@entitworld
@enterpriseitworld
@enterpriseitworld R S 2 0 | PA G E S 4 0 | V O LU M E 0 2 | I S S U E 0 9
WWW.ENTERPRISEITWORLD.COM
FOR THE CIOs BY THE CIOs NOVEMBER 2017
ENTERPRISE
BLOCKCHAIN
CHANGING HOW
BUSINESS IS DONE With $ 2 Billionspent on R&D initiatives in 2017 in India alone, blockchain is the new buzz word for enterprises with attractive propositions like secure transactions and a tamper-proof architecture at its core... p16
INTERVIEW
HOW IT ENABLED THE WORLD’S LARGEST MID-DAY MEAL PROGRAM...p 22
CIO TALK
INDUSTRY 4.0 AND SMART FACTORY:
DIGITAL TRANSFORMATION FOR MANUFACTURING ..p 24
EDITOR’S LETTER
ENTERPRISE BLOCKCHAIN: A NEW PAGE IN THE CIO PLAYBOOK It is that time of the year again, when we
look back at the year gone by and what it has been and also gear up for the challenges and opportunities in store for the next year. With only a month remaining in 2017, we have been actively engaged in perhaps the most interesting times for Enterprise IT World so far. We now have a growing dedicated CIO editorial contribution and collaboration, helping us towards our mission of ‘For the CIOs and by the CIOs’. We have been actively involved in multiple CIO oriented engagements in 2017, with CIO200 being the gem in the crown. A number of future initiatives are in pipeline for our CIO community in 2018, which will help us stay true to our commitment towards the Enterprise IT ecosystem of the country. Apart from the exceptional wisdom shared by our reader community, we have focused on tapping the power of Blockchain technology for businesses. With the rise
NEXT MONTH SPECIAL
in cryptocurrencies and digital economies, Blockchain has emerged as a breakthrough technological concept which a number of advantages to businesses with strengths like automation, tamper resistance and improved security. To give you a slight glimpse into the recent domestic developments on the front, over $2 Billion was spend in R&D activities in India alone, with over 400 institutions showing interest with plans to leverage blockchain. The World Bank predicts the future will see 10 % of existing IT infrastructure being based on blockchain technology by 2025. Of course the concept is still relatively new, but a number of advancements have already been made, with improved logarithms to serve specific industry purpose and use cases. Current applications include smart contracts and smart transactions in sectors like banking, retail, and logistics and also, supply chain management and process monitoring across industries. The technology has been particularly attracting interest from Telecoms, BFSI institutions, IT/ITES and eCommerce organizations, but use cases have developed in industries as diverse as manufacturing plants, healthcare and medical research, smart city ecosystems and defense organizations and government networks. All this, and the fact that the Blockchain opportunity in India is barely tapped, makes the technology immensely interesting for the CIO community, whose industry knowledge and innovative mindset is exactly what is needed for Blockchain to fulfill its potential as a enterprise technology that can virtually transform the way business is done. Besides, we have exclusive CIOs articles and interviews in this issue which address digitization, security and infrastructure challenges. I further urge all my reader friends to feel free to write up on any topics influencing the CIOs, and send it to us. I hope this issue helps you refresh your IT knowledge and update on the latest trends and technologies in the market.
S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M
COVER STORY
SUPPLEMENT
Tech Trends for 2018
The Potential of AI
As 2017 comes to a close, we take a look at what the year had in store for the Enterprise IT ecosystem of India. With quotes from the Industry, veteran IT Leaders and CIOs, we will observe and analyze how the Industry is moving forward in terms of technology deployments across specific verticals and geographies. The story will also consider how the digital transformation landscape in enterprises and governments has shaped them to embrace 2018.
Artificial Intelligence as a technology has improved in leaps and bounds over the years. Empowered by new technologies like Big Data and Deep Learning, AI is setting new standards in terms of efficiency and rapidly growing its influence in business world through various applications.
PLUS
Interviews and Case Studies
Catch interviews, guest articles and case studies of recent applications from the Industry stakeholders, IT/ITES Vendors and IT leaders and CIOs from the Enterprise IT World CIO Community.
Send in your inputs to sanjay@accentinfomedia.com
4
ENTERPRISE IT WORLD NOVEMBER 2017
CONTENTS
Publisher: Sanjib Mohapatra Editor: Sanjay Mohapatra
VOLUME 02 | ISSUE 09 | NOVEMBER 2017 | W W W. E N T E R P R I S E I T W O R L D . C O M
Associate Editor: Chitresh Sehgal Designer: Ajay Arya Assistant Designer: Rahul Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary Visualizer: Ravish MARKETING Marketing Manager: Kajal Sharma kajal@accentinfomedia.com Marketing Manager: Rahul Ranjan rahul@accentinfomedia.com SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas
COVER STORY
New Delhi-110016 Phone: 91-11-41055458 E-mail: info@accentinfomedia.com
16
CHANGING HOW BUSINESS IS DONE ENTERPRISE BLOCKCHAIN
EDITORIAL OFFICE Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016,
With $ 2 Billionspent on R&D initiatives in 2017 in India alone, blockchain is the new buzz word for enterprises with attractive propositions like secure transactions and a tamper-proof architecture at its core.......
Phone: 91-11-41657670 / 46151993 info@ accentinfomedia.com Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New Delhi-110016
INTERVIEW /22
How IT enabled the World’s Largest Mid-day Meal Program at The Akshaya Patra Foundation.
COVERAGE
21
Infosec Global
“India’s Cybersecurity Experts converge at Infosec Global 2017”
6
ENTERPRISE IT WORLD NOVEMBER 2017
Phone: 91-11-46151993 / 41055458
MORE INSIDE
Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.
Editorial~ ~~~~~~~~~~~~~~~~~~~~~~~~~ 04 News~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 08 Tech Talk (CleverTap)~~~~~~~~~~~~~~~~ 38
CIO TALK
24
Rajeev Pradhan, Arshiya
“Industry 4.0 and Smart Factory: Digital Transformation for Manufacturing”
32
DIGITAL DIARY
Upkar Singh, FIS “Digital India: Challenges & Opportunities”
TECH TALK
36
Skillsoft
“How to stay relevant in a fastchanging World: Key trending skills for IT professionals”
Everything you need to know to stop ransomware.
Know Your Enemy
Stop Ransomware Now
Ransomware is a $1 billion dollar business that often evades traditional anti-malware.
Sophos InterceptX is proven to stop ransomware in its track by blocking unauthorized encryption of files.
Stop Ransomware with Sophos Intercept X The proven CryptoGuard capabilities in Sophos Intercept X block ransomware as soon as it starts trying to encrypt your files, returning data to its original state: • Protects endpoints from ransomware attacks • Automatically rolls back encrypted file changes with no loss of data • Stops both local and remote file encryption
For more details visit www.sophos.com Tel: +91 79 66216838 Email: indiamarketing@sophos.com
ITWORLD
ROUND UP
Indian Boardrooms don’t see Cyber security as a top priority B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M
Fortinet announced the findings of its new Global Enterprise Security Survey. The research reveals that despite high profile cyberattacks continuing to occur, almost half of IT decision makers (ITDMs) at 250+ employee organizations around the world, including India, still believe that business executives are not making cybersecurity a significant enough priority or focus. However, many IT professionals believe that the transition to the cloud as part of their organizations’ digital transformation will in turn make security a growing priority. Board members are not treating cyber8
ENTERPRISE IT WORLD NOVEMBER 2017
security as a top priority: 42% of IT decision makers in India believe that IT security is still not a top priority discussion for the board. This doesn’t seem to affect budgets since 74% of enterprises stated that they spend over 10% of their IT budget on security, which is a high investment. 89% of the surveyed respondents said their IT security budget has increased from the previous year. Now, IT decision makers feel strongly that cybersecurity should become a top management priority with 87% of the respondents saying that the board should actually put IT security under greater scrutiny.
D ATA BRIEFING
USD 70.0 million India’s external storage market witnessed a growth of 8.6 percent YoY in Q2 2017 Source: IDC
NEWS BRIEF // IT WORLD
HPE dethrones Dell as Storage market leader with a 32.4% share India Top 5 External Storage System Vendors, Q2 2017 Market Share (Vendor Revenue) 40.0% 35.0% 30.0% 25.0% 20.0% 15.0% 10.0% 5.0% 0.0%
Q2 2016
HPE
Dell Inc
NetApp
Hitachi
IBM
Q2 2017
Others
Source: IDC 2017
India’s external storage market witnessed a growth of 8.6 percent year-on-year (YoY) (in vendor revenue) and stood at $ 70.0 million in Q2 2017 as per IDC’s latest Asia/ Pacific Quarterly Enterprise Storage Systems Tracker, Q2 2017. Significant spending from banking and telecommunication verticals drove incremental growth in the external storage market. Banking, professional services, telecommunications, manufacturing and government continue to be the key contributors in Q2 2017. Increased acceptance of third platform technologies is pushing organizations to deploy new age storage solutions to address dynamic storage demands.
Increased uptake of All Flash Arrays (AFA), Hyper-converged infrastructure and Software defined Storage are the key technology trends witnessed in the market. In addition, all the global cloud providers and 3rd party datacenter players are investing heavily to tap the increased uptake of cloud solutions. In this situation, HPE displaced Dell Inc and emerged as market leader with a 32.4 percent market share in Q2 2017. Large deals from Banking and telecommunications drove the growth for HPE. IBM and Dell Inc witnessed a double-digit YoY decline while HPE and NetApp saw a high double-digit YoY growth in Q2 2017.
GLOBEL
Huawei unleashes commercial and tech innovations in SDN/NFV Huawei shared its latest commercial and technological innovations and progress at the 2017 SDN NFV World Congress October 9-13 in The Hague, Netherlands, and announced that it has deployed over 560 SDN/NFV commercial projects around the world. Based on hardware resource pooling, distributed software, and O&M automation proposed in 2016, Huawei’s All Cloud network solution architecture, integrated deployment, and ecosystem have matured due to relentless efforts. In a keynote speech, Yuan Bo, Director of Network Architecture Transformation at Huawei’s Carrier Business Group, said: “Up to the first half of 2017, Huawei has deployed more than 260 NFV projects and over 300 SDN projects around the world.” During the Congress, Huawei exhibited innovative solutions in many fields such as convergent telecom cloud, cloud core networks, and CloudEPN, as well as an All Cloud open ecosystem. The convergent telecom cloud is a cloud infrastructure platform built on the OpenStack open architecture that features unified O&M, cloud-andnetwork synergy, and ICT convergence.
EVENTS
30 NOV – 01 DEC 2017
Chicago, United States Intensive, two-day training in HIPAA compliance and what needs to be addressed for compliance by covered entities and business associates. HIPAA PRIVACY, SECURITY AND BREACH NOTIFICATION
30 NOV – 01 DEC 2017
Lisbon, Portugal Conference on latest technologies for data management, storage, analysis, including AI and machine learning as well as strategies. GLOBAL PHARMA R&D INFORMATICS CONGRESS
12 DEC 2017 11 – 14 DEC Ljubljana, Slovenia 2017 Explore prospects for introducing Blockchain in various sectors of public administration, finance and public life, stages of adoption of decentralized technologies. BLOCKCHAIN & BITCOIN CONFERENCE
Cambridge, United Kingdom Explore practical & successful implementation of AI in driving forward your business in 2017.
WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS-2017)
NOVEMBER 2017 ENTERPRISE IT WORLD
9
ITWORLD // NEWS BRIEF
VMware, SAP link up to streamline Enterprise IoT initiatives
S/HE SAID IT
GIDI COHEN,
CHIEF EXECUTIVE OFFICER, SKYBOX SECURITY
“Enterprises, governments . . . everyone is either embarking on or going through massive digital transformation, and this means new challenges for security because the attack surface of these organizations is growing more complex,”
“Public-private partnerships will
VMware announced collaboration with SAP, aiming to create an integrated Internet of Things (IoT) solution that supports the implementation and management of IoT use cases across devices, infrastructure, edge, cloud and application domains. The goal is to enable fast deployment, scalability and on-schedule execution of IoT projects. In a 2016 study conducted by IDG Research Services on IoT, 47 percent of companies considered technological expertise as an important factor when selecting an IoT vendor. This is especially important, because enterprises spend a lot of time in vendor selection and integration while implementing IoT use cases. Collaborating on an Enterprise IoT-Ready Architecture Enterprise IoT-ready architecture consists of an infrastructure plane and application
QUICK BYTE ON
FINANCIAL
10 ENTERPRISE IT WORLD NOVEMBER 2017
plane. The infrastructure layer refers to the IoT infrastructure itself along with the capabilities to manage and secure it, whereas the application plane analyzes insight-rich data from connected things to drive business decisions and processes. VMware is a leader in infrastructure and device management software. With its family of VMware Pulse IoT solutions, VMware will offer enterprises a consistent infrastructure plane for all their IoT projects and a management solution to securely onboard, configure and monitor ‘things’ on an ongoing basis along with support for on-premises capabilities. The recently announced VMware Pulse IoT Center will help simplify IoT complexity by managing all ‘things’ as one, improve the reliability and security of IoT infrastructure through accurate and real-time visibility of ‘thing’ health.
strengthen the global, ongoing fight against cybercrime, and help fill the resource gap for organizations.” M A X C H E N G , C H I E F I N FO R M AT I O N O F F I C E R , TREND MICRO
Alibaba Group announced financial results for quarter ended September 30, 2017: Revenue up 61% YoY at $8,285mil. Core commerce revenue up 63% YoY to $6,983mil; rev from cloud computing up 99% YoY to $447mil. Rev from digital media and entertainment upped 33% YoY to $721mil.
NEWS BRIEF // IT WORLD
Ixia extends visibility across entire Public Cloud spectrum
PwC India intros intelligent automation platform PwC India launched the Digital Asset Management Solution (DAMS)enables smarter, agile and more efficient management of IT infrastructure, applications and processes. DAMS delivers a single, unified interface for automating an enterprise’s IT operations that includes monitoring, event handling, ticketing and remediation. Designed to support a multi-cloud environment, the solution incorporates deep domain knowledge, machine learning and artificial intelligence in order to take proactive, precise and intelligent actions to keep businesses running at peak performance. Ashotoosh Chand, Partner, Digital
EXECUTIVE
Services, PwC India said, “Most organizations today are moving from a cloud-first to a cloud-only strategy to reap the benefits of enhanced speed, efficiency and reduced costs. DAMS is strategically designed to cater to these new requirements of customers. With an in-built, machine learning based engine, DAMS enables companies to focus on growing their business, as we ensure highly available IT systems with a focus on automatically managing and securing their core IT assets.” With DAMS, PwC India’s clients have witnessed significant benefits such as an improvement in Mean Time To Repair (MTTR) by almost 5X.
MOVEMENT Dilipkumar named as President of SAP HANA Enterprise Cloud
Ixia has further extended the CloudLens Visibility Platform to include support for Microsoft Azure, Google Cloud Platform, IBM Bluemix, and Alibaba Cloud, in addition to the existing support for Amazon Web Services (AWS), and for both Windows and Linux. As a result, Ixia CloudLens is now the first visibility solution to support all leading cloud platforms with multiple operating systems. IT infrastructures are transforming into a mix of self-hosted applications and cloud-based services on multiple cloud platforms. As business data is exchanged among onpremises applications in private data centers and applications running in multiple public clouds, end-to-end visibility extending across the hybrid environment is a challenge. The lack of granular access to cloud traffic, regardless of the cloud service provider, creates blind spots in the network which could compromise application performance or security, resulting in a degraded customer experience and increased network security risk. Ixia CloudLens provides comprehensive visibility across cloud environments—public, private, and hybrid clouds, and is the first to be delivered as a pure Software-as-a-Service.
Milan Kumar joins Automotive giant WABCO as Global CIO
Check Point appoints Harsh Marwah as Country Manager, India Kaspersky Lab ropes in Shrenik Bhayani as GM South Asia
Hans-Peter Klaey to lead and drive Global Sales for Hitachi Vantara
Saurabh Tiwari joins Overseas Infrastructure Alliance as Head IT
Capgemini appoints Delaporte and Ezzat as Chief Operating Officers NOVEMBER 2017 ENTERPRISE IT WORLD
11
ITWORLD // NEWS BRIEF
GE Aviation leverages Teradata to bridge gap between aviation ops and biz
GE Aviation and Teradata announced a strategic partnership focused on providing business outcomes driven by analytics for the world’s leading airlines. Through the partnership, GE and Teradata will jointly provide products and services to specified commercial aviation markets. This strategic relationship includes joint marketing, sales, services and support across both companies, forming a complete market-ready solution that can be implemented. By combining operations, assets and networks from GE Aviation with Teradata’s customer information, sales and marketing, and back-office support, it makes the entire ecosystem easier to deploy, scale and use. For example, flight disruptions can be actively managed by GE with customer experience being managed by Teradata. With the combined solutions, the process to manage disruptions is more complete by adding information about managing parts inventories, logistics, scheduling, and labor pools. Other powerful business outcomes resulting from the combined solutions range from improving flight operations and predictive maintenance to increased operational efficiencies and higher customer satisfaction. “For data and analytics, it became clear that Teradata excels at the size and scale required by a global airline,” said Andrew Coleman, chief commercial officer for GE Aviation’s Digital Solutions business. “By integrating our expertise in asset performance management and operations optimization, with Teradata’s ability to drive customer insights using massive amounts of data and multi-genre analytics, the aviation market will gain an analytic solution that delivers comprehensive insights.” GE Aviation’s Digital Solutions business brings industrial apps powered by Predix, GE’s platform for the Industrial Internet to the partnership. 12 ENTERPRISE IT WORLD NOVEMBER 2017
Cisco to digitize operations for The Akshaya Patra Foundation
As part of its global efforts to support nonprofit organizations around the world that help meet critical human needs, Cisco today announced an agreement with Akshaya Patra Foundation which will be accelerating digitization of their kitchens across 7 locations in India. Akshaya Patra Foundation is the world’s largest (nonprofit) mid-day meal programme serving wholesome food to over 1.66 million children from 13,958 schools across 12
INTERESTING
states in India. Digitization of Akshaya Patra kitchens and key offices will help them realize significant gains in productivity, scalability, and cost-efficiency and accelerate Akshaya Patra’s goal to reach 5 Million children by 2020. As part of this agreement, Cisco will deploy an enterprise-grade network and collaboration suite connecting kitchens and their offices by enabling end to end IT & process digitization.
TWEET
#Blockchain technology will change how we handle money and information in the future. #Cryptocurrency #Business #Entrepreneur #PersonalFinance Kevin J Donaldson@MLM_Success_ Shows how the focus on leveraging Blockchain is growing for payments and information sharing in the industry. Source: https://twitter.com/drharshvardhan
NEWS BRIEF // IT WORLD
Cyber-spies turn to supply chain attacks to target financial institutions
Kaspersky Lab unearths history of Cyber Espionage in APAC Equipped with detailed histories of previous cyber espionage attacks against countries in the Asia Pacific, Kaspersky Lab expose the current state of the cyber espionage threat landscape in the region. Kaspersky Lab’s cybersecurity researcher Vitaly Kamluk reveals that the global cybersecurity company has already published reports about cyber espionage campaigns waged against businesses and organizations in the APAC region since the 2010. “While modern hackers are not keeping records of their attacks, cybersecurity researchers are thoroughly documenting their tracks to understand their techniques and predict their next moves. After the infamous Stuxnet
worm in 2010, Kaspersky Lab experts have witnessed a significant number of high-profile cyber espionage attacks singling out countries in the Asia Pacific region,” says Kamluk, Kaspersky Lab’s Director of Global Research and Analysis Team (GReAT) in APAC. During the first Kaspersky Lab APAC CyberSecurity Weekend in Malaysia in 2015, Kaspersky Lab researchers had predicted the evolution of targeted attacks and expansion of cyber sabotage incidents in the region. The next few months saw Kaspersky Lab monitoring a wave of cyber-espionage attacks across APAC and th Far East regions, discovering cyber spies infecting all range of mobile devices and slowly targeting businesses and infrastructure.
From spying, stealing, and leaking state, military, and trade secrets, cybersecurity researchers at Kaspersky Lab discovered that cybercriminals operating in the region now aim for monetary gain as they infect banks in APAC countries. The global cybersecurity company said active Advanced Persistent Threat (APT) groups have successfully breached financial institutions in Malaysia, South Korea, Indonesia, Philippines, China (Hong Kong), Bangladesh, and Vietnam. “This year, we have monitored the tectonic shift in APT actors’ behavior. These groups who are initially data-hungry are now going beyond traditional cyberespionage. They added money-stealing on their attack menu as they hunt for vulnerable banks in the Asia Pacific (APAC) region which they can infect mostly through the rising epidemic,” says Yury Namestnikov, Head of Research Center, Russia at Kaspersky Lab’s Global Research and Analysis Team (GReAT). In 2017, Kaspersky Lab has been able to monitor active APT actors in the region, namely the infamous Lazarus group and Cobaltgoblinother groups that use Carbanak-style attacks. Lazarus is the cyber gang believed to be behind massive breaches including the Sony Pictures hack in 2014 and the multi-million cyber robbery against the Central Bank of Bangladesh last year.
Hero Electronix’s Tessolve acquires analog design business from AnalogSemi Hero Electronix announced the acquisition of the analog design business of Bangalore-based Analog Semiconductors. The acquisition was made through Tessolve, a Hero Electronix venture and a leading provider of engineering services. The
acquisition adds to Tessolve’s analog design services offering and strengthens its capabilities as an end to end provider of engineering services. Hero Electronix and its group companies aim to build engineering led businesses in technology and electronics. Hero
Electronix’s revenue at the end of FY 2017 stood at Rs 600 crores; Tessolve was a key contributor growing at 40% y-o-y. Hero Electronix and Tessolve lay strong emphasis on diversification, moving from offering semiconductor test engineering
services to becoming an end-toend solutions provider. Tessolve is now strongly positioned as a leading end-to-end semiconductor engineering solutions provider – from chip design, test and PCB engineering through embedded systems development.
NOVEMBER 2017 ENTERPRISE IT WORLD
13
ITWORLD // NEWS BRIEF
BOOK
SHELF
Hit Refresh: The Quest to Rediscover Microsoft’s Soul and Imagine a Better Future for Everyone
GLOBAL UPDATE
Digital payments volumes continue global surge in wake of new ecosystems
AUTHOR
SATYA NADELLA
PRICE
RS. 1268.00 (PAPERBACK) AVAILABLE AT
AMAZON.IN
About The Book
Global digital payments volumes are predicted to increase by an average 10.9 percent through to 2020, reaching nearly 726 billion transactions, according to the World Payments Report 2017(WPR 2017). Released today by Capgemini, a global leader in consulting, technology and outsourcing, and BNP Paribas, a global banking player and recognized leader in transaction banking and cash management, the WPR 2017
estimates that volumes generated by emerging economies will grow by 19.6 percent, or three-times the rate of mature economies. Emerging Asia, led by China and India, is projected to grow 30.9 percent in volumes. Worldwide non-cash wholesale transactions by corporates, mid-sized enterprises and public authorities are estimated to record a CAGR of 6.5 percent from 2015 – 2020, or more than 122-billion wholesale transactions.
Microsoft’s CEO tells the story about individual change, the transformation happening inside Microsoft, and the arrival of the most exciting and disruptive wave of technology humankind has experienced – including artificial intelligence, mixed reality, and quantum computing.
Key Features It examines how people, organizations, and societies can and must transform, how they must ‘hit refresh’ in their persistent quest for new energy, new ideas, and continued relevance and renewal.
Oracle welcomes first cohort of Startups in Delhi Oracle announced the first batch of startups for its Startup Cloud Accelerator program. Shortlisted from hundreds of startup applicants, the new cohort comprises interesting mix using AI, predictive analytics, automation, IoT, Chatbots, ML and VR 14 ENTERPRISE IT WORLD NOVEMBER 2017
technologies. The startups from Delhi: iNICU, RepUp, Original4sure, Digital Agents Interactive and ChatterOn. They are leveraging solutions across industries such as hospitality, pharmaceuticals, marketing, finance and cyber security. Startups will be
entitled to technical and business mentoring by Oracle, along with free Cloud credits, 24×7 access to co-working space within Oracle’s premises, as well as access to Oracle’s vast ecosystem of customers, investors and partners.
NEWS BRIEF // IT WORLD
MANAGEMENT
MANTRA
“Not taking risks one doesn’t understand is often the best form of risk management.” –RAGHURAM RAJAN, FORMER GOVERNOR, RESERVE BANK OF INDIA
TUV Rheinland fortifies India biz with Euro 2.5 Mil innovation investment
Nissan Motors selects Hortonworks to power its Data Lake
Hortonworks Data Platform has been selected by Nissan Motor Company to power its data lake. HDP, which is powered by Apache Hadoop and enabled by a robust ecosystem, was selected to build Nissan Motor’s data lake infrastructure and collect all data from across the business,
including driving data and quality data. As a result, Big Data can be utilized by Nissan in applications such as the analysis of battery usage in electric vehicles and quality management that requires cross-functional data analysis. HDP is industry’s only true secure, enterprise-ready open source Apache Hadoop distribution including Apache Spark and Apache HBase column-oriented database, which enables a modern data architecture by linking the data lake to the existing data warehouses. This enables enterprises to integrate diverse data from a variety of sources, and provide users valuable information required for decision-making.
Synology forays into Indian storage and networking market
Synology announces the partnership with Supertron Electronics, one of the leading distributors specializing in Enterprise IT facilities in India. With this association, Supertron Electronics will deliver Synology solutions to businesses of any size in need of advanced storage and networking services. “We’re excited to take this step forward into the Indian market,” said Mike Chen, Sales Director of Synology Inc. “With the growth of mobile users
and the maturing internet infrastructure, we believe this is the perfect timing to explore new opportunities with a new partner in India.” “Synology solutions have been phenomenal in many regions of the world. We’re pleased to be one of the missionaries of Synology products and help this company expand,” said Vibhor Agarwal, Marketing Director of Supertron Electronics Pvt. Ltd., “Supertron offerings are better and stronger now with Synology on our portfolio. Also, with years of channel experience, we’re confident in delivering world-class services in line with the quality of Synology products.” Supertron Electronics has started shipping Synology products and providing consultancy services in its 35 branch offices and 18 satellite branches in India.
TUV Rheinland India has expanded its footprint in India with a new 2.5 million Euro facility located at Electronic City in Bangalore. The new purpose-built 14,000 sq. mt. facility makes TUV Rheinland India the first international testing, training, inspection, consulting and certification (TIC) organization operating in the country to house all of its state-of-the-art laboratories under a single roof. This approach offers customers a complete solution that will reduce turnaround time and accelerate time-to-market. The laboratories include the photovoltaic lab, material testing lab, electrical safety lab, medical lab, battery testing lab and the Softlines testing lab. It is also home to the wireless IoT testing laboratory, which conducts radiated and conducted signal measurements as well as wireless alliance certification. The new facility features the latest technologies and innovations, including solar panels to power interior lighting. Each lab is equipped with the latest technology to address the needs of customers. TUV Rheinland India can accommodate products ranging from medical to photovoltaic, IT and audio-video products, home automation, home & kitchen appliances, batteries for IT products, wireless devices and automotive components. It is designed to be compliant with a variety of national and international accreditations, including the IECEE CB Scheme. Key capabilities include X-ray equipment testing, vibration and shock test, wet test and energy efficiency testing. There is a calibration lab for Electromagnetic Interference and Electromagnetic Compatibility testing and measuring equipment.
NOVEMBER 2017 ENTERPRISE IT WORLD
15
COVER STORY
ENTERPRISEBLOCKCHAIN:
CHANGING HOW BUSINESS IS DONE With $ 2 Billionspent on R&D initiatives in 2017 in India alone, blockchain is the new buzz word for enterprises with attractive propositions like secure transactions and a tamper-proof architecture at its core. Spearheaded by BFSI, CIOs from other segments have also started to embrace the technology, leading to early PoCs and deployments, and a promising future for Enterprise Blockchain. 16 ENTERPRISE IT WORLD NOVEMBER 2017
COVER STORY
running, resulting inblockchain initiatives such as research and training programs amounting to over $ 2 Billion in 2017. With a phenomenal ability to dramatically enhance the overall customer experience, blockchain can deliver secure, tamper-proof data, enabling near real-time distributed transactions across the enterprise ecosystem.For enterprises, it has the ability to automate processes by removing third parties and bottlenecks, streamlining processes within the organization and reducing the chance for fraud and error. A truly visionary concept, Blockchain has become the newest buzzword across IT teams and has already a lot of excitement building around it.
TRANSPARENT AND INFALLIBLE IN ESSENCE
E
BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM
very few years there comes an innovation that virtually challenges the way things are done, overshadowing norms perfected through the test of time. Born as the backbone to the world’s first cryptocurrency, Blockchain is one such elixir of technology, that has not just
given birth to an entirely new type of economy; it has hit the ground running, making inroads into a number of business and organizational areas of application. Institutions across the globe have started to realize thepotential of Blockchain. Governments, banks and power corporations have been leading this revolution at the enterprise level. A number of them have hit the ground
In 2008, an anonymous individual under the acronym Satoshi Nakamoto wrote the algorithm for the first distributed Blockchain when forming the concept of a new form of ‘digital’ currency – the Bitcoin – serving as a transparent, fault proof public ledger for all transactions. Essentially, blockchain secured Bitcoin transactions through a decentralized system, eliminating the need for a governing body or trusted intermediary, such as the financial industry authority or a bank. With unparalleled transparency, efficiency and security, bitcoin, and other emerging cryptocurrencies – initial applications of blockchain - slowly matured and gained a number of applications. It is perhaps important to mention, that due to theabsence of governing bodies, Bitcoin rapidly gained popularity and transactions involving illegal services and goods globally. However, as the technology matured to provide more and more legal payment uses, the focus shifted towards the underlying technology and its potential applications in different sectors. Kumar Gaurav, Founder & CEO, Cashaa – a company that leverages blockchain to make consumer-centric and affordable financial products, elaborates, “The advantage which initially brought everyone’s attention wasthe ability to remove any system based on centralized trust and can replace it with a decentralized system. Blockchain can enable enterprises to trust in a fixed set of principles and be sure they will be followed.” The fact that it is highly secure and virtually impenetrable by bad guys makes it an attractive proposition in a number of industries. “The technology is a mutually distributed digital ledger that uses encryption to make entries tamper-proof and permanent. The biggest appeal of blockchainis the way it supports the accountability, auditability, availability and integrity of the data it records,” notes Joseph Pindar, Director of NOVEMBER 2017 ENTERPRISE IT WORLD
17
COVER STORY
SUNIL MEHRA, VICE PRESIDENT-CLOUD PLATFORM, ORACLE INDIA
“By eliminating costly intermediaries involved in settlement processes, distributed ledgers can help optimize business
JOSEPH PINDAR, DIRECTOR OF PRODUCT STRATEGY – DATA PROTECTION, GEMALTO
decisions through improved visibility of information.”
“The biggest appeal of blockchain is the way it supports the accountability, auditability,
availability and integrity of the data it records,”
Product Strategy – Data Protection. With time, blockchain has started to find applications far beyond currency and banking, now attracting organizations from a range of sectors.
A GROWING INFLUENCE IN BUSINESSES WORLD OVER
Frequently seen as the mostleveragedapplication of blockchain are smart contracts, an encoded set of rules which are automatically executed by the system without any intervention possible. This structure and automation capability makes it attractive to banks. Banking giants, such as Barclays, have already implemented applications around the technology with the aim of reducing transaction costs and simplifying processes.A study by Santander found that Blockchain could reduce banking sectors’ infrastructure costs by $15-20 billion a year by 2020.India has been following suit after early runners like US, Europe and China with over 400 institutions planning to leverage blockchain. The World Bank predicts this will lead to 10 % of existing IT infrastructure being based on blockchain technology by 2025. In today’s markets, most customers have complex and time consuming processes to share data, carry out transactions with others and reconcile multiple sources of data across incompatible systems. Blockchain promises a huge leap on 18 ENTERPRISE IT WORLD NOVEMBER 2017
the existing standards. As Oracle India’sVice President-Cloud Platform, Sunil Mehra, points out, “With blockchain, users can post and maintain tamper-proof records with controlled shared access, such as in healthcare with patient records or in government with land/property records or issuance of identity documents, and university transcripts. By eliminating costly intermediaries involved in settlement processes, distributed ledgers can help optimize business decisions through improved visibility of information across the enterprise’s ecosystem. Customers can also reduce costs associated with fraud, regulatory compliance, and financial reporting.” Plans around its applications is gradually gaining momentum, with automation and data security being attractive propositions to IT leaders across enterprises, as Mayank Bedi, Head - Information Technology at VST Tillers Tractors comments, “Blockchain has the ability to increase secure data exchange in other industries as well. It also has the ability to make that data transfer simpler and easier between entities. With such wide-ranging possibilities, there is no surprise that blockchain has the potential to enhance the quality of service delivery while improving confidentiality and integrity of data.”
MAJOR CURRENT APPLICATIONS ACROSS SECTORS In the business aspect, blockchain is just beginning to witness real world applications, with corporations infusing large amounts on R&D for enterprise blockchain, a number that has significantly increased over the last 2 years. “Blockchain’ is a genius new concept that is set to resolve so many issues without the interference of middleware, opines P. Sarangi, Chief Information Officer, Exide Industries, “Different areas of application of Blockchain in enterprises are emerging every day in sectors like smart contracts and transactions in sectors like banking, retail, and logistics; supply chain management and process monitoring across industries.” Banks are exploring various use cases in areas like payments and settlement of currencies, asset registries, enforcement and clearing derivative contracts, regulatory reporting, KYC, AML registries, and improving post-trade processing services. A number of global banking giants have been racking up blockchain patents, such as Bank of America which has over 20 blockchain patents, and Bank of England, which has pioneered a Fintech accelerator and partnered with several blockchain companies. The Governments of the world have started building solutions around blockchain with aims to improve transparency and check corruption in governments worldwide. Blockchain has found significant use cases in smart cities as well. Some global examples include blockchain based land registry in Sweden and Dubai, government registries as well as balancing electricity markets and anti-corruption projects
COVER STORY
MAYANK BEDI, HEAD - INFORMATION TECHNOLOGY, VST TILLERS TRACTORS
KUMAR GAURAV, FOUNDER AND CEO, CASHAA
“Blockchain will enable new products such as peer to peer exchange and micro-
services, and lead to massive cost savings in existing industries.”
“CIOs should explore the potential of this disruptive technology and at the same time recognize
the limitations of the current generation of blockchain platforms.”
in UK, an E-governance platform in Estonia backed by blockchain and smart cities solutions in China. In healthcare, blockchain-based data that allows regulating the availability and privacy of health records. In agriculture, businesses have been testing PoCs for blockchain-driven ecosystems which handle tasks like paperwork, inventory and logistics of agricultural produce. Auxesis Group, a company building a blockchain framework to deploy in military organizations recently launched of India`s first Blockchain Lab together with IIT Bombay and University of Delhi, focused on researching blockchain applications in IoT, defence, regtech and fintech. In the power distribution and generation industry, solutions like smart meters can register electricity production/ consumption data in a blockchain, which allows for consumption of the surplus energy in a different location, providing credits or currency to the original producer. Some global examples from the sector include BP, Royal Dutch Shell and Statoil`s support of the Energy Web Foundation aiming to build blockchain energy applications such a peer to peer energy marketplace and electric NOVEMBER 2017 ENTERPRISE IT WORLD
19
COVER STORY
“I believe blockchain one of the greatest evolutions in the tech vertical and will reduce cost and turnaround time with utmost
secure transactions and find a number of enterprise use cases.”
PRIYABRATA SARANGI,
CHIEF INFORMATION OFFICER, EXIDE INDUSTRIES
vehicle charging schemes. Oracle recently joined Hyperledger to help enterprise customers realize the benefits of blockchain. As per Sunil Mehra, “By leveraging open sources and maintaining interoperability with open standards, Oracle is enabling customers to benefit from all opensource innovations, and avoid vendor lock-in.” Gemalto collaborated with Ledger, which is into security and infrastructure for cryptocurrencies and blockchain applications to deliver highassurance security infrastructure for crypto assets applications. Cashaa has an ambitious roadmap for India, as Kumar comments, “Eventually, Cashaa will be a comprehensive, blockchain- and AI based platform representing an efficient alternative to existing payment and banking systems, lowering financial inclusion barriers and providing financial services for the banked and unbanked worldwide.”
PROS AND CONS OF BLOCK CHAIN FROM ENTERPRISE POV As a technology, blockchain brings numerous benefits to enterprises. As Cashaa’s Kumar Gaurav explains, “This will enable new products such as peer to peer exchange and micro-services, and lead to massive cost savings in existing industries.” Kumar continues, “Any good, product or information can be settled directly, any document can be notarized and traced using blockchain, and the shared and automatically updated information across the network enables all its parts a better decision making and ability to obtain instant proofs on any transaction occurred.Furthermore, blockchain technology is flexible and can be adjusted to the individual requirements of an industry and use case, ensuring either transparency or privacy as required.” 20 ENTERPRISE IT WORLD NOVEMBER 2017
Although in itself, the concept of blockchain is pretty bullet proof, from the perspective of enterprises implementing solutions, blockchain based solutions might be slightly slower than traditional databases. As VST’s Mayank Bedi explains, “Because of nature of blockchain; it will always be slower than the centralized database. This means that while the transaction is being processed, blockchain has to perform the same activity like regular database with additional task like redundancy, signature verifications and consensus; and back-and-forth communication.” Some of the more perceived concerns revolve around and uncertain regulatory status; integration concerns as blockchain solutionswill require significant changes on existing systems. Finally, cost might be another big hurdle, “True, blockchain offers tremendous saving in transactions cost and time but high capital cost could be deterrent,” opines Mayank.
FOR CIOSLOOKING INTOBLOCKCHAIN IT leaders have started catching up with western counterparts with their own initiatives. As Oracle’s Sunil Mehra observes, “In India, we’re seeing a lot of interest from enterprise IT teams across all sectors. Initially there has been more traction in the BFSI industry vis-à-vis others. It’s still early days, with most companies trying to chart a strategic roadmap for blockchain. We’re in talks with several enterprise customers to help them in this journey.” With a number of enterprises in planning stages, the main aims that have been driving plans are more secure, smarter transactions, and improve efficiency and bottom line. As Exide Industries CIO P Sarangi tells us about his plans about the technology, “We are in the initial stages
of discussion for building solutions providing online information of battery health monitoring. I believe blockchain one of the greatest evolutions in the techvertical and will reduce cost and turnaround time with utmost secure transactions and find a number of enterprise use cases.” A great way to kick of their blockchain journey for any CXO would be to delve into cryptocurrencies as they are the first use cases of blockchain. Cashaa’s Kumar Gaurav opines, “My advice to CXOs is to not tryto draw a line between blockchain technology and cryptocurrency, which is not possible. Cryptocurrency should be embraced as an ideal, as the first step towards leveraging the wider potential of blockchain.” When playing with new technologies and looking at unproven use cases, the goal for CIOs should not just be about the business value to their organization but also exploring the limitations, and how the technology might be improved further. Innovation should always be on the agenda. “CIOs should explore the potential of this disruptive technology and at the same time recognize the limitations of the current generation of blockchain platforms. They should gain an understanding of the current state of the art by doing PoC, and implementing tactical, narrowscope deployments that solve specific problems,” as VST’s Mayank Bedi continues, “Next, while acting tactically, organizations should think strategically and conceptually about the longer term business models enabled by next-generation distributed ledger platforms that will facilitate their use.”
FUTURE OF ENTERPRISE BLOCKCHAIN IoT devices and smart cities will use blockchain couple with technologies like Artificial Intelligence to make secure and more apt decisions. More companies will begin to use blockchains to work with their partners and suppliers. Blockchain will be used to collect economic data (supply chain usage) and customer data. As per Mayank Bedi of VST Tillers Tractors, “Future in India is bright and I am confident that blockchain is the way ahead. Decentralized and hybrid apps will take over the market in the coming years.” Blockchains will provide accessible peer-topeer platforms that enable economic empowerment, greater efficiency, and secure information distribution. As Gemalto’s Joseph Pindar opines, “What’s clear is that the blockchain is the start of a digital turning point, and a crucial step in the way value and opportunity are created and distributed.” He continues, “It is time for businesses to embrace the technology in order to stay ahead of their competition.Blockchain is more than a buzzword. It is the future of distributed security.”
COVERAGE
INDIA’S CYBERSECURITY EXPERTS CONVERGE AT INFOSEC GLOBAL 2017
InfoSec Global hosted decision makers in the stature of MD, CEO, CIO, CFO, COO, GM etc. at the “InfoSec Global 2017”, the international InfoSec summit to deliberate on exchanging thoughts, knowledge, ideas, and case studies on cyber security.
T
he Government is devising many strategies for the benefit of citizens on cyber. Law enforcement authorities are doing their work at the ground level and enterprises taking lot of initiatives to implement tools, technologies, processes. The challenge is how to bind these all-together, how to aggregate efforts, consolidate and converge in order to make it meaningful for the society and civilization? InfoSec Foundation is trying to drive this across the globe hosted the International Infosec Global 2017 at The Park, Kolkata on 3rd November, 2017. Major topics were discussed in the event are cyber security issues in Bangladesh, Digital Forensics, creating new generation cyber militants, Cyber Economics, and much more. The event was conceptualized exclusively for creating a mutual platform for all the stakeholders who are engaged in Information Security. The event had witnesses array of speakers across industry. Dr. Sanjay Bahl, Director General, Indian Computer Emergency Response Team (ICERT) was the Chief Guest of the program. ShyamalDatta (IPS – Retd, Former Director – IB, Former Governor of Nagaland) ,Debasish Sen (Additional Chief Secretary-IT, Govt of Bengal), VineetGoel, IPS (Addl CP I, CISO-Govt. of Bengal) and Mr. Hari Kusumakar, IPS (Addl CP IV) joined him along with the Infosec Foundation Chairman in the gracious inaugural ceremony. Other eminent personalities like BratyaBasu (Honourable MIC-IT, West Bengal), Rama
Vedashree (DSCI-NASSCOM); Dr. B. M. Mehtre (IDRBT); Col. Inderjeet Singh (Smartcity Expert, Ex-Director – Military Intelligence at Ministry of Defense); Vivek Srivastava (ReBIT – Reserve Bank); Deepak Kumar (Digital Forensic Expert), B.M. Zahid-UlHaque (CISO-Brac Bank Bangladesh), Harish Agarwal (Partner, Ernst & Young), SomakShome (Director, PWC) had enriched the audience with their deep insight in the domain. Cyber Security Domain experts like ShrikantShitole (FireEye), Nitin Varma (Palo Alto Networks), Sudeep Das (IBM), Manuj Kumar (Symantec), Kapil Awasthi (Checkpoint), RishikeshKamat (Netmgic), Subramanian Udaiyappan (Cisco Systems), AkshayVerma (Global Insurance), ParthaSarathi Das (Tata tele Services) had also added substantial valued to the content of the conference. InfoSec Foundation intends to work as voice of citizen where we bring in all stakeholders together to create a more aware and responsive ecosystem. Connect and extend initiatives that have not reached the targeted audiences, find gaps and demand raise the silent voice so that it reaches the ears of policy makers and functionaries. Summits, CIO Roundtables, Print Journals, Cyber Security Help lines, Cyber Security Curriculum for next generation – these are few envisaged areas we have already started working in India, Bangladesh, UK and Africa. Ignite cyber security!! That’s the mantra. And to enkindle it, Infosec Foundation had taken the important responsibility through the International InfoSec Summit. The first summit
took place last year 18th November, 2016 and the same is followed by this year on 3rd November, 2017 in Kolkata. The event was important for the eastern eco system to leverage the opportunity to meet the best CYBER SECURITY EXPERTS from all across the subcontinent and gather some of the most tenacious knowledge regarding cyber security. ‘International Security in Digital India-Threat, Challenges and Opportunities’ was the theme for the 2nd International Infosec Summit in Kolkata this year. The program was designed for the leaders from the field of IT Infrastructure, Data Security, and Information Security. There were 250+ people attended the event with delegations from all leading corporates, enterprises, academia, government, law enforcement agencies, manufacturers, providers etc. 4th Edition of InfoQuest (the dedicated print journal of Information security) got unveiled during the summit. The print journal is working as a great tool as the mouthpiece of the industry in cyber security domain. The event strengthened the thoughts driven by Infosec Foundation with the overwhelming support from all corners and laid the foundation for more positive vibes towards upcoming Infovision(CIO Roundtable), InfoQuest (Print Journal), Infoconnect (Cyber Security helpline) and well as next year’s International Infosec Summit. Infosec foundation also recognized several individuals for their significant contribution in the domain. To read more features, go to www.enterpriseitworld.com/guest
NOVEMBER 2017 ENTERPRISE IT WORLD
21
VIJAY KUMAR,
DIRECTOR IT, THE AKSHAYA PATRA FOUNDATION
INTERVIEW
“A strong IT infrastructure is a basic requirement when it comes to data generated by millions of transactions
across a huge supply chain like TAPF.”
HOW IT ENABLED THE WORLD’S LARGEST MID-DAY MEAL PROGRAM Serving over 1.6 Million beneficiaries everyday in 13,759 schools in 32 locations across 12 Indian states, The Akshaya Patra Foundation is an iconic GOI initiative with an unprecedented scale. Vikar Kumar, Director – IT, opens up on how IT has plays a crucial role in the success of world’s largest mid-day meal program. Operating at such an unprecedented scale, how crucial are ICT technologies to the entire TAPF initiative? We serve over 1.6 million beneficiaries across 32 locations. The enormous task of supplying nutritious meals to over a million children across India every day is made easier by ICT. With all the areas of functioning depending on data and accuracy in data, ICT ensures that all processes are executed in a smooth manner. It is imperative that all the data points have authenticated data. At Akshaya Patra, we are using the best options available to achieve this, including Microsoft Platform on operating system, Office, and Enterprise Resource Planning (ERP). In helping us pull off this enormous task consistently, ICT is helping us 22 ENTERPRISE IT WORLD NOVEMBER 2017
do our bit in advancing social development. What are the technologies that you are leveraging in the organization? A strong IT infrastructure is a basic requirement when it comes to data generated by millions of transactions across a huge supply chain like TAPF. At Akshaya Patra, the supply chain is just one of the facets that make the whole initiative one well-oiled unit tirelessly feeding children and ensuring them a bright future. We have deployed Infrastructure-as-a-Service (IaaS) and migrated our servers, applications, ERP, storage, etc. to private cloud services. We have deployed Enterprise Resource Planning (ERP) for all transactions and Management Information System (MIS). We are
now introducing new HCM-Payroll Systems, covering complete HCM requirement, including Performance Management. Can you enlist some of the challenges that you faced and were able to overcome through new deployments? Lack of proper infrastructure was one of the challenges we faced as we scaled up our operations. As the servers were old and there was no proper storage space, it was difficult to expand and enhance any application despite the increasing IT load. Deploying IaaS and moving to private cloud services helped tackle this problem. Now we have private cloud with central servers at Bangalore and pan-India connectivity.
INTERVIEW
Similarly, in areas where internet connectivity is an issue, we have deployed multi-protocol label switching (MPLS) and an internet lease connectivity line to datacenters and branches for a seamless transaction on ERP and other software. Connectivity in remote branches though, still remains a challenge. Which other areas do you see where IT and Digital can be leveraged in social welfare? There is immense scope to leverage IT for social welfare. May it be finance and marketing or production, operations, and logistic, every area should have a data driven approach as data speaks for transparency. Any organisation that is data driven and transparent in transactions inspires
trust, which, in turn, translates into support for the organisation’s initiative. What are your future technology plans for The Akshay Patra Foundation? Are there any deployments in the pipeline? We are planning to implement Mobility Solutions to track school attendance, supply chain and delivery, requirement gathering and feedback from schools, and vehicle movement details. We are also in the process of implementing SALES FORCE CRM for all Fundraising Activity and common Data for all Donor Care and MIS. Plans are in the pipeline to use the AUDIT TOOL for conducting audit across 32 locations with Central Repository and MIS.
What is your advice to NGOs and Social Welfare organizations on how to leverage IT for the betterment of the cause? In its position as the implementing partner of the Mid-Day Meal Scheme, Akshaya Patra is a part of a remarkable Government Initiative which attempts to fight classroom hunger. The Government is well ahead when it comes to leveraging technology. The Aadhar initiative is an apt example of the same. There are lessons to learn from the implementation of the initiative and use of data to maximize the benefits derived by beneficiaries of various Government schemes. If NGOs and social welfare organisations can use data effectively, they will end up doing a lot of good for people in need. NOVEMBER 2017 ENTERPRISE IT WORLD 23
CIO TALK
INDUSTRY 4.0 AND SMART FACTORY: DIGITAL TRANSFORMATION FOR MANUFACTURING Smart factories, which will be at the heart of Industry 4.0 will take on board information and communication technology for an evolution in the supply chain and production line that brings a much higher level of both automation and digitization. 24 ENTERPRISE IT WORLD NOVEMBER 2017
CIO TALK
RAJEEV PRADHAN
VICE PRESIDENT - IT, ARSHIYA LIMITED
“Industry 4.0 includes cyber physical systems/advance robotics, the Internet of things, cloud computing, 3D
printing and cognitive computing, thus creating what is called a "Smart factory".”
I
ndustry 4.0 is a name for the current trend of automation and data exchange in manufacturing technologies. It includes cyber-physical systems/advance robotics, the Internet of things, cloud computing, 3D printing and cognitive computing. Industry 4.0 creates what has been called a “Smart factory”. As we all know, the first industrial revolution was the Victorian one that kicked it all off by moving from farming to factory production in the 19th Century. The second one ran from around the 1850s to World War I and began with the introduction of steel, culminating in the early electrification of factories and the first spouts of mass production. Third industrial revolution is known for shifting from analogue, mechanical, and electronic technology to digital technology that took place from the late 1950s to the late 1970s. The fourth industrial revolution is marked by digitization that is based on three major pillars. One is the Internet of Things and internet based business application linked to physical machine systems that has sensors, having the ability to collect data that can be used by manufacturers and producers. This data captured through various sources is used for performing next task or consumed for further analytics. This captured data is further distributed over the communications infrastructure and protocols that helps the industry feed to analytical or assembly working in highly hazardous environmental.
This kind of digital revolution will see implementations of future technologies, will have an impact and make sure that businesses are buzzing away at optimum efficiency, thirst for higher productivity and cost reductions and good decision making due to availability real-time data and reduce the dependency on human also reduce the health hazards. The above is possible only with superior connectivity, optimized process definition, transparency of activities and conditional clarity, proactive actions to ensure pre-requisites are in place, agility of actions and the systems having ability to analyze from available huge sets of data and produce insights that can be acted upon quickly. Smart factories, which will be at the heart of Industry 4.0, will take on board information and communication technology for an evolution in the supply chain and production line that brings a much higher level of both automation and digitization. It means machines using self-optimization, self-configuration and even artificial intelligence to complete complex tasks in order to deliver vastly superior cost efficiencies and better quality goods or services. Although there is no single smart factory configuration, there is likely no single path to successfully achieving a smart factory solution. Every smart factory could look different due to variations in line layouts, products, automation equipment, and other factors. However the some of the important components of smart factories that needs to be analyzed
while implementations are data, technology, process, people, and security. l Data: Is the most eternal part of Smart factory, as data drives the processes, algorithms, operational errors are identified feedbacks are given, also helps in predicting operational efficiencies and fluctuation in MRP. l Technologies: Smart factory all the factory plants, pumps, handling equipment’s are connected with sensor based central control system. This control units control all the possibly integrated control systems that manage the parameters to ensure maximum efficiencies and better control. l Processes: Implementation of smart factory helps in setting up the optimized, adaptable and running production process independently with self-optimized and best case solution. Additionally, the connectivity of the smart factory may extend beyond its four walls to include increased integration with suppliers, customers, and other factories l People: The change management plays important role in adoption of smart factory solution. Some roles may no longer be necessary as they may be replaced by robotics (physical and logical), process automation, and AI. But there is always need of some roles to mange IT/OT organizations, resulting in a realignment of roles to support new processes and capabilities l Security: As Smart factories implementation is harnessing on the connectivity and communication infrastructure. This increases the need to beef-up implement of cyber security. In the time to come we will see huge change in the way business compete. This will be driven by convergence of the digital and physical worlds riding on the information technology (IT) and operations technology that will bring transformation of the supply chain. Major changes from the sequential supply chain operations to an interconnected, open system of supply operations. This will bring advancement in digital supply network unlocking manufacturers several capabilities, We will see lot of horizontal integration through the various operational systems that power the organization, vertical integration through connected manufacturing systems; and end-to-end, holistic integration through the entire value chain.
CONCLUSION: Today’s world there is no chance that manufacturing can ignore the need of optimized Supply Chain for the organization. Hence we all know the importance of SCM in manufacturing. Thus Smart Factory discussion can’t be completed until Smart Logistics and Smart supply chain is discussed, something I will discuss in the next article. NOVEMBER 2017 ENTERPRISE IT WORLD 25
TECHNOLOGUE
INDUSTRIAL IOT FOR INTEGRATED LOGISTICS MANAGEMENT 26 ENTERPRISE IT WORLD NOVEMBER 2017
TECHNOLOGUE
D V SESHU KUMAR
ASST. VICE PRESIDENT – IT, ORIENT CEMENT LIMITED
Automation approach helps catapult business to next level by improving TAT as well as the capacity utilization of plants, Industrial IoT solutions such as the RFID and Sensors for making integrated logistics approach.
T
he world is changing faster than ever before. Referring to this change as a revolution, what is remarkable about revolution is the pace at which transformation is happening towards digitization. New Business models are arising, Customer needs are changing, competition is rising, product alternatives are exploding and the need for speed is ever accelerating. Rapid changes in the business dynamics, companies are forced to adapt the digitization. RFID (radio frequency identification) tags are going to play critical and important role in Industry process automation. Presently many Industries are adopting this technology like Automobile, Manufacturing, and Pharmaceuticals etc., for example Manufacturing this Industry can implement this solution for technology like Automobile, automating vehicle movement of in-bound Manufacturing, and and Out-bound etc., by RFID tagging to vehicles and integrating with the application Pharmaceuticals etc.” (ERP) will help in reducing the waiting time and document preparation and it makes easy movement of vehicles in the factory yard, seamless integration will also help in tracking the warehouse quantities, auto generation of required documents and reducing the Manpower to the large extent and increases turnaround time of vehicles.
“RFID tags are going to play a critical role in Industry process automation with many industries adopting
Logistics Management System Logistics Approach: Traditionally the vehicles that come for in-bound (unloading) and Out-bound (Loading) at the plants took a long time to complete the process. Manual interventions points are many. Security had to check the papers of each and every vehicle and vehicle may have to move many points for completing the activity for loading or unloading. A manual weighbridge operating in three shifts and human interventions takes longer duration than the actual process. This severely impact TAT (turnaround time). Because of higher TAT, impacts on turnaround capacity and plants capacity utilization. Freight component is having major share in production cost. Manual processes also threw up several other challenges like historical data of vehicles which couldn’t be checked, getting accurate data for Management Information System is a challenge, it will be very difficult to generate data to know how many vehicles are inside the plant and reason for long hours of waiting and waiting time in each check point etc. Integrated Logistics Management Solution: Automation approach helps comprehensively and catapults business to next level by improving TAT as
well as the capacity utilization of plants, Industrial IoT solutions such as the RFID and Sensors for making integrated logistics approach, this is going to be a smarter and cost-effective automation solution and going to play very important role in entire process, which dealt with inefficiencies at each check point, weighbridge and loading facilities. RFID based secured windshield stockers can be applied on the entire vehicle fleet and integrate with RFID readers, sensors, antennas, traffic signal lights, Display units etc. This entire solution also can be integrated with ERP application. Customized dashboards and reports will help in providing real time visibility about how many vehicles are waiting in a yard, vehicles inside the plant etc. Integration approach will help in removing the human intervention at each and every check point. Gate-in document will be generated automatically with the help of RFID tag and integration with ERP application, Weighbridge automation with sensors will deliver the desired impact by reducing the truck turnaround time and freeing up human resources. Integrated LED display units will guide the vehicles to reach specified loading points, Gate out procedure and documentation. Many times when it happens, vehicle drivers don’t know when their turn will come for loading or unloading. This will also help in providing status display, loading time and scheduling of vehicles with waiting time at yard. Auto mailer or SMS can be generated and sent to respective stake holders (drivers, Transporters & other stake holders at plant) to make them informed well in advance. It doesn’t mean that these technologies are new but adoptability of these technologies increase drastically. Logistics point of view one can track products from receiving at facility through client delivery, Quick location and controlling of stock levels, management of incoming deliveries, preparation of orders, packing lists, shipments, self-checkout and more. Warehouse Management Systems help eliminate costly human error that undermines. By leveraging the power of RFID tags, system helps retailers to take full control of merchandise, manage on-going replenishment of shelf stock, search for products in shops and in inventory in order to optimize sales. Checkout process can be automated eliminating waiting in line and reducing errors. Retailers can execute these activities in real-time basis. Analysis says in 2014, the world RFID market is worth US$8.89 billion, up from US$7.77 billion in 2013 and US$6.96 billion in 2012. This includes tags, readers, and software/services for RFID cards, labels, fobs, and all other form factors. The market value is expected to rise to US$18.68 billion by 2026. NOVEMBER 2017 ENTERPRISE IT WORLD 27
CXO SPECIAL
IN-DEPTH LEGACY SYSTEMS QUESTIONS FOR ENTERPRISE CXOS It is not unusual for the Legacy systems of an organization to be in sync with each other only at the monthly period end. This situation can exist where information systems are wholly in-house. What happens when portions of the business process are outsourced? GERARD BLOKDIJK,
CEO, The Art of Service | gerard.blokdijk@theartofservice.com
“Checklist helps you find out, lead and drive what actions must be taken in order to successfully integrate legacy data from earlier systems.”
M
any organizations utilize multiple diverse Legacy systems that are clumsily interfaced to each other. Many of these systems utilize batch processing and operate on different transaction cycles. A batch system that is designed to operate on a weekly transaction cycle is not much help in the face of a four day reporting requirement. Below you will find a quick checklist designed to help you think about which Legacy systems related domains to cover and essential critical questions to check off in that domain. 1. What is involved in Legacy systems? 2. How far is your company on its Legacy systems journey? Do a round table on Legacy systems and know what your objective is: 3. Is a credible migration plan (for data, applications, and Legacy systems phase-out) from the existing to the proposed environment presented? 4. What are existing methods, techniques and tool support to enable migration of legacy towards cloud-based environment? 28 ENTERPRISE IT WORLD NOVEMBER 2017
5. Is the system capable, or can it be made capable, of being interoperable and integrated with other systems? 6. Who will be responsible for extraction of the legacy data and will work with the vendor on transformation? 7. Is there an expectation that the migrated solution will be run in parallel with the legacy solution? 8. Can we understand the timeframe given replacing the current Legacy systems with the new systems? 9. Do different parts of the organization use different processes for the same function? 10. What are main practical motivations behind legacy migrations towards cloud? 11. Should there be a complete replacement of legacy mainframes and applications? 12. How much dependence affects the productivity of each activity? 13. How do we integrate the Legacy systems with the new system? 14. Do procedures exist that formalize the activity execution? 15. Are all Stakeholders supporting this vision?
16. What is the production time of the output? 17Scope – How much now and later? Application retirement Critical Criteria: Investigate Application retirement and do something to it: 18How do senior leader actions reflect a commitment to the organizations Legacy systems values? 19What tools and technologies are needed for a custom Legacy systems project? 20How to maintain Legacy system Integrity? Backward compatibility Critical Criteria:
ABOUT THE AUTHOR: Gerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.
To read more features, go to www.enterpriseitworld.com/guest
CIO SPEAKS
AJAY YADAV
HEAD – IT (NORTH), ARSHIYA RAIL INFRASTRUCTURE
“To protect against the unpredictable events disrupting your world,
your organization needs to be designed for constant evolution.”
ANALYTICAL IT: HOW TO TRANSFORM YOUR IT ORGANIZATION
The synergistic combination of cloud computing and machine intelligence – both of which are developing rapidly – will increasingly be able to perform just about everything that companies and individuals do. How should IT organizations prepare?
W
e have moved from the Internet era in the early 2000s to the cloud era today; however, we will soon transition into the Matrix era – the Matrix being the term the LEF uses to describe the intersection of multiple game-changing technologies that will drive significant change in the world in which we live and do business. The synergistic combination of cloud computing and machine intelligence – both of which are developing rapidly – will increasingly be able to perform just about everything that companies and individuals do, and much more. How should IT organizations prepare? How does this impact the IT organization? First, to protect against the unpredictable events disrupting your world, your organization needs to be designed for constant evolution. You will have to be able to sense, learn, and respond to situations quickly before you are left behind. Second, you urgently need to develop the ability to extract value from the technological evolution going on around you. These changes are more predictable but unremitting. Unfortunately, traditional “enterprise IT” is not
designed to optimally deliver either of these aims, but how the IT organization can achieve them over time by undertaking its own evolutionary journey. It’s clear that each organization’s journey will be different. They are each starting from a different position and are subject to varied “climatic” conditions that will impact the speed they need to evolve at, and the most pressing issues they need to resolve. The stages organizations have to progress through as well as the different routes they can take in order to get to the utopia state of an IT organization designed for constant evolution. Evolutionary stages and routes: STAGE 1 Situational awareness: It was found that many organizations are very much in the dark about their current situation. The mapping process enables organizations to better understand the competitive landscape they are operating in, and to see where to attack and where to defend. It also helps develop an improved set of data to make decisions needed for Stage 2. Stage 2 Preparation for constant evolution this stage is about developing the IT organization so that
it can operate with one foot in the new world while still managing the legacy. Your legacy systems can be toxic, constraining your business and preventing it from evolving, but there are ways to work with the legacy at the same time as embracing the new and driving innovation across the entire business. Stage 2 involves using specific but complementary operating models that work in harmony with each other. Stage 3 Exploiting the Matrix, by now you will have a plan for dealing with the toxic elements to be organizationally. You will be ready to embrace the new and can make the changes needed to fully exploit the Matrix yet still defend the areas of your business under attack. There are common “gameplay” strategies used at this stage of evolution to disrupt and to protect against disruption. The future IT organization With the pace of technology evolution and the disruption that will be brought by the Matrix, what is in store for the IT organization of the future? Many of the tasks we are doing today won’t be done tomorrow, and new tasks are coming that will require new types of skills and workers. This is both predictable and inevitable. As we enter the Matrix era, it is imperative that organizations are well on their way to being built for constant evolution. The IT organization is the place to start. About Author Ajay Yadav is an MBA from FMS, Delhi University, and Competent IT professional with 15 Year of experience in the areas of IT infra management/Security, ERP implementation in Education, Manufacturing and Logistics/SCM service industries. Currently associated with Arshiya Rail Infrastructure Limited New Delhi as Head –IT (North). NOVEMBER 2017 ENTERPRISE IT WORLD 29
INTERVIEW // ENTERPRISE SECURITY
RETHINKING YOUR SECURITY STRATEGY There is a gap between the firewall and the data-centric analysis and alerts received by the security team (the organization’s first and last lines of defense). Tracking user activity, especially connections between suspicious behaviors and privileged users, would allow organizations to close this gap.
SUDIPTA BISWAS
VICE PRESIDENT & CISO, PRIME INFOSERV
“It is time to incorporate identity into the organization’s overall security and, more specifically, breach prevention strategy.”
How critical is the Human Factor in the entire Enterprise security architecture? Most security professionals agree that people are the weakest link - so why do we continue to ignore this area of security? Or at best give it lip service through half-hearted security awareness programs? We all know that attackers will focus on the weakest link. For example, they do not 30 ENTERPRISE IT WORLD NOVEMBER 2017
target online banking directly. Instead, they attack the bank’s customers, using phishing techniques to force them into giving away their credentials. HR teams conveniently like to think information security is an IT issue. While cyber security leaders strive to maintain rigid firewalls, anti-virus or anti-malware software, and strict policy controls over company issued systems, many organizations struggle to reconcile data security with
human resource management policies. With industry-wide poor records of investment in training, finding a slice of the training budget to address human security can be a real challenge. Perhaps the security experts can save the day, but with the CISSP exam guide telling us that it is easier to prepare employees to withstand social engineering attacks than it is to set up a firewall, maybe not. The answer starts with bringing IT,
ENTERPRISE SECURITY // INTERVIEW
physical and human security together under a true information security management system. To be fair, this is something that the ISO 27001 can deliver, if addressed properly, by building on a proper assessment of risk. Why has Identity Management become a major cybersecurity related headache for organizations today? Historically, cyber-attacks targeted technology and exploited vulnerabilities in software, but attackers of the day have evolved to target human inadequacies and weaknesses. More attacks are coming from “inside” or through less secure partners or vendors. Significant breaches today are executed by people infiltrating the organizationby assuming identities or abusing insider privileges. Security teams that focus on “what” is happening and the layers of defense being breached, are constantly in a reactive mode. Reviewing logs produced by technology - firewalls, network devices or servers - isn’t making organizations any more secure. With this approach, cybersec team fails to prevent breaches and in turn, the addition of more data and complexity perversely prevents achieving the end result of protecting sensitive information. There is a gap between the firewall and the data-centric analysis and alerts received by the security team (the organization’s first and last lines of defense). Tracking user activity, especially connections between suspicious behaviors and privileged users, would allow organizations to close this gap. It is time to incorporate identity into the organization’s overall security and, more specifically, breach prevention strategy. In light of the nascent perimeter-less world, identity will increasingly be the primary factor for security teams. Identity data is pervasive, yet typically absent from the security world view. For security organizations, our corporate identity –the personal identity elements we bring to our corporate environment –and our behavior, are essential in building a picture of what is happening within -and beyond -the corporate perimeter, offering deep context to inform the security team on the appropriate response to potential threats and real attacks. There is an irrefutable lack of security awareness among Indian organizations today. How big is this security flaw? Organizations are putting their reputation and competitive advantage at risk by not addressing the ‘human factor’ in cyber security.Addressing security awareness has played a key role in preventing ransomware attacks. Case studies and
PoCs reveal that enterprises who implemented continuous securitytraining methodology have seen up to a 90% reduction in successful external phishing attacks and malware infections. The Cyber Edge Group released its fourth annual Cyber threat Defense Report and it came as no surprise that ransomware was a central topic of the study and the news isn’t very good.Of 1100-odd IT security professionalsspanning 15 countries and 19 industries who participated in the study, 61% said their organization fell victim to a ransomware attack in 2016. Of these, 33% paid the ransom; 54% refused to pay but were able to recover their data anyway; and 13% refused to pay and lost their data. With many ransomware attacks originating via email, end users make up a significant portion of the attack surface. Unfortunately, lack of security awareness training is putting organizations at greater risk. Where can cybersecurity vendors improve their support to customers in this regard? CybersecurityVendors should provide customizable security solutions insteadof selling just products. They should become a partner to the customer in their cyber security journey and support the customer in studying and understanding their threat Landscape, and suggest total security solutions best suited for them. Assisting the customer in conducting periodical gap analysis & risk assessment of business & IT processes & preparing remediation plan a continuous review of the security landscape. Cybersecurity vendors should assist a customer in establishing securityframework for the enterprise, which includes security risk management & governance framework. As lack of security awareness poses a major threat to businesses,vendors should also conduct periodical Security awareness programs for their customers. What are some of the ways organizations can address the evolved cybersecurity landscape? Organizations should move from protecting the perimeter to protecting data. Most organizations have approached cybersecurity by trying to put increasingly sophisticated defenses around their perimeter. The reality is that a motivated attacker will find vulnerability or an employee may inadvertently create an opening. Progressive corporations are reorienting security architectures from devices and locations to roles and data. Accessing corporate data or applications will require authentication of an individual’s identity. Security will soon become a fundamental design decision in underlying technology architectures. Since a malicious systems or database adminis-
trator can be much more dangerous than even the most careless end user, organizations should limit the number of people who can access production systems and data, preventing not only application developers but also infrastructure architects and engineers from touching “live machinery.” Another new trend is that organizations are conducting simulated cyberattacks to identify unexpected vulnerabilities and develop organizational muscle for managing breaches. Some have built sophisticated capabilities to aggregate and analyze massive amounts of operational data (such as e-mail headers and IP traffic) to uncover emerging threats. In addition, they must rethinkcybersecurity before entering new geographies, a key part of the business case for major initiatives or newproduct introductions. Finally, what should be the way forward for organizations as they rethink their security strategy? Businesses need to build cyber security awareness strategy for all stakeholders. Cybersecurity must be addressed at the senior most levels and be a key part of business strategy rather than just technology governance. CISOs should report security issues to the Board’s risk committee rather than the technology committee. In many organizations, security has been treated primarily as a technology issue. Most senior corporate leaders have too little an understanding of the IT security risks and business implications to discuss the trade-offs for investment, risk, and user behavior. As companies embark on their journeys of digital transformation, they must make cybersecurity a top priority. We have to maintain confidentiality, integrity, and availability of data in all these contexts. They need to refresh security strategies to address rapidly evolving business needs. Corporations need to acknowledge that it is an ongoing battle. New digital assets and mechanisms for accessing them simply mean new types of attacks. The critical piece in this approach is the organization’s ability and capacity to understand the full scope of identity - who is the person behind any given device, and if they are behaving abnormally?Quality security awareness programs enhance the overall security posture for any organization. Various security survey results indicate that Humans are weakest link in cybersecurity and awareness in this regard helps in up to a 90% reduction in successful external phishing attacks and malware infections; 64% average improvement in phishing vulnerability; up to 50% reduction in business risk and impact related to end-user security and up to 50x return on investment. NOVEMBER 2017 ENTERPRISE IT WORLD
31
DIGITAL DIARY // FIS
DIGITAL INDIA: CHALLENGES & OPPORTUNITIES In the journey towards ‘Digital India’, the Government is attempting a transition from closed, top-down, bureaucratic, and paper-based transactional models towards online, integrated digital offerings that encourage a new kind of interaction between citizens and the state. UPKAR SINGH,
Director Information Technology, FIS
“Positive citizen perceptions around access to government through both traditional and digital channels provide an excellent and distinguish starting point for governments.”
T
he Digital India programme is a flagship programme of the Govt. of India with a vision to transform India into a digitally empowered society and knowledge economy. In the journey towards ‘Digital India’, the Govt. is attempting a transition from closed, top-down, bureaucratic, and paper-based transactional models towards online, integrated digital offerings that encourage a new kind of interaction between citizens and the state. DIGITAL India may also be re-defined as the DIGnity and vITALity of India. The OPPORTUNITIES of DIGITAL INDIA in word-form of DIGITAL... [D]istinguish [I]ntegrated [G]lobal [I]ntegral [T]ransparency [A]ccessibility [L]ucrative [D]istinguish Positive citizen perceptions around access to government through both traditional and digital channels provide an excellent and distinguish starting point for governments. Governments
32 ENTERPRISE IT WORLD NOVEMBER 2017
FIS // DIGITAL DIARY
with resources to invest can commit to improving access and engagement with digital. Those that must cut costs must do so in a way, that builds in digital capacity while locking in strategic gains to date. Either way, digital has the inherent potential to create its own efficiency gains, a clear benefit in any funding environment. [I]ntegrated Agencies have made various inroads in breaking down organizational and process silos to better integrate citizen service, and technology has played a large role in facilitating this. As digital programs mature, it will continue to be important to create consistent “one-stop-shopping” service experiences for citizens. Like for Smart cities - In order to be a ‘true’ smart city, cities need to have an integrated approach whereby various projects are connected and most of all the data and platforms are glued together in order to achieve all the benefits smart cities make possible. [G]lobal What if India had not invented the zero? Perhaps computers would not have seen the light of the day and the world would not be connected through the information technology. With the Digital India programme, India may have an opportunity to inspire and transform the world yet again. Sixty years ago, South Korea decided to change itself in a similar fashion and known as ‘The Miracle on the Han River’, which has helped South Korea to sustain its leadership position across the world. Digital India has the potential to unleash a similar miracle in the land of Ganga. [I]ntegral The concerns for end customers: people, communities, and clients must be integral part of this Digital India programme because they are setting the expectations for digitally-enabled services. The transformation required for digital service delivery at the People level is a transition from managing people to managing the things that help or hinder them. [T]ransparency Although transparency seems to be on the agenda of most governments, results are diffuse and do not reveal a consistent implementation of this principle. Blockchain is a new, powerful tool that is already shaping the future of the Internet with simple, safe and secure transactions. Adopting blockchain technology, Dubai stands to unlock 5.5 billion dirham in saving annually in document processing alone - equals to the one Burj Khalifa’s worth of value every year. [A]ccessibility While many citizens are connected today, the digital divide is still a critical concern in countries as diverse as a country like ours. In a recent survey — 56 percent of respondents
think that digitization of government will create a service gap for those without Internet access or for citizens who have not yet embraced digital interactions. Governments have a lot of work to do here. Digital government must be about fostering greater inclusion with programs that go beyond implementation to account for driving lasting adoption among target audiences with unique demographic profiles. [L]ucrative The opportunity of new/lucrative approach which encourage citizen to engage in Digital initiatives. To build effective digital government services that are consistently used by citizens, governments must avoid the trap of simply replicating and digitizing old processes that are inherently ineffective. Instead, when going digital, governments must take a holistic look at existing processes and build online services with a differentiated approach that takes into account, and full advantage of, the entire spectrum of benefits of the online channel.
THE CHALLENGES OF DIGITAL INDIA IN WORD-FORM OF DIGITAL... [D]NA [I]nfrastructure [G]o-Cashless [I]mplementation [T]hreats [A]wareness [L]iteracy [D]NA Digital is not yet in the DNA of many state governments. Just as eGovernment performance is not revolutionarily improving, the policy priorities of the consecutive eGovernment action plans have not changed so much. In all honesty, we could doubt to what extent public sector has really advanced over the years in acquiring an attitude that can deliver on the potential of digital. [I]nfrastructure The biggest challenge faced by Digital India Programme is the slow/delayed infrastructure development. Spectrum availability in Indian metros is about a tenth of the same in cities in developed countries. Also, the digital divide needs to be addressed through last mile connectivity in remote rural areas, as currently over 55000 villages remain deprived of mobile connectivity. [G]o-Cashless The Gaps in India’s Cashless Infrastructure. While the cashless initiative in India is spearheaded by the government, all development and design work being undertaken by all participants needs to follow a thorough testing process to plug security and fraud gaps. Some of the real-world challenges that financial institutions are facing
from a security point of views stem largely from the fact that holistic security of the ecosystem was not given as much emphasis as functionality in the initial roll-out phase. [I]mplementation This point will come into picture when you have allocated the required resources and material but when it comes to implementing them, most of them will be hesitant to change. People are accustomed with years of same practices that they are not ready to change. The number of automated services has remained stable since their first roll-out. The use of legacy software likely has huge complications for the modernization of eGovernment services and can hinder full implementation of this programme. [T]hreats Apart from many Cyber threats, for the internet of things (IoT) to become a business enabler in India, security considerations must be adequately addressed. At the recent IoT Congress event in Bengaluru, where Deloitte and NASSCOM presented in a new study that India now has 41 IoT use cases, including smart manufacturing supply chain, service operations, transportation / logistics, healthcare, smart governance and smart utilities. Regulators have worked toward including data protection and privacy as part of an IoT framework. For instance,MeitY and TRAI have come up with an IoT framework that mandates certain data security measures. [A]wareness There continues to be a general lack of awareness in Public Service Departments of how digital technology changes public service design to deliver agile, easy-to-use, consumerized services at lower cost and in a way, that emulates our daily experiences in the private sector. The challenge is to build an understanding amongst public officials of the radical impact that common service platforms might have on their operations and organizational models. [L]iteracy Digital illiteracy is prevalent in most of the towns and villages in India. Cities have adopted digitalization but limited to certain extent. Full-fledged digitalization is cashless transaction on daily basis, use of internet services to get govt certificates etc. This requires administration changes and changes in public mentality. Improving IT literacy is a great task ahead because for the mission to become successful, it is necessary that mass people must know how to utilize the digital services. So, it’s a team work which includes citizen’s responsibility and support to the new system. Now, it is only we need to move Forward… And the only time we should ever look back is to see how far we have come. NOVEMBER 2017 ENTERPRISE IT WORLD 33
INFRASTRUCTURE
VIKRAM K,
Senior Director, Datacenter and Hybrid Cloud, HPE India
“CI reduces operational complexity for the IT department, which in turn lowers the total cost of ownership by reducing capital expenditure and operating expenses.”
34 ENTERPRISE IT WORLD NOVEMBER 2017
INFRASTRUCTURE
GOODBYE LEGACY SYSTEMS, HELLO “COMPOSABLE IT” Enterprises need to adjust their IT system to become more flexible so that they can automatically adapt to changing market demands without disrupting or delaying the organization’s workflow. This is Composable Infrastructure.
W
e all remember how much fun it was to build stuff with Lego blocks, right? Imagine how much more fun it would be if the blocks could duplicate themselves whenever you wanted, and if they were programmed so that you could quickly construct, say, an ocean liner, then deconstruct it at the touch of a button and turn it into a skyscraper. Now imagine if you could do something similar with your IT infrastructure. Think disaggregated, fluid pools of compute, storage and network fabric that you could quickly assemble and re-assemble to meet the exact needs of whatever application you want to deploy. You could spin up resources for a mission-critical business transaction application or a new cloud-native app with equal ease, all from the same pool of fluid resources. In most cases, today’s traditional infrastructure isn’t up to the task of providing speedy, flexible service. It lacks the capacity to ramp up or down as business units start and stop projects—sometimes at a moment’s notice. Traditionally, it has taken IT departments weeks, or even months to plan and then to install new server hardware to accommodate the needs of internal business units. If data is the new currency, businesses will need to make a digital transformation to monetize that data they are using. They will need to adjust their IT system to become more flexible so that they can automatically adapt to changing market demands without disrupting or delaying the
l It covers multiple priorities simultaneously – With CI, management no longer has to choose between funding legacy applications that are business-critical and investing in new apps that can lead to innovation and growth. The CI environment is robust enough to support both at a lower cost than legacy systems. l It moves IT from being a cost center to becoming a strategic business partner –With CI, IT has the tools to work with the business units to find creative ways to lower costs while improving service. l It allows more efficient management of resources – Apps have different requirements to run optimally. For example, some apps require high-performance storage, while others have low-performance requirements. CI’s fluid pool provides the right resources for an app at any one time, eliminating the need to overprovision as would you need to do in a traditional model.
CASE STUDY: CI’S REALWORLD BENEFITS organization’s workflow. This is Composable Infrastructure (CI). Essentially, CI is a new category of infrastructure to where compute, storage, and networks become a shared resource that can be accessed anytime, anywhere. IT department can now be enabled to quickly “compose” or recompose its resources based on the needs of the application. This provides the business with agility that it needs to decrease the overall expense of infrastructure and increase the speed of bring new services to market. Here’s an example: Traditional IT infrastructure made up of compute, storage, and networking usually run on separate platforms. This division creates islands of hard-to-manage, underutilized resources. In contrast, CI pools resources perform much like a cloud computing model. When a business unit requires IT resources, a software developer can simply request the infrastructure capacity needed for a project by submitting a template request. This capacity then becomes available in minutes. When the business unit no longer requires the infrastructure, that extra capacity gets “recomposed” and returned to the pool. This results with the IT department making greater utilization of the existing infrastructure and eliminates island or underutilized equipment.
HOW COMPOSABILITY BOOSTS YOUR ROI The beauty of CI is that it reduces the operational complexity for the IT department, which in turn lowers the total cost of ownership by reducing capital expenditure and operating expenses. Here’s how:
HudsonAlpha Institute for Biotechnology is a creator of one of the world’s first genomic medicine programs designed to diagnose rare diseases. It wants to help eradicate childhood genetic disorders, cancer, and a host of other maladies but was constrained by IT. The organization needed a more robust and flexible infrastructure, one that could handle the massive amounts of data that genomics research produces. HudsonAlpha generates more than one petabyte of data per month—roughly four times the size of the Library of Congress’ database. Furthermore, as a nonprofit, it had to be able to crunch all this data while watching costs. Part of the problem was that genomics algorithms and apps require extremely powerful computers. With roughly 800 researchers and scientists using the IT system to generate increasing amounts of genomics data, McNully knew the organization’s traditional infrastructure no longer had the firepower to meet the company’s needs so he turned to a CI solution offered by Hewlett Packard Enterprise to address its challenges. Since deploying CI, their organization can now quickly recompose their infrastructure to meet the needs of the business. In addition HudsonAlpha’s storage capacity increased and its cost per terabyte was reduced. Now HudsonAlpha is positioned for a strong IT future with an infrastructure that can grow and flex as the organization does. And more importantly the organization continues to be on the cutting edge to finding cures for rare genetic diseases.
NOVEMBER 2017 ENTERPRISE IT WORLD 35
TECH TALK
HOW TO STAY RELEVANT IN A FASTCHANGING WORLD: KEY TRENDING SKILLS FOR IT PROFESSIONALS
In a fast-changing world where digital technologies are disrupting industries across the board in a very fundamental way, employers need people who can adapt themselves quickly to their dynamic industry environment, and keep themselves relevant for sustained business profitability.
T
In a fast-changing world where digital technologies are disrupting consumer lives and industries across the board in a very fundamental way, you need to be in sync with the times. That means embracing change–and constant, rapid change at that–wholeheartedly, and being open to unlearning existing skills, and acquiring new ones. Be it artificial intelligence (AI), robotics, Internet of Things (IoT), cyber security, Big Data and analytics, or cloud computing, you must aggressively re-skill yourself around these areas to remain relevant in a volatile job market. Here are some core IT skills you should build from scratch or augment further going forward: l Micro-services: The conventional enterprise paradigm of building large monolithic IT applications is on its way out. Companies are now starting to embrace the micro-services software architecture to scale their systems and infrastructure in line with dynamic business requirements and lower total cost of ownership (TCO). For you to be able to capitalize on this emerging trend, you will need to build expertise in how to develop applications as suite of small services, each running in its own process and communicating with lightweight mechanisms(loosely coupled). They are organized around business functions and treated as products and not as projects with decentralized governance and data management along with focus on automation. Familiarity with Agile and DevOps methodologies will certainly come in handy on this front, enabling you to develop self-contained, flexible modules that address a specific business requirement independently. l DevOps:As companies look to reduce the time to market for their products and services in an on-demand digital economy, DevOps-linked skills are in big demand. Specifically, you should focus on processes and methodologies such as Agile, Lean/Kanban, Continuous Integration, TestDriven Development (TDD) and working in cross-functional teams that sharing responsibility for system. Goal of improve deployment frequency, faster time to market with Lower failure rate creating continuous software delivery process. According to the 2015 State of DevOps Report, “high-performing IT organizations deploy 30x more frequently with 200x shorter lead times; they 36 ENTERPRISE IT WORLD NOVEMBER 2017
have 60x fewer failures and recover 168x faster.” Big Data and Analytics: Companies are struggling to make sense of the unprecedented volumes of data they generate. They need people who can extract actionable business insights from the goldmine of structured and unstructured data being collected. Therefore, you must build indepth skills in programming (Scala, Python, R), Quantitative, understanding business outcomes , technologies like Hadoop, Hive, Cassandra, Apache Spark and data visualization using D3.Js, Tableau and Qlikview. l Cybersecurity: A recent Intel poll of companies found almost 82% of the respondents citing a significant lack of talented professionals who have strong competence in cybersecurity processes and methodologies. As hacking increasingly inflicts serious business damage across industries, enterprises are seeking experts in intrusion detection, network security, secure software development, penetration testing and attack mitigation. l Cloud: With companies increasingly migrating their IT infrastructure and data to the cloud, there is a big demand for skills associated with cloud services. For instance, you should build competency in cloud platforms like Microsoft Azure, Amazon Web Services, Google cloud, beside acquiring vendor and supplier Management skills. Also, software engineers and architects, system administrators and network engineers must be up to speed on Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) l
Soft skills matter too The importance of soft skills determining the course of your career cannot be overstated. Unlike
TECH TALK
VINAY PRADHAN,
COUNTRY MANAGER, SKILLSOFT
“Be it AI, robotics, IoT, cyber security, Big Data and analytics, or cloud computing, you must aggressively re-skill yourself around these areas to remain relevant in a volatile market.”
hard skills that are quantifiable and demonstrable; personal attribute-driven general skills like analytical thinking, verbal and written communication, ability to give and receive feedback; and manage time are intangible. And, the supplydemand equation on this front is massively imbalanced–a LinkedIn survey of 291 hiring managers in the U.S. found 59% of respondents citing a paucity of soft skills in candidates. Here are five essential non-core soft skills you must acquire to complement your core technological expertise: l Collaboration: IT today is driving both the front-end and back-end of the business, underpinning core functions like sales, marketing, operations and finance. Therefore, you need to be able to work smoothly alongside non-tech business users across the organization, spanning different business lines. For example, a better understanding of other teams’ workflows would help you tweak your working style to ensure everybody is on the same page. And, for those operating in a multinational setup, having a harmonious working relationship with colleagues across diverse cultures and geographies is vital. l Critical thinking: Organizations are on the lookout for critical thinkers–individuals who use observation, reasoning, previous experience, available resources and research to bring in a fresh perspective. You should work on understanding issues in a fundamental manner, and then suggesting intuitive solutions and ideas that could
help enhance internal processes or strengthen your company’s competitive advantage. In order to be able to do so, you should analyze the data, and interpret it. l Problem solving: As technologies continue to evolve, and customer behaviour and expectations change rapidly, companies are seeking professionals who take the initiative and proactively come up with ideas on how to solve a problem. This means you should think on your feet, and figure out different viable ways of addressing a given challenge, rather than running to your boss with the problem itself. l Design thinking: You also need to develop the ability to use innovative design for improving customer experience. As a case in point, if you are developing a mobile travel app, then put yourself if the end user’s shoes and build various scenarios around how they would possibly use the app. Accordingly, you should use these user “personas” to configure appropriate solutions, and deliver a differentiated, superior customer experience. l Agility and adaptability: Employers need
people who can adapt themselves quickly to their dynamic industry environment, and keep themselves relevant for sustained business profitability. Hence, you must constantly be open and flexible to acquiring new skills, with regard to innovative technologies. Also, you should proactively ask for customized training sessions, and offer to coach your colleagues about what you have learnt. Apart from being adaptable, you need to be agile in today’s fast-changing world, considering many technologies are becoming rather obsolete very quickly. Conclusion “Survival of the fittest”–this core principle of the Darwinian evolutionary theory has been, and will remain, pertinent for many facets of the human civilization. The market and the requisite skill sets are no exception to this rule. You must look at the ongoing disruption all around as an opportunity to re-skill yourself to be able to stand out in the crowd, and ensure a thriving, rewarding career ahead. NOVEMBER 2017 ENTERPRISE IT WORLD 37
TECH TALK
“Embracing cutting-edge innovation by carefully understanding one’s target audience
will go a long way in creating consumer-centric apps.”
3. Smart Wearables: With a gamut of wearable devices he smart wearables market is growing at a rapid rate. These devices will continue to be real game-changers in the app market; required to serve as a via-media between smart devices and wearables. This will spur the next-gen maturation in the app industries. More the number of smart wearables in the market; greater will be the need for concurrent apps.
SURESHK CLEVER,
CHIEF TECHNOLOGY OFFICER AND CO-FOUNDER, CLEVERTAP
LATEST GAME-CHANGING TECHNOLOGIES IN APPS TODAY With the rate at which technology continues to evolve, app businesses need to keep pace delivering more engaging and satisfactory user experiences with latest technology breakthroughs that are already changing the way apps are conceptualized, created, marketed and delivered.
T
he mobile app economy has seen fast-paced growth over the last few years alone. Given the rate at which technology continues to evolve, app businesses need to keep pace delivering more engaging and satisfactory user experiences in the long run. These are some of the latest technology breakthroughs that are already changing the way apps are conceptualized, created, marketed and delivered: 1. AI and VR: The rise of the AI/VR industry that aims to provide more engaging, interactive and immersive user experiences has given target 38 ENTERPRISE IT WORLD NOVEMBER 2017
audiences a radical alternative to traditional technologies. Apps in media, entertainment, and social engagement industries would do well jump on to this dynamic bandwagon, engineer products and experiences accordingly 2. Internet of Things (IoT): Apps that seamlessly sync to smart devices to control and power electric appliances will play a telling role in embedding comfort and convenience in the lives of many. Although futuristic at many levels, IoT powered by smart devices and relevant apps will form the backbone for the next wave of technological developments
4. Mobile Payments: With a plethora of payment wallets at the disposal of the app user; mobile commerce continues to increase in popularity in a flourishing digital economy. This has created the opportunity for existing and potential apps to tap into a nascent app ecosystem ripe for innovation. By embedding greater convenience and utility on the back of ever-improving physical and virtual infrastructure; apps can develop lucrative businesses by optimally targeting high Lifetime Value users. 6. Data Driven Marketing Platforms: Creating, promoting and delivering next-gen mobile apps part of an integrated and interdependent user ecosystem is one thing; but apps have to measure performance so as to continuously improve their product. This is where intuitive app analytics platforms that offer live-user segmentation, real-time behavioural data insights and usage trends come in to play. Actionable BI can go a long way in optimising app performance and eventually; developing robust user engagement strategies. To summarise, app businesses need to look at rapid technology advancements as an opportunity to cater to changing consumer needs. Embracing cutting-edge innovation by carefully understanding one’s target audience will go a long way in creating consumer-centric apps.
www.ctrls.in Asia's Largest Tier 4 Datacenter
Our customers have every reason to smile as they achieve IT and business alignment, gain agility, comply with regulations and secure their data through our comprehensive service portfolio
Our Comprehensive Service Portfolio Colocation Services Cloud (Public, Private, Hybrid) Community Cloud - Banking Community Cloud - Insurance Community Cloud - Manufacturing Community Cloud Managed Services Disaster Recovery as a Service (DRaaS) Cloud Managed Services Managed Security Services
Powering 13 of the Fortune 100 Global Multinationals and 25 of ET 100 Indian Companies Write to us at marketing@ctrls.in for more details
CtrlS Datacenters Ltd 36
USA | India | Singapore | Middle East | APAC
RNI NO: DEL ENG/ 2017/ 69906 Postal Reg. No.: DL-SW-01 / 4200 / 17-19