Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/13/2010
12:50 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: IBM CEO Palmisano Challenges IT Industry Via Smarter Planet 2

Palmisano raises the bar for IT companies by pushing the intelligent potential of IT far beyond products and services.

Whether you agree with his premise or think it's just marketing hype, IBM CEO Sam Palmisano has successfully articulated a global vision that transcends IT products and services by focusing upon the power of intelligence in improving everything from people's quality of life to business outcomes to policy decisions.

This is important because while we all talk about the potential of technology and how wonderful it will be when we can truly integrate business and technology, Palmisano's Smarter Planet strategy goes beyond the talk phase and offers real, live examples of what can happen when we move past data and information and instead deal with intelligence; when we no longer have to infer but can truly know; and when we use the power of technology to inform and animate leadership and action.

That is the real promise of IT. That is the scope of vision that more leading IT companies need to be providing. And that is the type of big-picture outcomes that CIOs need to weave into their strategies, their plans, and their own visions for how they can create maximum value for their companies and deliver superb value to their customers.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

I'm not saying everyone should try to emulate IBM; quite the contrary. Rather, the new standard Palmisano and IBM have set here is one of reach, of aspiration, and yes, of vision: how and why are my products and services truly superior; how and why my solutions to your problems will surpass your expectations; how I am able to not merely react to your requests but am able to act in lockstep with you because I can anticipate what you need as that need arises.

Granted, 2009 was not exactly the ideal environment for IT companies to play the vision thing; no, that would have gone over about as well as a Red Sox hat in the Yankee Stadium bleachers. But several leading IT companies have said that 2010 will be a significantly better year than 2009 (not that it could ever be worse), and out of that sense of opportunity comes the need for both customers and suppliers to push the bar dramatically higher: for CIOs, that means not grade-school stuff like "speak the language of business" but instead the grown-up responsibility of pushing business value and market vision to unprecedented levels within your companies.

In that context, let me offer some examples from a speech Palmisano gave the other day in London at the Royal Institute of International Affairs to illustrate why this industry needs fresh ideas, more business-centric objectives, and a greater sense of what's possible. After each Palmisano excerpt, I've tossed in a question or two in italics for your consideration.

"Enormous computational power can now be delivered in forms so small, abundant and inexpensive that it is being put into things no one would recognize as computers: cars, appliances, roadways and rail lines, power grids, clothes; across processes and global supply chains; and even in natural systems, such as agricultural and waterways," Palmisano said.

"All of these digital devices—soon to number in the trillions—are being connected through the Internet. . . . Lastly, all that data—the knowledge of the world, the flow of markets, the pulse of societies—can be turned into intelligence, because we now have the processing power and advanced analytics to make sense of it all."

Question: Is this emergent world of trillions of intelligent devices something you and your team are thinking about? If not, why not?

"In a study of 439 cities, those that employ transportation congestion solutions—including ramp metering, signal coordination and incident management—reduced travel delays on average by more than 700,000 hours annually and saved nearly $15 million each," Palmisano said, citing improvements in air quality and increased usage of public transportation.

Question: As CIO, can you articulate in clear terms like that the value you're delivering to your customers? Or have you still got yourself duct-taped to your chair in the basement IT lab, poring over SLAs and server logs?

"Four leading retailers have reduced supply chain costs by up to 30 percent, reduced inventory levels by up to 25 percent, and increased sales up to 10 percent. They've done so by analyzing customer buying behaviors, aligning merchandising assortments with demand and building end-to-end visibility across their entire supply chain," Palmisano said.

Question: Forget IBM for a moment—have you shaved every last excess dollar of cost out of your supply chain? If not, is the reason because you're relying on brute force instead of intelligence? How about inventory levels: could you use a decrease of 10% or 15% or even 25%? Are you demanding the right outcomes from the IT companies who help you manage these areas?

One of my favorite anecdotes from Palmisano's talk was about a utility company that was able to improve its meter-reading cycle from monthly to every 15 minutes, providing not only it but also its customers with more intelligence and with more options for how to act on that intelligence:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16770
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
CVE-2019-19609
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
CVE-2019-16768
PUBLISHED: 2019-12-05
Exception messages from internal exceptions (like database exception) are wrapped by \Symfony\Component\Security\Core\Exception\AuthenticationServiceException and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. A validation m...
CVE-2012-1105
PUBLISHED: 2019-12-05
An Information Disclosure vulnerability exists in the Jasig Project php-pear-CAS 1.2.2 package in the /tmp directory. The Central Authentication Service client library archives the debug logging file in an insecure manner.
CVE-2019-16769
PUBLISHED: 2019-12-05
Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash...