Posts Tagged ‘applications’

Battling Shadow IT

June 2nd, 2014

Shadow IT is no longer in the shadows but has become a topic of serious boardroom deliberation among enterprises and people who take care of IT in the companies. A number of Indian enterprises have also stepped into the room to take note of the repercussions and pitfalls associated with shadow IT. Technology purchases and management, in a number of cases, are being done by non-IT managers and employees across the company, including executives. And, by the way, also IT employees themselves. The purchases by the non-IT executives are allowing the influx of untested technology into the company.

SHADOW IN LIGHT

Well, the definition depends on your interpretation which might vary from individual to individual or from company to company. But the existence of shadow IT can not be ruled out, since it exists in every company, enterprise, and market. In any company, shadow IT paves inroads through employees who insist on using their personal devices, such as iPhone, iPads, smartphones or apps to access business applications. Today there are multiple ways to describe it, since in many cases shadow IT comes into play due to buying by multiple people or heads in the organization.

What describes it best is a Gartner explanation. “In the past, shadow IT was often the result of an impatient employee’s desire for immediate access to hardware, software, or a specific web service without going through the necessary steps to obtain the technology through corporate channels. With the consumerization of IT and cloud computing, the meaning has expanded to include personal technology that employees use at work (see BYOD policy) or niche technology that meets the unique needs of a particular business division and is supported by a third-party service provider or in-house group, instead of by corporate IT,” writes David J Cappuccio, Research VP, Gartner, in a blog post.

Enterprise IT (both software and hardware) which has not been bought or built with the IT team’s approval or support is commonly used in most of the companies and so is shadow IT. “These are often systems that the enterprise IT teams are unaware of and hence they term it ‘shadow’. It has a negative connotation, as typically these systems come into the IT team’s radar only when there is an incident related to failure, lack of support, data security, fraud, compliance or audit,” opines Samir Khare, Chief Information Executive, Fullerton India Credit Company. In his opinion, the simplest examples of shadow IT in any company are the extensive use of macros based on Excel or equivalent tools which are often written by end users and usually never known to the enterprise IT team. Some other examples are the cloud solutions on storage (Dropbox, Google Drive, etc), cloud solutions on compute (AWS, etc), personal computing devices especially once concepts like BYOD have been deployed in an enterprise.

TOO MANY COOKS

Clearly, the core reason for shadow IT seeping into an enterprise is often the same across industries viz. employees’ need for immediate and cheap technology solution to automate or resolve the problem at hand instead of waiting for a structured solution which is designed keeping in mind the company’s objectives and can be supported and maintained by the IT team. At least Khare puts this view very strongly. However, there is a big shift as far as buying technology is concerned. In many companies, technology buying is being done by various people in different roles in the company without the knowledge of IT department. Hence they have not tested the solution and so approved. It often leads to shadow IT spread in the company. “Technology buying done by business managers often brings applications into a company’s system which are not tested or in some cases deemed fit. Even if they have bought licensed applications, it is very important that these applications are bought in connivance with the IT department in order to eliminate shadow in the company,” regards Satyajit Sarker, General Manager, IT, DTDC Courier & Cargo.

Hence there is little control of the IT department on other departments as far as technology buying is concerned. For applications to sync with the overall IT system is important and is only possible if the IT department tests the applications before they are deployed. But often executives take this risk. “Often executives are not aware of the consequences the applications they have bought for their department can cause any inconsistency to the enterprise network,” adds Sarker.

Source:http://www.dqindia.com/dataquest/specials/215442/battling-shadow-it

Telstra to focus on software and applications: Thodey

May 23rd, 2014

Telstra’s evolution from a telco to a global technology company is gathering pace, with chief executive David Thodey flagging the company’s aim to be front and centre as a technology enabler in the coming years.

Speaking to Business Spectator, Mr Thodey said while infrastructure will still be a critical component of Telstra’s future, there’s a clear impetus for the telco to enhance the value creation proposition in the health and education sector.

Mr Thodey said that while connectivity is a key enabler, Telstra is focussed on becoming stronger in software.

“Software is sort of the energy which enables people to do things differently, and hopefully those businesses would be both very strong in Australia and globally,” he said.

“We would be hopefully a global company with a strong base in Australia, strong in software across industry solutions, working around the world. That would be where we see it.”

With regards to the technology roadmap, Mr Thodey said that Telstra has to re-orient itself to be an enabler of the use of technology in a post-NBN environment and dive into applications and software.

“The wonderful thing about software is the global industry, and you’re not bound by physical infrastructure,” Mr Thodey told Business Spectator.

Telstra is still locked in NBN negotiations with the Coalition government and Mr Thodey reiterated that the government needed to clarify its position on whether NBN will be the only wholesale network in Australia.

“If they want to change that assumption, they must maintain a level playing field where anyone can go and invest in competing infrastructure,” he added.

Source:http://www.theaustralian.com.au/business/latest/telstra-to-focus-on-software-and-applications-thodey/story-e6frg90f-1226928571746

Freescale Collaborates with Neusoft and Green Hills Software to Deliver Development Ecosystem for ADAS Vision Applications

May 20th, 2014

Freescale Semiconductor FSL +1.65% is collaborating with Neusoft Corporation (“Neusoft”, SSE: 600718) and Green Hills Software to establish a comprehensive Advanced Driver Assistance Systems (ADAS) ecosystem designed to dramatically speed and simplify the creation of next-generation automotive vision applications.

As ADAS vision systems grow to encompass a greater portion of vehicle braking and steering systems, developers and systems designers need turnkey solutions that address stringent protocols for automotive safety, and are compliant with the ISO 26262 functional safety standard. This purpose-built ADAS ecosystem is engineered to meet these challenges by streamlining the time-consuming process of developing and porting complex algorithms to target hardware.

The collaboratively developed solution integrates CogniVue Corporation’s APEX Image Cognition Processing (ICP) IP available from Freescale with advanced, silicon-aware software from Neusoft’s ADAS vision applications, and the safety certified INTEGRITY® operating system and MULTI® tool chain from functional safety expert Green Hills Software. The result is a comprehensive off-the-shelf ADAS vision solution built on an ISO 26262 ASIL assessed software foundation. Specific applications include pedestrian detection, traffic sign recognition, collision avoidance and other advanced ADAS capabilities.

“Pairing sophisticated object recognition and identification technologies is a key step to bridging first-generation ADAS products toward the autonomous vehicles of tomorrow,” said Ray Cornyn, vice president of Product Management and Global Marketing for Freescale’s Automotive MCU business. “The expanding role that vision ADAS technology plays in decision making and real-time object identification tasks positions companies focused on safety-oriented vision systems – such as Freescale – for future success.”

“We are proud to be part of this promising ecosystem and to contribute with our real-time object recognition technology that is the result of more than ten years of research and development,” said Guodong Jian, vice president of Neusoft and co-president of Neusoft Automotives. “OEMs have long been waiting for more flexibility and improved time-to-market, which will be the foundation for wider adoption of ADAS technology.”

“Green Hills applauds Freescale’s foresight in partnering to develop a comprehensive, well constructed ADAS vision application platform designed to address performance, functional safety concerns and core algorithm availability essential for any next generation ADAS system,” said Dan Mender, vice president of Business Development for Green Hills Software. “By working with Green Hills, Freescale can help its customers achieve significant reductions in time-to-market and development costs by utilizing proven, mature ISO 26262 functional safety assessed products, in addition to its comprehensive safety design and certification services.”

APEX processor technology enables extraction of application-specific information from a scene and interprets the image data to make decisions or take actions based on the extracted data. Freescale licensed CogniVue’s APEX-642 ICP core IP in 2012 and is the exclusive provider of this technology to the automotive market.

Source:http://www.marketwatch.com/story/freescale-collaborates-with-neusoft-and-green-hills-software-to-deliver-development-ecosystem-for-adas-vision-applications-2014-05-19

Get Adobe Flash player