Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:51 PM
Bob Evans
Bob Evans

Global CIO: 5 More Things Microsoft Must Do

Make some spicy acquistions (SAP? Tibco?) and seriously commit to cloud, data centers, and mobile.

1) Cloud Computing This whole concept, name, and approach rattle lots of folks at Microsoft because it threatens their entrenched territory and, quite frankly, the status they and their products have within Microsoft. What impact will the cloud have on the OS business? The desktop business? What about all those developers at Microsoft: do they do cloud, or do they despise it? Of particular concern is the prickliness Microsoft sometimes displays toward new models or new technologies that customers are eager to explore: recall that as Software as a Service began gaining incredible momentum and potential, Microsoft had to do its NIH thing and call its approach "Software plus Service," as if the company were still an undisputed king-maker and could dictate terminology and platforms by decree.

The ironic thing about cloud computing is that it plays precisely into the outcome that Bill Gates always touted with phrases like "computing for the masses" and his relentless drive to bring down the cost of computing. Over and over, I hear CIOs talking about how various cloud efforts have allowed them to cut deployment down from months or weeks to hours; from days to minutesand oftentimes, the cost implications are equally significant. Microsoft needs to jump into this pool with both feet and no water wings, proudly and loudly declaring it is going to become a cloud champion for customers across all of the company's core areas: the platform side, the connectivity side, the client side, and the applications side. No reservations, no hedging, no qualifications: if Microsoft tries to fudge its way in with a "top-secret 36-month migration/transition cannibalization-minimalization strategy," the quick and the hungry will ensure there's nothing close to a leadership spot for MS to pursue in 24 months, let alone 36.

2) Mobile Enterprise and Mobile Mindset. Mike Cuddy, the outstanding CIO at Toromont Industries, recently shared this big idea for some enterprise and enterprising IT vendor: "The cost of a netbook/low-end laptop is not much different from the cost of an un-contracted smartphone. What do we do with smartphones with they break? We pitch them into the recycle bin and buy new ones. Some IT vendor is going to get the bright idea to help corporate IT manage the future heterogeneous mobile device situation we are evolving to. In the past, we addressed support through standards, and ensuring consistency in end-user devices and software. I don't see how that will be possible the future. We will have many devices, with shorter life spans, with various networking components (wifi, hspa, lta, etc) , and application software that is constantly changing. These will need to be seamlessly managed, and it will not be easy." What better way for Microsoft to show the world it's 100% open? What better way for Microsoft to tie its deep-technology platforms and developer technologies into a massive global growth area? Why can't Microsoft create, manage, and sell the heck out of something it calls "the Enterprise Mobility Cloud," from which people can pull down to their mobile devices the apps, data, documents, files, and video they need across all those conflicting form-factors Cuddy mentions? Microsoft has always said it's in the platform businesswell this could be one a heckuva platform.

3) Data Centers. A few years ago, Microsoft began retooling its entire data-center philosophy to build the new type of muscle mass required to move more and more of its business online. In the course of those efforts, Microsoft has created some remarkable data-center prowess, exemplified perhaps in its mammoth Chicago data center that covers 700,000 square feet (about the size of Rob Preston's house) and cost the company $500 million (we analyzed this facility a few months agocheck out the link in the "Recommended Reading" section at the end of this column). Microsoft's got some other impressive facilities up and running or in the planning stages, and it's certainly looking to aggressively test new technologies and approaches on its way to becoming a world-class operator of giant data centers. And that's precisely the sort of expertise that lots and lots of companies are going to need in our always-on and always-online economyso Microsoft should think about parlaying that internal techie expertise into a commercial business along the lines of Microsoft Data Center Services. It would tie in nicely with the above-mentioned cloud and mobile opportunities, and would put Microsoft once more into a new and high-growth business that allows it to leverage the massive amount of intellectual capital and deep-tech expertise it has within its ranks.

4) Become the SaaS/On-Premise Integration King Everybody says this is a brutal problem, and it's going to get a whole lot worse before it shows any sign of improvement as SAP and Oracle and other applications company begin offering a wide range of SaaS and other on-demand apps to complement their traditional on-premises apps. Is integration a traditional Microsoft competency? Certainly notbut if Microsoft defines its future strategy by its tradition rather than market need, then it's goose is cooked. And look where such a business would place Microsoft: smack in the middle of conversations about enterprise apps (see next item), platforms (check), security (check), connectivity (check), databases (check), and strategici information management a la cloud and data centers (check and check). And I sure think CIOs would sit forward and say, "You're telling me that Microsoft is going to solve this problem for us? I need to hear this."

5) Acquisitions: SaaS, Integration, and Big Enterprise I'll break this out into those three groups:

2 of 3
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.