Search This Blog

Friday, September 20, 2013

Quantum upgrades big data storage to StorNext 5

Quantum has announced an upgrade to its StorNext range of big data-targeted file management appliances based around a rewrite of its operating software.

Version 5 of StorNext promises an increase in scalability to five billion files with a 10x boost in performance as a result of the operating software being re-engineered for better cache management and multi-threaded CPU operations.

quantum_stornext_appliances.jpg

The StorNext range of appliances comprises:

M Series metadata appliances
These are the brains of the StorNext environment, maintaining the file system, creating shared data pools and managing access to and location of files, as well as tiering/migrating data to StorNext disk and tape resources. Four models exist with differing options for on-board storage, connectivity and numbers of clients they can support;Q Series hardware
These Fibre Channel-connected disk storage arrays are the primary storage tier in the StorNext world, with models that range from the maximum 173TB QX-2400 to the 1.1PB QD6000 with nearline-SAS and 10,000rpm SAS drives;AEL series tape archives
For the longest-term storage, AEL series tape archives are configurable up to thousands of slots, with StorNext Storage Manager tiering and management software.

Protocol options include SAN and NAS with support for Quantum’s Lattus object storage, the LTFS tape archive file system, and the cloud.

The StorNext range is aimed at big data and particularly big file applications ranging from medical research through movie production to oil and gas exploration.

StorNext 5 appliances will be available in December 2013, with software-only products available in 2014.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Thursday, September 19, 2013

Android will be ‘top priority’ for Huawei

Android will remain the focus of Huawei as it looks to grow its smartphone business, but recent acquisitions have not made it shy away from Windows Phone.

Richard Ren, president of the device business in Western Europe for Huawei, spoke at an event at the company’s R&D centre in Stockholm about trying to grow the brand through, among other marketing tools, sponsorship of football teams and increased presence in sport.

huawei logo.jpg

But he admitted the firm was still a small fish in a big pond, and the best way to grow was by swimming with the biggest fish of all: Google.

“We are still a small player in this area, so first of all we will focus on the main trend, so Android will be the top priority for us,” said Ren.

Huawei also plans to retain its Microsoft focus, despite other manufacturers' fears around Microsoft's acquisition of Nokia and whether it is worth developing Windows Phone-based handsets now it has its own hardware division.

“Today we have to focus our business and focus on the mainstream area – that is our strategy – but at the same time we are developing [for] Windows Phone,” he said. “We will continue to develop because we are a strategic partner with Microsoft.”

Computer Weekly asked Ren if Huawei would consider purchasing BlackBerry to boost its reputation, but the president declined to comment. A spokeswoman later said the prospect had been raised during a meeting in London, but a board member ruled it out as an option.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

India Post banking system roll-out moves to user acceptance

Infosys is embarking on training India Post staff in how to use its Finacle banking system after completing the roll-out of the system at 155,000 post offices in India.

India Post is moving to the user acceptance phase of a project that began in August 2012, after Infosys won the contract to supply a core banking system to India Post.

C. N. Raghu, head of Infosys in India, said that, with 40% of the Indian population having no bank account, India Post with 155,000 branches is the ideal organization to get rural people into the banking system. India Post has one branch per 8,000 people and 21km2.

“We have finished our part of the project and will start user acceptance,” sad Raghu. “When we have finished that, the government standards agency will look at it and then it’s up to India Post to start using it.”

Infosys is to roll out 10,000 tablet devices to India Post staff that will integrate Finacle and enable the company to provide mobile banking services to rural people. This is the second project won by Infosys and, if successful, more tablets will be rolled out.

This will ensure banks can connect the last mile to citizens, according to Raghu. “An India Post worker will be able to take the banking system to people that can’t reach a bank.”

More people will want to set up bank accounts as the Aadhaar (UID) project – the Indian government's plan to issue all of its citizens biometric ID cards – gathers pace. With a unique ID, many more people will be able to set up bank accounts.

The combination of the reach of India Post and the technology will help Indian citizens that have so far been left out of the banking system. “This could be a powerful tool for financial inclusion,” sad Raghu.

The Indian government stands to benefit when cash currently invisible to the financial system re-appears, much of it taxable. According to research from Gartner, Indian banking and securities companies will spend about 417bn INR on IT in 2013, compared to 369bn INR in 2012.

There is pressure on Indian banks to become more competitive and gain large customer bases. The Reserve Bank of India – which regulates the Indian financial sector – recently announced guidelines for new companies to enter the banking sector which is leading to greater competition.

In May this year the Department of Posts (DoP) awarded Tata Consultancy Services (TCS) a six-year contract worth 11,000m INR to provide an end-to-end IT modernization program for India Post.

The program includes developing and supporting mail, finance & accounts, HR, customer interaction management solutions including the rural ICT platform, data migration, infrastructure, call center and centralized with 24-hour service desk operation for all DoP. As core system integrator, TCS has responsibility for the overall integration of the end-to-end security system Enterprise Management System (EMS).


Wednesday, September 18, 2013

Google to face claims over Wi-Fi snooping

Google is to face damages claims for privacy violations after a US judge ruled the firm broke the law when its Street View vehicles harvested unsecured Wi-Fi data.

Between 2008 and 2010, the search firm collected Wi-Fi data in 30 countries, including the UK, from 2008 to 2010. The data included emails, user names, passwords, images and documents.

43005_Google-Street-View-car.jpg

Google had appealed against an earlier ruling in the hope of having the case dismissed, arguing that the data had been collected inadvertently.

The search firm also argued that the unsecured data was readily accessible and therefore not subject to US wire-tapping laws, but the US Court of Appeals in San Francisco disagreed.

The court said that federal privacy law applies to residential Wi-Fi networks.

Privacy advocates have welcomed the ruling and lawyers representing the group suing for damages over the Wi-Fi snooping said the case would now be resumed, according to the BBC.

A Google spokesman said that the company was disappointed with the decision and is considering its next steps.

Google initially denied that it had collected Wi-Fi data, but later blamed code mistakenly included in software for its Street View vehicles by a software engineer.

When it emerged that a senior manager had been aware that data had been collected by Street View vehicles, Google apologised and agreed to destroy the data.

In addition to fines totalling $7m in a case involving 38 US states, Google was required to set up a staff training programme about data privacy and a public education campaign on securing wireless data.

The German privacy regulator imposed a fine of $192,500 on the firm in April, but the UK’s Information Commissioner’s Office only ordered Google to destroy all stored data without imposing any monetary penalty.

European privacy authorities have since begun investigations into whether Google is infringing privacy rights by imposing a single policy to cover all its services and could face punitive action.

In July 2013, the UK’s privacy watchdog joined data protection authorities in France, Spain, Germany and Italy in demanding changes to Google’s privacy policy.

An investigation by the Information Commissioner’s Office (ICO) found that Google’s privacy policy raises serious questions about its compliance with the UK Data Protection Act.

The EU investigation began in March 2012, when Google started combining data from across its sites to better target advertising, which regulators see as "high-risk" to users’ privacy.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Security Think Tank: Embrace consumer cloud storage at your peril

Storing files in consumer cloud is tempting. I use several consumer cloud storage platforms, such as DropBox, Google Drive and SkyDrive. The convenience of these services mean I can access my files anywhere and have them synchronised between all my computers automatically. Many companies – including big enterprises – are evaluating the use of these cheap and easy-to-use storage services. Many more are perhaps already using such services – at their peril.

Consumer storage services come with big concerns and should prompt some serious questions.

40199_Security-think-tank.jpg

The biggest security risk is that all files are stored in such a way that the cloud provider has full access to it. Do not believe your cloud provider will never look at the data. In the US the National Security Letters (NSL) prevent companies from even informing their customers about such co-operation. In the age of National Security Agency (NSA) surveillance, this is perhaps something to be wary of. Also, there have been a number of high-profile incidents related to consumer cloud storage providers.

However, there is a way to overcome this risk: pre-internet encryption (PIE), encrypting data before it reaches the cloud provider. Services such as BoxCryptor can work on top of cloud storage platforms and encrypt all data with customer-managed keys. This means the cloud storage provider cannot technically get access to any of your data. Nevertheless, with any encryption comes the hassle of key management, which is considered the hardest discipline in IT security. Moreover, losing the encryption key means the data is lost forever.

The second biggest risk is related to linking to a company’s identity and access management (IAM) systems. As with all company applications, an account should be disabled when an employee or a contractor no longer works for the company. Consumer offerings do not support plugging in to corporate IAM systems; that is typically a premium service of enterprise-ready cloud systems.

In summary, the consumer cloud storage services are great if you have files that are not overly sensitive and the company size is such that everyone knows everyone (the theory says this number is around 50). If your file classification and company size do not fit this profile, you are most likely better off looking at enterprise-class cloud storage offers.

Vladimir Jirasek is managing director at Jirasek Consulting Services


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Tuesday, September 17, 2013

European datacentre uptake slows in first half of 2013, but London bucks trend

Despite promises of cost efficiency and scalability, the uptake of colocation datacentre facilities in the first half of 2013 was down 31% year-on-year, according to the European Datacentre Market View report from CBRE.

While datacentre supply and availability increased by 7% and 15% respectively for the first half of the year, vacancy rate also increased by a little over 1% to 15.3%, the report showed.

datacentre-thinkstock-290x230.jpg

Total third-party datacentre demand for the first half of this year to June 2013 was 15,095m2 (or 21.7MW), a third less than the demand for the same period last year.

The total uptake for the second quarter was at 6,300m2 (8.8MW) and European cities including Paris and Amsterdam recorded a lower than expected take-up in datacentre services. Frankfurt too saw a slowdown in activity in Q2, but colocation take-up in the city is now 18% ahead of mid-year 2012, the report revealed.

Meanwhile, London, Europe’s largest datacentre market, accounted for 50% of newly contracted space in Q2 and bucked the European datacentre slowdown trend.

London recorded the highest take-up with 2,805m2 (4.4MW) transacted in the second quarter. The UK capital’s retail sector in particular continues to show improvement, with take-up for the year now surpassing the total for last year, according to the report.

Total take-up in Frankfurt was just short of the London total for the first half of the year, accounting for 32% of the Tier 1 total compared to London's 34%.

But London also accounted for the highest level of vacancy rates among major European markets. Current availability in London stands at 18.6% against a European average of 15.3%.

Despite slowdown in demand, the report maintained a positive outlook for the European datacentre industry.

An improvement to the economic outlook across the Eurozone is serving to restore some business confidence in the second quarter, the report’s authors said.

“Datacentre operators are beginning to see the result of a more optimistic corporate view with a rise in new enquiries. Renewed interest from corporate occupiers, combined with enquiries from technology service providers, is providing a promising outlook for datacentre operators,” they said.

In addition, rising demand for cloud computing services is also driving service providers to increase their datacentre capacity.

The report also forecast a more optimistic view for the London datacentre market.

“The good news in London for the second quarter is that underlying economic conditions have continued to show improvement. An optimistic view is that a corner has been turned and business confidence will remain on a stable path, consequently encouraging new investment,” the report stated.

New interest in taking services in London's datacentres has been brisk from the turn of the year, with evidence that corporates are preparing for better times ahead. User caution remains high, however, leading to long periods of contractual negotiation and internal deliberation before commitment is entered into.

“Our expectations are that the uptick in new requirements in early 2013 will bring a boost to take-up statistics in the second half of the year as transactions complete,” the report stated.

On the supply side, London's datacentre providers have continued to bring new space to market, providing a clear indication of operator expectations of future increases in demand. Volta, Portal Data Centres, LDEX, Node4, Everest Data Centres and Ark all continued to expand their datacentre facilities in the UK.

Datacentre service supply rose by 27,000m2 (44MW) last year – the highest amount since before the financial crisis of 2007, the report noted.

For the London market in the short term, this has created some pricing pressure where operators are eager to secure customers into newly built space. Longer-term, however, growth in supply further reinforces the city's position as Europe's leading and most diverse location for datacentre services, it said.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Android platform set to broaden Microsoft Office 365 take-up across India

Hot on the heels of the release of Office Mobile for iPhone, Microsoft has launched Office Mobile for Android devices.

Office 365 subscribers can now work on their Word, Excel and PowerPoint documents from anywhere, using their Windows Phone, iPhone or Android handsets to synchronize with a PC. Microsoft is offering Office 365 in India with a plan that starts from INR 220 per user per month.

Organizations in India already using Office 365 include Godrej, Lupin, Tata Communications, FICCI, AEGON Religare, Dabur India, Infiniti Retail, SIRO and Unilog to name a few.

The launch extends the productivity suite to many more users due to Android’s popularity. According to research from Nielsen Informate Mobile Insights, 60% of mobile devices bought between September and October 2012 used Google's Android operating system (OS), compared to 1% using Apple's iOS; 8% using Windows Phone OS; and 3% Windows Mobile OS.

With bring your own device (BYOD) schemes gathering pace across India, many more workers – a large proportion of which use Android – can use applications such as Office 365 on mobile devices.

Bhaskar Pramanik, chairman of Microsoft in India, said: "Office 365 unlocks social and mobility scenarios that will allow businesses and individuals to take full advantage of cloud computing. It gives them the freedom to do things, when, where and how they want."

According to Naveen M., analyst at Ericsson: “Microsoft’s Office 365, based on cloud computing technology, is a boon for India’s robust MSME segment. It is platforms such as these that will facilitate the small businesses to go online, which will grow the entire business ecosystem.”

Like any cloud computing service, Microsoft Office 365 decreases capital expenditure ("capex") and operational expenditure ("opex") of an organization.

S. Tiwari, senior IT analyst at Seimens, said: “Office 365 is an opportunity to reduce the capex and opex of any organization, creating a flexible model of functioning without considering hardware resources as an investment.”

With a real-time data-sharing facility coupled with the ability to work on projects from anywhere, work efficiency and revenue increase can improve.

Arjun Singh from KPMG said: “With cloud computing platforms such as Office 365, we should be expecting not less than a 20% rise in work efficiency and about 25-35% revenue boost.”

Singh, a user of Office 365, added: "Now that I use Office 365 I can’t imagine how we were doing without it for so long. Not only can I edit my own documents while I go back home from office in my car but the entire productivity of my workforce has increased. 

"In today’s days of virtual teams and cut throat competition, where everyone is always on the go but cannot afford to lose out time in working on projects, Office 365 is a life-saver. Starting from marketing to operations, every function and every project has gained from its use.”


TSB’s reliance on Lloyds IT could impair new bank's competitiveness

New high street bank Verde might struggle to be competitive in the market due to its reliance on the IT systems of Lloyds Banking Group (LBG), according to the Office of Fair Trading (OFT).

Verde was formed when TSB separated from Lloyds Banking Group. It will see TSB launch alone with five million customers, eight million accounts, 8,000 staff and 632 branches. But because Verde’s systems are run on LBG's IT platform, the OFT has concerns over Verde’s ability to compete.

42151_Lloyds-TSB.jpg

In a letter to Chancellor George Osborne, OFT CEO Clive Maxwell said the OFT was concerned that the “business and IT services agreements with LBG may impair Verde’s ability to compete independently in the market”.

The letter said LBG and Verde were negotiating an IT services agreement that will see LBG supply to Verde: “We recognise LBG’s assurances about Verde’s ability to modify and innovate and the efforts made to reduce the overall cost base for the IT platform and the overall benefit that a transitional arrangement can provide stability for Verde in its early years. However, there remain concerns about the impact on competition arising from any Verde dependence on LBG, the influence that LBG will retain over the operational flexibility of Verde, including its ability to innovate and differentiate its product offering, as well as any information flows between the parties.”

The letter added that Verde would be constrained in the small to medium-sized enterprise (SME) sector because it lacks the IT functionality to provide complex business banking services.

Co-operative Bank pulled out of a ?750m proposed deal to take over Verde. It blamed the poor economic conditions for its decision.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Monday, September 16, 2013

CW500 Club: BYOD best practice

It is not a new phenomenon for workers to use their own devices as part of their job, but company schemes to encourage people to use their own devices are a relatively recent development.

Smartphone sales have rocketed in recent years and workers now expect more than a BlackBerry as an option for mobile working. The iPhone is the epitome of the consumerisation of IT, with workers connecting to the corporate network with their phone and Apple’s iPad is now the device of choice for many a senior executive.

cw500 290x230.jpg

Businesses today want to turn this trend to their advantage. The ability for staff to use their own devices for work offers cost savings, improves mobility and keeps staff happy. To this end programmes have emerged to formalise the practice, known as bring your own device (BYOD) schemes.

The latest meeting of CIOs at the CW500 Club discussed BYOD best practice.

Steve Trigg, an independent BYOD consultant, told the audience about some of the common mistakes as well as the opportunities he had seen in corporate BYOD programmes.

He said the advantages of BYOD are many if done properly and go beyond the most talked-about advantages, such as flexible working and lower hardware costs. “BYOD is all things to all people,” he said.

“It is about employee productivity, improving collaboration, business process improvement, changing behaviour and flexible working.” Nor is it just about mobile phones, he said. “It is about tablets, laptops and remote dial-up for example.”

There are challenges in moving to a BYOD programme for businesses. Although most companies have staff using their own devices anyway, formalising a programme is complex with no real processes in place, according to Trigg.

Businesses need to change the culture when it comes to projects. He said many companies carry out a proof of concept for BYOD and it stays in the IT department and fails to get the message across to the business.

“What I have found with BYOD is that normal programmes are not followed and it is all about proof of concepts that sits with IT and it is often quite difficult to get it to the users.”

He said it is easy to set up a proof of concept in IT because you can get around quite a lot of the controls in place, such as security, but IT must communicate with people about what you are doing.

“You must be careful because, before you know it, you hit 2,000 users and are still in proof of concept.” He said the programmes need to move beyond this and gain business sponsors, develop communications plans and introduce user requirements.

It is critical to get the business involved early because each business will have its own set of user requirements, so there is no one size fits all.

“IT has to work closely with HR and legal because a BYOD roll-out touches everybody in the organisation.

But the advantages are great if BYOD is rolled out properly.

Mobile workforce equals less office space. “I was working with a company that halved the office space it needed,” said Trigg.

It can improve business processes and improve customer services. Trigg gave the example of mortgage processing with lenders visiting customers and filling forms electronically.

Then there is the fact that more of the workforce are on the street and there is reduced need to come back and forward. Trigg mentioned the police as an example of the advantages of freeing mobile workers from the office.

Simon Furber, network manager Brunel University, spoke about how BYOD is nothing new for higher education organisations, as students had been accessing university systems on their own devices for years.

“BYOD is just nothing new for higher education and you are probably already doing a lot of it but just in an uncoordinated way," Furber told the audience of CIOs.

He described how universities had been providing students with access to systems via their own devices since students have had their own devices.

The numbers of devices accessing Brunel University's network is accelerating rapidly as mobile working becomes the norm, said Furber.

In 2009 we had 12,000 devices connected to the network but now we have 54,000 registered devices connected to the network with 20,000 users.

“We take being online for granted and take our devices everywhere.” He said in universities students expect to be connected all the time. He said businesses need to be ready for these individuals because they are the next generation of workers.

Furber said today it is more about giving individuals a unique online identity and it is more about an individual using devices – not a particular device.

Because of the substantial demand Furber said the university must make it easy for users. This will increase user satisfaction and reduce the time needed for IT to support them. “We don’t want to make this difficult for users, we want to take all the complex stuff away.”

He said users will want some level of freedom to use what they want when they want. “We guide but don’t prescribe.”

“We try to say 'yes' more than we say 'no'. But we have to acknowledge some things we can’t do.”

Furber said in 2008 75% of devices were laptops but now 60% of them are mobile devices, with Apple iOS taking a 45% share. "Windows and BlackBerry are as expected on the network in smaller numbers as well as devices such as Play Stations and Nintendos," he said.

As Trigg had said earlier, Furber emphasised the importance of nailing down user requirements. “The biggest challenge is that people expect experts to come in and tell them what to do but that won’t happen. The key to this is what your expectation is."

He said the right way to do it also depends on your organisation.

Gary Lengthorn director of IT services at SThree, wrapped up the presentations with the story of SThree’s two-year BYOD story.

He said the company’s BYOD project is the first roll-out it has done globally. “And is the first one that got 100% in a satisfaction survey," he added.

Users funded almost 100% of the devices in the project, which is completely opt-in. “You don’t have to sign up to it,” he said.

He stressed the importance of getting everyone involved. “Salespeople saw the benefits but we had to make clear that HR and legal supported it.”

Lengthorn said the IT department supports the application from Good Technology but support for the devices is left to the user.

He said it was as important to inform people of their responsibilities as it was to tell them about why they were doing it. “Communication is key to the project. People had heard about it but communications around responsibilities was important,” he said.

“Marketing was not needed for the project because everyone wanted it, but we had to market the FAQs.”

Some 60% of 2,200 staff were using their own device, he said, which is not costing the IT department anything for the devices or support.

Lengthorn said the company automated the entire process of joining the BYOD scheme to make it easier and more cost-effective. From the day someone joins on the portal there is no manual processing.

“Six percent of the user base reprovision themselves every month – this would have a huge overhead if it was done manually. This jumps to 10 to 11% at Christmas,” said Lengthorn.

“We truly automated the BYOD process and that was the real success for me.”


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

EU plans an end to high roaming charges

The EU Commissioner for the digital agenda, Neelie Kroes, has proposed an end to the exorbitant cost of mobile phone calls and mobile data when abroad.

The European Commission has adopted a regulatory proposal to the telecoms sector, dubbed “the Connected Continent”, which describes targeted changes to provide fairer charges when people call another EU country from a landline or mobile.

Europe.jpg

“It's hard to claim you're bringing down barriers as long as roaming charges remain; those wouldn't exist in a true single market. So we are proposing measures to bring about the end of roaming within Europe once and for all,” Kroes wrote in a blog post.

She said the Commission would establish new rules to support public Wi-Fi to make it easier for people to stay connected when they are on the go, plus measures to give operators more consistent access to fixed internet networks in different countries.

Built on the 2009 Telecoms Framework Directive, the Commission believes its proposals will modernise the telecoms sector by creating a digital ecosystem capable of taking a lead in the global economy (see Opening up the EU telecoms market).

The Commission is also addressing net neutrality. “I am putting forward new safeguards to ensure access to the open internet," said Kroes. "Today, millions of Europeans find services like Skype blocked, or their internet access degraded. My proposal will end those discriminatory practices." 

Extra new "specialised services" – IPTV, e-health, or cloud computing, for example – would be allowed only if they don't cause general impairment of regular internet access.

Simplification and reduction of regulation for companiesMore coordination of spectrum allocation – so that we see more wireless broadband, more 4G, and the emergence of pan-EU mobile companies with integrated networksStandardised wholesale products – encourages more competition between more companiesProtection of open internet – guarantees for net neutrality, innovation and consumer rightsPushing roaming premiums out of the market – a carrot and stick approach to say goodbye to roaming premiums by 2016 or earlierConsumer protection – plain language contracts, with more comparable information, and greater rights to switch provider or contract

Freedom of access to internet sites is core to the principles of the internet. Speaking to Computer Weekly earlier in September, Google chief internet evangelist Vint Cerf, who co-authored the specification for TCP/IP, the foundation of the internet, said: "Freedom of access is the value of the internet. It is fully connected. You don't want a network provider to tell you which places you can get to." 

However, internet liberties group La Quadrature du Net said the regulation adopted by the European Commission contains dangerous fake net neutrality proposals. 

“This flawed text pretends to defend the principle of net neutrality by banning the blocking and throttling of internet communications, but makes it completely meaningless by explicitly allowing undue commercial discrimination through prioritisation," said J?r?mie Zimmermann, co-founder and spokesperson of La Quadrature du Net.

Commenting on the European Commission’s proposed polices for a single telecoms market, Anne Bouverot, director general at the GSMA, said: “Reform today will set the context for investment and innovation in Europe’s digital economy for the next 10 years. It is essential that we get it right, and this process should include a comprehensive review of the increasingly outdated regulatory framework for telecoms in Europe. The right policies are ones that encourage investment, enable innovation and help build consumer confidence. We will continue to support efforts to develop these to help drive Europe towards a connected future that meets the expectations of its businesses and consumers.”

Earlier in September, Kroes called on Brussels to push ahead with investment in 5G networking. “I am delighted with the rapid and positive response from industry, and we are now ready to agree a public/private partnership for strategic research for 5G,” she said. “It is worth hundreds of millions of Euros.”


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Where will Cisco put Whiptail flash array after $415m buy?

Cisco has announced it is to buy flash array maker Whiptail for $415m, with the deal expected to close in the first quarter of 2014.

The networking giant has said that Whiptail’s flash array technology will be incorporated into its Cisco UCS server products but Cisco has not outlined exactly how that will happen.

cisco_logo.jpg

Whiptail makes Accela and Invicta multi-level cell (MLC) flash arrays aimed at the midrange to enterprise markets that come in 1U and 2U form factors and scale from 1.5TB to 72TB. Whiptail added an SME version – the WT-1100 – in June this year. All these products are standalone flash arrays.

Meanwhile, Cisco’s UCS products range from SME to enterprise level servers that are differentiated by numbers of processors, memory slots and connectivity. They all come, however, with a small number (two or four) of disk drive slots on-board.

Cisco’s press release on the acquisition said the move is aimed at bringing high performance storage closer to the servers to cut the latency associated with existing shared storage setups.

It said: “Cisco is evolving the UCS architecture by integrating data acceleration capability into the compute layer. Integrating Whiptail's memory systems with UCS at a hardware and manageability level will simplify customers' datacentre environments by delivering the required performance in a fraction of the datacentre floor space with unified management for provisioning and administration.”

Flash has been the hot storage topic in the datacentre over the past couple of years. Its ability to handle data at much faster rates than spinning disk has seen organisations buy flash arrays, mixed hybrid flash/HDD hardware and put flash storage in servers in PCIe format.

Cisco is clearly responding to this trend with the Whiptail buy and it looks most likely to offer the hardware in a format that slots in alongside, and deeply integrated with, its server blades. But, given the variety of options for flash storage placement that exists it means the company will only be able to offer customers one of them.

Other suppliers – for example, Dell and HP – offer flash acceleration for their servers but these are located internally. Cisco looks set to be the first server maker to also offer an external flash array alongside its blades.

There is also the fact that flash storage is only really cost-effective for the hottest data in the datacentre. It is common for less frequently used but required data to be on various classes of spinning disk. That means UCS will need to be supported by another storage array in some scenarios.

The Whiptail acquisition also raises question marks over Cisco’s relationships with EMC and NetApp. Currently, Cisco is in partnership with EMC and VMware in the VCE (Virtual Computing Environment) joint venture that bundles together Cisco servers and networking hardware, EMC storage arrays and VMware virtualisation software. It also partners with NetApp to provide a similar product bundle with its storage.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Sunday, September 15, 2013

Interview: Dragon’s Den entrepreneur Piers Linney on cloud and UK tech sector

UK cloud computing entrepreneur Piers Linney (pictured), who made his debut as a “dragon” in the latest Dragon’s Den series on BBC Two, says cloud is fundamentally changing how IT is consumed and a vast majority of IT and communications delivery will move away from on-premises or managed services platforms to the cloud.

“Cloud is changing the IT landscape. Enterprise IT is moving away from the model of technology purchase to IT services procurement, and this is changing how IT is consumed,” he tells Computer Weekly.

Piers-Linney-Dragon-290px.jpg

Linney, the co-chief executive of UK cloud company Outsourcery, launched the company in 2007 as a response to this systemic market shift in the provisioning of ICT from an on-premises or managed services deployment model to a cloud-based model.

According to Linney, while consumers’ interaction with IT changed a few years ago, with services such as Facebook, Skype and iTunes, the business world is only now catching up to change its approach to technology.

But why has the enterprise sector taken longer to adapt to the new model of IT consumption? 

“It works differently for consumers. If an application doesn’t work, they just go and make a cup of tea or switch to another service, but businesses need to plan SLAs [service level agreements] and require robust IT platforms and minimal downtime – and all this takes time,” he says.

You don’t have to be a giant enterprise with a huge IT budget to use cloud computing services

Piers Linney, Outsourcery

But Linney is not necessarily writing off in-house IT and colocation or managed service providers. “The managed services model isn’t going to go away, but cloud is very different from it,” he says. 

Enterprise IT either hosts its infrastructure in-house, or opts to rent co-location space, or even goes for a complete dedicated infrastructure managed by third-party datacentre providers.

“But cloud is essentially a shared services platform and the enterprises do not own any part of the provider’s datacentre infrastructure exclusively,” he says.

And this is a good thing, because through shared services, cloud platforms can offer benefits such as a reduction in the total cost of ownership, operational agility, productivity and scalability, according to Linney.

Owning and managing hardware is a flawed strategy in todays’ times, he says: “It makes no sense to spend on IT infrastructure. Those that are buying big Exchange servers may be making their last IT hardware purchases."

But many companies that have adopted a robust cloud strategy, such as Netflix, have been affected by downtime and outages of cloud platforms. Linney thinks that occasional cloud glitches get more attention. “But when you look at the overall uptime, resilience, security and performance, it is far higher on the cloud than on an enterprise’s own platform," he says.

But it is not just the outages. Some enterprises have steered clear of the cloud because it is more expensive to adopt cloud than operate an on-premises infrastructure. Over-provisioning resources, under-estimating the capacity requirements and needing access to instant scalability on the cloud all add up costs.

“Of course, if you are going to run a few servers under a leaky roof, it is going to be cheaper than the cloud,” says Linney. “Cloud should not be more expensive in the true sense. Enterprises need to factor in the complete return on investment (ROI) and understand cloud’s impact on the business’s productivity.

“Businesses are able to consume technologies such as unified communications through cloud, which they would never have consumed with their in-house IT, and they must factor this in when calculating cloud ROI.

"CIOs are now realising that the best way to deploy consumer technology within their enterprises is via the cloud.”

While cloud gaining strong traction is a result of large enterprises and public sector organisations adopting it, Linney says cloud is a great leveller: “You don’t have to be a giant enterprise with a huge IT budget to use cloud computing services. Many UK SMEs are using the exact same cloud technologies as those used by FTSE 100 companies.”

Linney’s pure-play cloud company Outsourcery offers platforms, applications and infrastructure as a service. Some of its UK customers include Pearson, Vodafone and Virgin Media.

The underlying platform of Outsourcery’s cloud is Microsoft virtualisation platform Hyper-V 3.0 and Microsoft System Center. It was a strategic decision to opt for Microsoft’s virtualisation platform, despite VMware’s vSphere platform having deeper enterprise reach. 

“Customers don’t really care what the underlying technology is – they just want to know if the cloud services can offer them more agility and better ROI,” he says.

But Hyper-V is a cheaper option to VMware’s platform, according to Linney, and he says an inflection point has come where Microsoft’s platform is no longer the “poorer cousin” of VMware. 

“Microsoft is pumping in more money into its cloud research and development than VMware’s total profits. Besides, Microsoft’s own big services, such as Azure and Office 365, all run out of the same platform, and that results in faster and more robust development of the platform,” he adds.

Outsourcery also sells Microsoft applications such as SharePoint and enterprise resource planning (ERP) and customer relationship management (CRM) system Microsoft Dynamics as a cloud service.

Some of the emerging smaller technology companies in the UK have the potential to become the next Facebook and Google with more support from the industry, academia and the government

Piers Linney, Outsourcery

But is it difficult for a UK cloud startup to compete with cloud behemoths such as Amazon Web Services (AWS), Microsoft, Salesforce.com and Google? “We are not entirely in the same space as AWS. We are higher up the chain in terms of infrastructural complexity and are more suited for enterprise IT.”

Already on the government’s G-Cloud 3 iteration, Outsourcery supplies to local government organisations through its reseller base. “The government’s cloud-first strategy and G-Cloud policies are very helpful for UK SME cloud providers, and we are now looking to win central government IT contracts.”

Like many visionaries, Linney thinks hybrid is the future of cloud. “A private cloud is clearly an outcome of paranoia,” he says.

“There will be instances where private cloud will be needed, but for most use cases, public cloud is the way forward,” he says, insisting that cloud is all about economies of scale and public cloud offers better economies of scale.

Linney says SMEs will be able to adopt a pure public cloud format, while larger enterprises with legacy IT, complex procedures and compliance requirements will adopt the hybrid cloud strategy.

He says he hopes to see more tech entrepreneurs in the next series of Dragon’s Den, but insists that the UK tech sector is very much alive and vibrant. “There is no shortage of IT innovation and entrepreneurship in the UK.

“We may not yet have the Facebooks and Googles of the UK, but some of the emerging smaller technology companies in the UK have the potential to become the next Facebook and Google with more support from the industry, academia and the government,” he concludes.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Free disaster recovery training seminar with Jon Toigo

Disaster recovery (DR) is something no organisation can afford to ignore. And effective DR provision starts by working smart, not throwing money at whatever solution is flavour of the month among the supplier community.

Working smart in disaster recovery planning starts with clear thinking about the fundamentals of DR strategy. One way to get that is to attend this month’s free Storage Decisions Advanced Disaster Recovery seminar with Jon William Toigo at the Hyatt Regency Churchill in central London on 19 September.

StoDecLogo.jpg

Toigo is CEO and managing principal of Toigo Partners International and chairman of Data Management Institute, with a real-world track record of solving data protection challenges for large organisations. He is also a prolific writer, speaker and blogger on storage, backup and disaster recovery issues.

When it comes to IT suppliers and their “marketectures”, Toigo shoots from the hip, describing the world that IT professionals must deal with as an “infrastruggle”, in which “hardware and software vendors advance different, though equally self-serving solutions, with cloud vendors promising that they are the next big thing, and analysts cheerleading whichever vendor shells out the biggest fees for their service".

You can expect Toigo’s advice at the Advanced Disaster Recovery seminar to be just as straightforward.

The first session will look at the fundamentals of data protection, avoiding outages by defence in depth, including the use of technologies such as tape that are routinely dismissed by supplier marketing.

The second session will see Toigo provide a pragmatic assessment of the processes and technologies available for data recovery should the worst happen, asking which will really deliver on their promises. This will be followed by a Q&A session. 

Attendees will receive Advanced Data Protection Specialist Certification from the Data Management Institute.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Saturday, September 14, 2013

Microsoft launches Microsoft Ventures Accelerator for tech startups

Microsoft is offering technology startups in the B2B, consumer and gaming sectors the chance  to apply for its accelerator programme in London.

The chosen entrepeneurs will take part in a 12-week programme to help grow their businesses through mentorship, access to resources and technical assistance.

Microsoft_redmond_sign_290x230.jpg

The accelerator is looking for 10-15 startups developing technologies in financial services, electronic retail and commerce, gaming, big data or enterprise software.

A common theme between all the startups will be the cloud. Anand Krishnan, general manager, developer and platform group at Microsoft said that the cloud has change the dynamic and economics of startups in recent years.

“Startups have the ability to disrupt the market and to innovate much clearer thanks to cloud,” he said.

Microsoft will not be taking an equity in the companies, but will maintain relationships with startups through an alumni programme after they “graduate” the accelerator.

During its pilot the accelerator will be based at Central Working in Shoreditch and the startups will be mentored by businesses such as London Business School, Barclays, KPMG, Jenson Solutions, Ventures in Motion  and Penningtons Solicitors; as well as gaming experts: Train2Game, Lift London and Lionhead Studios

This is the latest in a string of incubators and accelerators that have launched in London in recent months. The startup community, which tends to be based in Tech City, an area in the east of the city near Shoreditch has flourished since 2010 when the government announced its intention to help the development of small companies.

But startups are suffering due to a severe skills shortage. The companies are struggling to find talented developers in the UK to work with which is preventing business growth.

Krishnan said that the developer shortage can be blamed on the increase in B2C companies that have ventured into the software business taking the talent with them.

Microsoft actively tries to solve these problems by running roundtables and workshops to introduce developers to new Microsoft technologies.  

“Most of the folks coming in are not veterans in the industry,” he said. “Most dabble and are looking at how to get an app up and running.”

Krishnan calls these dabblers “application builders” and said that despite the skills shortage he has never felt a shortage of energy in the developer ecosystem. "There's still plenty of buzz and excitement around it," he said. 


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Facebook and Yahoo call for greater NSA transparency

Yahoo and Facebook have called on the US government for greater transparency about the National Security Agency's (NSA) requests for user data.

At the TechCrunch Disrupt conference in San Francisco, the chief executives of Yahoo and Facebook expressed frustration over the way the government has handled NSA requests and the secrecy it requires.

confidential_privacy_data_290x230_ Jupiterimages.jpg

The public appeal follows Yahoo’s announcement it is joining Facebook, Microsoft and Google in suing the US government to publish greater detail about requests to hand over user data.

The technology firms are trying to distance themselves from the Prism internet surveillance programme revealed by whistleblower Edward Snowden in June 2013.

Yahoo, Google, Twitter, Microsoft and Facebook have all subsequently released “transparency reports” on the total number of user data requests they receive from governments around the world.

But US law prevents the technology companies specifying how many are made under the controversial Foreign Intelligence Surveillance Act (FISA) and National Security Letters (NSLs).

Facebook CEO Mark Zuckerberg said the government’s attempt to reassure people – by saying it is collecting information only on people outside the US – was not helpful to multinational companies, CNN reports.

"It think it's my job and our job to protect everyone who uses Facebook and all the information they share with us. It's the government's job to protect all of us," Zuckerberg said.

"I think they did a bad job of balancing those things here.”

Yahoo CEO Marissa Mayer said the company could not refuse the government's orders or discuss the data requests because they are classified.

However, Mayer said Yahoo was “working within the system” to pursue an aggressive approach to dealing with the US government.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

US protectionism lends Europe opportunity for Chinese investment, says HSBC vice-chairman

HSBC vice-chairman of global banking Kevan Watts has claimed US "protectionist tendencies" could give Europe an opportunity to garner investment from China.

US fears and sensitivities mean China could look to finance interests in Europe, said Watts.

china.jpg

As well as running global banking at HSBC and working at US firm Merrill Lynch for 29 years, Watts is the head of the International Advisory Council for Chinese networking giant Huawei.

Watts claimed the US had always been “the natural destination” for Chinese investment, “reflecting obviously the immense opportunity their economy offers but also the shop window of the pacific coast line of the United States.”

But current political attitudes could put Chinese companies off investing there and present a chance for Europe to become the go-to continent.

“I think Europe has a chance of attracting relatively more Chinese investment as we go ahead because the US could be less welcoming,” Watts said during an event at Huawei’s R&D centre in Stockholm, Sweden.

“I think it may be a little more challenging politically for the US to adapt to a larger and different China, whereas in Europe the nuances between individual European countries can create competition between them to attract the investment.”

Watts admitted Europe might have been overlooked by the Chinese in the past but believed things were changing, especially when it came to technology.

Watts told Computer Weekly: “In ICT, the US is particularly sensitive but, in many ways, it is just sensitive to foreign investment. 

"It is sensitive to China because China is growing fast and is increasingly the second biggest economy, even if it is a lot smaller than the US, and this creates sensitivities in the US.”

Watts said he believed the overall attitude of politicians would probably side with getting the cash into the economy rather than turning it away, but pointed to “protectionist tendencies” pushing the investment away.

Watts concluded: “There are those with protectionist tendencies in the US and in that context I think China is likely to retract a greater-than-average degree of investment.”


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Friday, September 13, 2013

Security Think Tank: Four steps to using public cloud storage

The consumer cloud storage market is undergoing significant change, with Tencent currently offering up to 10TB of free storage, and other providers such as DropBox and Microsoft SkyDrive increasing the free space they offer their customers. Should businesses take advantage of this free storage?

The answer, from an Information Security Forum (ISF) perspective, is a qualified "yes". We have examined the security and privacy issues of using cloud service providers – and of suppliers in general – and our findings can be applied to any cloud service (free or not). Our findings include:

No matter what the service is, take an information-led, risk-based approach. Start off by identifying the information you intend to place in cloud storage, the risks and impacts associated with a compromise of that information, and any legislation or regulation that applies to the information you wish to store in the cloud;Understand who and what the cloud service provider is, where it is based and what it is offering (free isn't always free);Read the contract or EULA. Free services come with fixed terms and conditions, set by the provider. You may discover rights allowing the provider to access your information, or that files will still be stored even though the user has deleted them, or that a different jurisdiction applies to the contract, rather than your organisation's home jurisdiction.Train the user. Users should be made aware of how to use the storage and any apps or devices (eg smartphones and tablets) that can access the storage in a secure manner. Importantly, educate users about what information can be stored in the cloud.40199_Security-think-tank.jpg

Underpinning the risk-based approach should be an implemented information classification and handling scheme in place, detailing how information should be classified and whether it can be stored in the cloud.

Adrian Davis is principal research analyst at the Information Security Forum (ISF).

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

This was first published in September 2013

GCHQ launches recruitment challenge

Government communications intelligence agency GCHQ has launched an online code-cracking competition with the aim of finding talented recruits.

According to GCHQ, the ‘Can You Find It?’ competition, which is being run by resourcing specialist TMP Worldwide, will challenge experienced and self-taught cryptic code crackers.

162237897-data-search-files.jpg

With job roles worth up to ?60,000 up for grabs, the competition is aimed at professional and amateur mathematicians, code breakers, ethical hackers, and IT technicians in the UK.

As well as testing if they have the right skills for a national intelligence and security agency, competitors who complete the challenge can enter a prize draw to win a Google Nexus 7 or a Raspberry Pi .

Breaking the codes will unlock a series of clues leading competitors to a number of different places on the worldwide web which will ultimately unlock the final answer.

Those with the practical ability to complete the competition could win the opportunity to join GCHQ to support the government’s national cyber security agenda.

From 11 September 2013, entrants will have six weeks to hunt down codes, which when used on the competition website will reveal the next clue.

The ‘Can You Find It?’ competition builds on last year’s ‘Can You Crack It?’ campaign, which attracted in excess of 95 million hits to its website from more than 3.2 million unique users. 

From around 5,000 applications, 170 were taken forward.

GCHQ’s head of resourcing, Jane Jones, said: “The 21st century is confronting us with online threats that are difficult and dangerous, so we want employees who have evolved with the ever-changing digital world and therefore have the right skills to combat these challenges.

“It’s a puzzle, but it’s also a serious test – the jobs on offer here are vital to protecting national security,” she said.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

£200m of Universal Credit IT could be scrapped, MPs told

A further ?200m of IT work on the troubled Universal Credit programme could still be written off, according to the government’s project management chief.

But the figure has been strongly contested by senior civil servants at the Department for Work and Pensions (DWP) who insist that a substantial amount of the IT developed to date can still be used.

42624_Department-for-Work-and-Pensions.jpg

MPs on the Public Accounts Committee (PAC) were told today by Norma Wood, interim director general of the Major Projects Authority (MPA), that “a significant chunk” of the ?303m so far invested in IT development could still be written off. Wood said the amount could be at least ?200m.

So far ?34m of IT work has already been scrapped, as revealed in a National Audit Office (NAO) report last week.

The MPA was brought in to review Universal Credit earlier this year after the death of DWP CIO Philip Langsdale. Langsdale had himself been recruited specifically to overhaul the programme after officials realised in July 2012 there were major problems.

Wood said that, at the time of the review, the functionality of the pilot system – tested in a small number of jobcentres – was very limited. She said much of the IT was “not fit for purpose” and unlikely to be re-usable in a full roll-out.

“At time of reset and review, prospects for re-using the IT were very low, it would have been a sizable write-off,” she told MPs.

“Potential for re-use may have increased since then but not close enough to it.”

However, the committee was later told by the new Universal Credit director general, Howard Shiplee, he believed more could yet be retrieved for future use. He said there was “substantial utility in what has been produced to date”.

In four weeks’ time Shiplee will complete a detailed review of the IT work done so far.

DWP finance director general Mike Driver also denied the figure of ?200m to be written off.

“That is not the case at all,” he said.

But he admitted the total amount to be written off has yet to be confirmed, pending the review of work completed so far: “It is possible we will have to impair more of our assets, but we are not [yet] in a position to do that,” Driver said.

The Public Accounts Committee cited numerous examples of problems from what chair Margaret Hodge called, “One of the worst NAO reports I’ve seen.”

Hodge quoted from a PricewaterhouseCoopers (PwC) report into the financial controls around Universal Credit that she described as “damning on the blank cheque given to suppliers”. She cited an example, highlighted by PwC, that, at one time, authority to rubber-stamp purchases had been delegated to a personal assistant.

Committee member Richard Bacon said the project had “extraordinarily loose controls” and the PAC painted a picture of a poorly managed programme with lax controls over suppliers and project management.

The MPA’s Wood agreed with assertions from Tory MP Stephen Barclay, that asking IT suppliers IBM and Accenture to conduct reviews of the value for money of their own work on the project was a conflict of interest.

“Did that worry you?” asked Barclay. “It did,” replied Wood, who suggested that conflict of interest presented a risk that the write-off figure could be even higher.

Wood said the software developed for the Pathfinder pilot projects had serious security limitations and was unable to track fraud, support cyber security requirements or provide identity assurance.  

A revised security design is currently being reviewed by the Cabinet Office before the overall business case can be signed off.

“When we did the review, suppliers were working on different assumptions and to different standards,” said Wood. “Security was being retrofitted rather than being designed in.”

Following the review earlier this year, the IT work has been split in two. The Government Digital Service is handling the front end and the interaction with users. The DWP will look after the many legacy systems involved in supporting Universal Credit.

DWP permanent secretary Robert Devereux admitted that the senior civil servants who were originally in charge of the project had to be replaced, suggesting they were not listening to those around them.

“There came a point when they were no longer on top of it,” he said.

The key executives at the time were project chief Malcolm Whitehouse and business IT head Steve Dover, although nobody was mentioned by name in the PAC meeting.

But Devereux insisted that, having realised the project was in trouble and conducting a thorough review, Universal Credit was now on track and will be delivered on time in 2017.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });

Thursday, September 12, 2013

Wick Hill and Guidance Software partner to help UK businesses with security

Value-added distributor (VAD) Wick Hill and US-based security firm Guidance Software have joined forces to help UK businesses better address new and evolving cyber threats.

Wick Hill supplies organisations with secure IP infrastructure from enterprises to small and medium-sized enterprises (SMEs) through a UK-wide network of accredited value added resellers (VARs).

handshake.jpg

This agreement adds support for Guidance Software’s digital forensics, cyber security and security analytics products to that network, said Ian Kilpatrick, chairman of the Wick Hill Group.

“Most companies have a trusted advisor within a VAR. Now those trusted advisors will be able to recommend Guidance Software where appropriate with full support,” he told Computer Weekly.

According to Kilpatrick, VARs tend to be reluctant to recommend systems for which they do not have full support for fear of risking their reputations as trusted advisors.

Through its partnership with Guidance Software, Wick Hill will provide its UK VAR network with the confidence they need through training and support alongside the supplier, he said.

Support from Wick Hill includes technical and consultancy support throughout the sales process to ensure successful implementations.

This will enable Guidance Software to scale up its support across the country, multiplying the reach and support of the 65-member UK team, said Sam Maccherola, vice-president of sales in Europe and Asia.

For many UK companies this will mean gaining one more option for protecting critical information through current suppliers, as well as increased support for existing Guidance Software customers.

Kilpatrick said one of the biggest challenges for UK companies is to be more proactive about cyber threats, and that Guidance Software will be key in the recommendations by many trusted advisors.

“For threat visibility, organisations need a security solution that provides a total overview, is increasingly granular, and can integrate with the existing security investment,” he said.

After cyber attacks, organisations need to be able to carry out forensic investigations to uncover any intellectual property theft, employee fraud, and employee policy violations, said Kilpatrick.

“They also need to preserve the evidence, and Guidance Software has considerable expertise and products in all these areas,” he said.

Guidance Software's Maccherola said the risk and cost of data breaches has grown significantly for public and private organisations, and consequently mitigating the risk of critical data loss is a top priority.

“Wick Hill and its network of VARs understand that visibility at the end point is a critical factor in mitigating the risk to critical user and customer data,” he said.


Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy$("a#eproductLogin").attr('href', function(i) { return $(this).attr('href') + '?fromURL=' + regFromUrl; });