Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/13/2010
12:50 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: IBM CEO Palmisano Challenges IT Industry Via Smarter Planet 2

Palmisano raises the bar for IT companies by pushing the intelligent potential of IT far beyond products and services.

Whether you agree with his premise or think it's just marketing hype, IBM CEO Sam Palmisano has successfully articulated a global vision that transcends IT products and services by focusing upon the power of intelligence in improving everything from people's quality of life to business outcomes to policy decisions.

This is important because while we all talk about the potential of technology and how wonderful it will be when we can truly integrate business and technology, Palmisano's Smarter Planet strategy goes beyond the talk phase and offers real, live examples of what can happen when we move past data and information and instead deal with intelligence; when we no longer have to infer but can truly know; and when we use the power of technology to inform and animate leadership and action.

That is the real promise of IT. That is the scope of vision that more leading IT companies need to be providing. And that is the type of big-picture outcomes that CIOs need to weave into their strategies, their plans, and their own visions for how they can create maximum value for their companies and deliver superb value to their customers.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

I'm not saying everyone should try to emulate IBM; quite the contrary. Rather, the new standard Palmisano and IBM have set here is one of reach, of aspiration, and yes, of vision: how and why are my products and services truly superior; how and why my solutions to your problems will surpass your expectations; how I am able to not merely react to your requests but am able to act in lockstep with you because I can anticipate what you need as that need arises.

Granted, 2009 was not exactly the ideal environment for IT companies to play the vision thing; no, that would have gone over about as well as a Red Sox hat in the Yankee Stadium bleachers. But several leading IT companies have said that 2010 will be a significantly better year than 2009 (not that it could ever be worse), and out of that sense of opportunity comes the need for both customers and suppliers to push the bar dramatically higher: for CIOs, that means not grade-school stuff like "speak the language of business" but instead the grown-up responsibility of pushing business value and market vision to unprecedented levels within your companies.

In that context, let me offer some examples from a speech Palmisano gave the other day in London at the Royal Institute of International Affairs to illustrate why this industry needs fresh ideas, more business-centric objectives, and a greater sense of what's possible. After each Palmisano excerpt, I've tossed in a question or two in italics for your consideration.

"Enormous computational power can now be delivered in forms so small, abundant and inexpensive that it is being put into things no one would recognize as computers: cars, appliances, roadways and rail lines, power grids, clothes; across processes and global supply chains; and even in natural systems, such as agricultural and waterways," Palmisano said.

"All of these digital devices—soon to number in the trillions—are being connected through the Internet. . . . Lastly, all that data—the knowledge of the world, the flow of markets, the pulse of societies—can be turned into intelligence, because we now have the processing power and advanced analytics to make sense of it all."

Question: Is this emergent world of trillions of intelligent devices something you and your team are thinking about? If not, why not?

"In a study of 439 cities, those that employ transportation congestion solutions—including ramp metering, signal coordination and incident management—reduced travel delays on average by more than 700,000 hours annually and saved nearly $15 million each," Palmisano said, citing improvements in air quality and increased usage of public transportation.

Question: As CIO, can you articulate in clear terms like that the value you're delivering to your customers? Or have you still got yourself duct-taped to your chair in the basement IT lab, poring over SLAs and server logs?

"Four leading retailers have reduced supply chain costs by up to 30 percent, reduced inventory levels by up to 25 percent, and increased sales up to 10 percent. They've done so by analyzing customer buying behaviors, aligning merchandising assortments with demand and building end-to-end visibility across their entire supply chain," Palmisano said.

Question: Forget IBM for a moment—have you shaved every last excess dollar of cost out of your supply chain? If not, is the reason because you're relying on brute force instead of intelligence? How about inventory levels: could you use a decrease of 10% or 15% or even 25%? Are you demanding the right outcomes from the IT companies who help you manage these areas?

One of my favorite anecdotes from Palmisano's talk was about a utility company that was able to improve its meter-reading cycle from monthly to every 15 minutes, providing not only it but also its customers with more intelligence and with more options for how to act on that intelligence:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26814
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.