Tuesday, January 31, 2012

Free Microsoft Virtualization eBook



  • Why Virtualization ?
  • Server Virtualization
  • Local Desktop Virtualization
  • Remote Desktop Virtualization
  • Virtualization Management
  • Cloud Computing

Download free eBook on Virtualization Here

Thursday, January 19, 2012

The Business Model Canvas

Business Model Canvas

The Business Model Canvas is an interesting quick semi-formal modelling tool to create a public facing view of an enterprise or an organization.

It kind of covers why the business exists in first place and how it is related to other parties in its ecosystem.

Covers following areas of concerns:

  • Key Partners
  • Key Activities
  • Value Propositions
  • Customer Relationships
  • Customer Segments
  • Key Resources
  • Channels
  • Cost Structure
  • Revenue Streams

More at http://www.businessmodelgeneration.com

How a typical CIO organization will look on this canvas ?

Wednesday, January 18, 2012

Analyze your connections using NodeXL free

NodeXL Graph Gallery

NodeXL is a free, open-source template for Microsoft® Excel® 2007 and 2010 that makes it easy to explore network graphs.  With NodeXL, you can enter a network edge list in a worksheet, click a button and see your graph, all in the familiar environment of the Excel® window.

You can connect the NodeXL directly to your twitter, flickr or youtube accounts and analyze the connections.


Tuesday, January 17, 2012

TOGAF for absolute beginners


TOGAF is an aid which assist in the field of Enterprise Architecture. It provides guidelines, templates, models, framework, tools, methods, processes, etc which cover the entire lifecycle for Enterprise Architecture, right from setting up EA practice or function within an organization to creating and maintaining Enterprise Architectures.

Lets start with some facts:

  • TOGAF - The Open Group Architecture Framework
  • TOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework.
  • The most recent version is TOGAF 9.1 which was first published in December 2011.
  • First developed in 1995, TOGAF was based on the US Department of Defense Technical Architecture Framework for Information Management (TAFIM)

TOGAF 9.1 can be used for developing a broad range of different enterprise architectures. TOGAF complements, and can be used in conjunction with, other frameworks that are more focused on specific deliverables for particular vertical sectors such as Government, Telecommunications, Manufacturing, Defense, and Finance.

TOGAF assists in creating all four major parts of any Enterprise Architecture:

  1. Business Architecture
  2. Data or Information Architecture
  3. Application Architecture
  4. Technology Architecture

Overall TOGAF documentation is divided into 6 parts which also indicate the ways it helps as shown in above figure:

  1. Architecture Capability : Guides on how to setup EA practice or function within an organization and its roles & responsibilities.
  2. Architecture Development Method (ADM) : This is a core part of TOGAF and provides a step-by-step approach to developing and enterprise architecture.
  3. Guidelines & Techniques : Helps in adapting and customizing ADM based on needs.
  4. Reference Models : provides two architectural reference models, namely the TOGAF Technical Reference Model (TRM), and the Integrated Information Infrastructure Reference Model (III-RM) as foundation.
  5. Enterprise Continuum & Tools : discusses appropriate taxonomies and tools to categorize and store the outputs of architecture activity within an enterprise. The Enterprise Continuum provides a view of the Architecture Repository that shows the evolution of these related architectures from generic to specific, from abstract to concrete, and from logical to physical.
  6. Architecture Content Framework : describes the TOGAF content framework, including a structured metamodel for architectural artifacts, the use of re-usable Architecture Building Blocks (ABBs), and an overview of typical architecture deliverables.

Monday, January 16, 2012

Cloud Security Alliance Summit at RSA 2012

Cloud Security

Summit Agenda

Keynote: “Solving Cloud Access Complexity Through a Broker Model”

The recommended cloud security stack, standards, and operating frameworks have rapidly evolved into a set of production quality best practices for the Enterprise to use to engage each cloud provider. However, as scale is applied, managing 1-n cloud relationships and services across hybrid environments points to a brokered or intermediary model to solve security complexity, aggregate services, & add new value. Intel will present how a Cloud Access Layer & CSA standards managed by IT, Integrators or Provider “brokers” can solve complexity for user and application service interactions with the cloud.

Keynote: “Securing an OpenStack Cloud”

Panel: “Cloud Innovation - The Panel's View on the Next Generation of Cloud Security Devices and Services”

This panel will give attendees insight into next generation cloud security devices and services. This panel will feature experts who will examine the next iteration of innovation in Cloud Security and how these devices and services advance the industry.

Panel: “National and International Security Standards - The Viability of Cross-Jurisdictional Solutions”

Today’s security standards are based on historical, legacy information technologies and don’t necessarily address cloud computing environments in an effective manner. Attempts to update them are an improvement, but will we be able to create a single (or limited) number of standards that will be viable across borders and jurisdictions? This panel discussion will cover the current standards, their applicability and a look into the future of cloud computing standards.


Thursday, January 12, 2012

Design Philosophies of Apple and Microsoft

Metro Design

If you have a passion for User Experience and in particular Visual Design, this article is one of the best written ones.

Microsoft: Design for the time

Apple: Design for timelessness


Wednesday, January 11, 2012

Privacy Principles from Microsoft

Privacy Principles

Recently Microsoft released its Privacy principles based on which it provides privacy protections in software products and Internet services.

Here are they at high level:

  • Accountability in handling personal information within Microsoft and with vendors and partners
  • Notice to individuals about how we collect, use, retain, and disclose their personal information
  • Collection of personal information from individuals only for the purposes identified in the privacy notice we provide
  • Choice and Consent for individuals regarding how we collect, use, and disclose their personal information
  • Use and Retention of personal information in accordance with the privacy notice and the consent that individuals have provided
  • Disclosure or Onward Transfer of personal information to vendors and partners only for purposes that are identified in the privacy notice, and in a security-enhanced manner
  • Quality Assurance steps to ensure that personal information in our records is accurate and relevant to the purposes for which it was collected
  • Access for individuals who want to inquire about and, when appropriate, review and update their personal information in our possession
  • Enhanced Security of personal information to help protect against unauthorized access and use
  • Monitoring and Enforcement of compliance with our privacy policies, both internally and with our vendors and partners, along with established processes to address inquiries, complaints, and disputes

Loughborough University’s study on ‘Privacy Impact Assessments’ is an important work in this field.


Microsoft on Privacy

PIA Study

Tuesday, January 10, 2012

Leading Enterprise Architecture program as Change Management

Change Management is an integral part of any Enterprise Architecture program. Infact leading an Enterprise Architecture program as Change Management program can help in addressing lot of issues which are beyond technology and more related to culture and organization dynamics.

What better than Kotter’s 8 steps for leading the Change Management Program.

Kotter change management

Have you ever led change management programs ? Have you followed Kotter’s steps ? What has been your success rate ?

Monday, January 9, 2012

The Green Cloud


While each one of us are well aware of the biggest benefits of Cloud Computing which are Cost efficiency and Agility. There is an increasing consensus that technologies like virtualization, data center and cloud computing helps in efficient use of resources like electricity and in turn helps reducing carbon emissions. In summary helps IT shops becoming greener.

  • ICT as an industry contributes  over  2% to  the  overall  global  CO2 emissions,  a similar level as the aviation industry.
  • Recent surveys by Gartner show that sustainable business practices will be a top five priority for more than 60 percent of Western European and North American Chief Executive Officers in the year to come.

“Cooling  currently  accounts for  up to  50% of a  Datacenter’s power consumption, therefore there needs to be a new focus on how businesses can improve the efficiency in how they deliver their IT services which in turn would lead to reductions in both heat generated and power consumed”

So, what are your thoughts on this ? Beyond hardware consolidation, how can you design greener architectures ?

Calligo has some interesting thoughts on this. http://www.calligo.net

Wednesday, January 4, 2012

CIO and 2012 : What will keep CIOs busy

CIO Priorities

2012 is going to be a busy year for CIOs and their Teams. The trends which got introduced to enterprises in last 2 to 3 years are going to make a big push into the enterprises. The CIO have no choice but to embrace them.

The trends can be classified into following three broad categories:

  • Data & Insights : Coming from Business, this will require converting the tsunami of data getting generated into competitive advantage.
  • Cloud : Coming from Vendors and Technology suppliers, with promise of only good, is all about agility and cost savings.
  • Consumerization of IT : Coming from Employees, driven by mobile and online social revolution, this will require blurring the corporate IT boundaries.

In future posts we will get into details of each trend and some useful resources.