Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/13/2010
12:50 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: IBM CEO Palmisano Challenges IT Industry Via Smarter Planet 2

Palmisano raises the bar for IT companies by pushing the intelligent potential of IT far beyond products and services.

Whether you agree with his premise or think it's just marketing hype, IBM CEO Sam Palmisano has successfully articulated a global vision that transcends IT products and services by focusing upon the power of intelligence in improving everything from people's quality of life to business outcomes to policy decisions.

This is important because while we all talk about the potential of technology and how wonderful it will be when we can truly integrate business and technology, Palmisano's Smarter Planet strategy goes beyond the talk phase and offers real, live examples of what can happen when we move past data and information and instead deal with intelligence; when we no longer have to infer but can truly know; and when we use the power of technology to inform and animate leadership and action.

That is the real promise of IT. That is the scope of vision that more leading IT companies need to be providing. And that is the type of big-picture outcomes that CIOs need to weave into their strategies, their plans, and their own visions for how they can create maximum value for their companies and deliver superb value to their customers.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

I'm not saying everyone should try to emulate IBM; quite the contrary. Rather, the new standard Palmisano and IBM have set here is one of reach, of aspiration, and yes, of vision: how and why are my products and services truly superior; how and why my solutions to your problems will surpass your expectations; how I am able to not merely react to your requests but am able to act in lockstep with you because I can anticipate what you need as that need arises.

Granted, 2009 was not exactly the ideal environment for IT companies to play the vision thing; no, that would have gone over about as well as a Red Sox hat in the Yankee Stadium bleachers. But several leading IT companies have said that 2010 will be a significantly better year than 2009 (not that it could ever be worse), and out of that sense of opportunity comes the need for both customers and suppliers to push the bar dramatically higher: for CIOs, that means not grade-school stuff like "speak the language of business" but instead the grown-up responsibility of pushing business value and market vision to unprecedented levels within your companies.

In that context, let me offer some examples from a speech Palmisano gave the other day in London at the Royal Institute of International Affairs to illustrate why this industry needs fresh ideas, more business-centric objectives, and a greater sense of what's possible. After each Palmisano excerpt, I've tossed in a question or two in italics for your consideration.

"Enormous computational power can now be delivered in forms so small, abundant and inexpensive that it is being put into things no one would recognize as computers: cars, appliances, roadways and rail lines, power grids, clothes; across processes and global supply chains; and even in natural systems, such as agricultural and waterways," Palmisano said.

"All of these digital devices—soon to number in the trillions—are being connected through the Internet. . . . Lastly, all that data—the knowledge of the world, the flow of markets, the pulse of societies—can be turned into intelligence, because we now have the processing power and advanced analytics to make sense of it all."

Question: Is this emergent world of trillions of intelligent devices something you and your team are thinking about? If not, why not?

"In a study of 439 cities, those that employ transportation congestion solutions—including ramp metering, signal coordination and incident management—reduced travel delays on average by more than 700,000 hours annually and saved nearly $15 million each," Palmisano said, citing improvements in air quality and increased usage of public transportation.

Question: As CIO, can you articulate in clear terms like that the value you're delivering to your customers? Or have you still got yourself duct-taped to your chair in the basement IT lab, poring over SLAs and server logs?

"Four leading retailers have reduced supply chain costs by up to 30 percent, reduced inventory levels by up to 25 percent, and increased sales up to 10 percent. They've done so by analyzing customer buying behaviors, aligning merchandising assortments with demand and building end-to-end visibility across their entire supply chain," Palmisano said.

Question: Forget IBM for a moment—have you shaved every last excess dollar of cost out of your supply chain? If not, is the reason because you're relying on brute force instead of intelligence? How about inventory levels: could you use a decrease of 10% or 15% or even 25%? Are you demanding the right outcomes from the IT companies who help you manage these areas?

One of my favorite anecdotes from Palmisano's talk was about a utility company that was able to improve its meter-reading cycle from monthly to every 15 minutes, providing not only it but also its customers with more intelligence and with more options for how to act on that intelligence:

 

Recommended Reading:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.