Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:56 PM
Bob Evans
Bob Evans

Global CIO: IBM's New CIO Sheds Light On Priorities And Plans

After two months as IBM's first company-wide CIO, Pat Toole talks about battling 80/20, a massive data-center consolidation, cloud initiatives, and cutting 11,500 apps.

To all those IT leaders—and I'm happy to say it's a steadily diminishing number—who believe it's not part of the CIO's job to connect with customers and tout the company's business value, please consider IBM's new CIO who in just two months on the job has "lost count" of how many fellow IT leaders from around the world have called him for advice on how to help transform their companies.

Going into the job he took in early September, Pat Toole knew he'd be straddling the worlds of transformation agent, process optimizer, technology visionary, and business leader, but it's also turned out that he's become one of IBM's most-valuable sales consultants as well. After all, he's the CIO at what he calls "the world's largest showcase for IBM solutions."

But Toole doesn't set his own experience or priorities apart because of his employer's status as a top global technology and services firm; rather, he warns that no matter what industries CIOs happen to be in, "if they don't come out of that cost-cutting mode and help drive the transformation of their company, they're going to be irrelevant."

(Additional analysis and insight on subjects mentioned in this piece can be found in the "Recommended Reading" list at the end of the column.)

For Toole, an IBM vice-president with a blend of business and technology experience in his 25 years at the company, that outlook is expressed across a handful of business imperatives and priorities that underpin a series of major IT-based initiatives he's leading, including the consolidation of 155 data centers down to five; the consolidation of 3900 x86-based servers down to 24 or even 22 systems, including some System Z mainframes; an ongoing battle against the maintenance/innovation budget ratio; the consolidation of a huge number of disparate SAP instances around the world into a single global instance; and two major cloud initiatives that will serve as proof points for future sales opportunities to IBM customers.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

In describing those efforts, Toole constantly refers to business value, leverage, process optimization, cost reduction, speed, customer focus, and an ongoing effort to transform the company, which he says is inextricably entangled with each of those major IT/process projects outlined above. Asked about his efforts to reverse the 80/20 maintenance/innovation ratio, Toole said, "I'm incredibly focused on this because I have a fixed budget and need to continually shift dollars and effort from maintenance to transformation. It's something we simply have to keep after, and our goal is to keep shifting the ratio by about 2% each year."

IBM's current ratio is 63% maintenance and 37% innovation, Toole said.

Two places to start, he advises other CIOs, are virtualization plus cloud computing, and business analytics to drive process-transformation work—and CIOs are in the ideal spot to drive that change because "they have one of the very few jobs that allow the executive to see the company's entire processes end to end. And CIOs need to realize that as they're under tremendous pressure to deliver great outcomes, they can do that first by understanding all those processes end to end, and then by standardizing their systems and processes that can allow them to gain a cost advantage of 3:1 or even 4:1."

In that context, Toole and his team are looking to dramatically simplify IBM's global hardware infrastructure to make it easier for IBM to monitor and refine its processes and its applications and the information and insights those optimized processes and applications can generate. And some of the numbers are eye-popping:

1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-12
minerstat msOS before 2019-10-23 does not have a unique SSH key for each instance of the product.
PUBLISHED: 2019-12-12
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-For...
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.