems that IBM is concerned about the fact that they can increase computing capacity by adding processors to their systems, but can no longer deliver significant increases in processor speed.<br />
<br />
For years customers have waited for the next set of processor chips which were significantly faster than the last set. While multi-processor systems have been around for about 2 decades, many business applications have been unable to take advantage of these systems.<br />
<br />
Many business applications are designed to single thread (process sequentially one instruction after the other) from start to finish and are unable to utilize multiple processors in a multi-tasking or multi-procssing environment as modern applications written in C, C++, or Java can!<br />
<br />
COBOL and RPG, FORTRAN, or PL1 applications process one instruction at a time until an IO event occurs when the program stops and waits for the the relatively slow IO event to complete. The program is then queued for the next available processor and continues to execute one instruction at a time until the next IO even or until the program completes processing.<br />
<br />
Modern applications consist of a number of small routines that can process in parallel without having to wait on other parts of the program. Various processes or tasks may complete and are then assembled into a final result, but the program can actually run its pieces on many processors.<br />
<br />
The older programs represent a problem for a number of IBM Mainframe and Midrange customers where workloads are increasing, demands for more processor speed are increasing, and yet programs are constrained by their architecture and programming technique in many cases.<br />
<br />
If you have not all ready made a commitment to move away from legacy languages and technology, the time is now. Develop a migration plan and move away from RPG, COBOL, PL1, etc.<br />
<br />
Read the Mainframe Extra article at: http://ibmsystemsmag.com/mainframe/trends/IBM-Research/cmos_slowdown/Bob Cancillahttp://www.blogger.com/profile/11395205314627225517noreply@blogger.com0