The Digital Transformation – Advice to a CEO

DigitalTransformation

Tell a CEO about all the exciting trends and possibilities we are experiencing as part of the digital transformation and they are going to ask “What’s the bottom line?” We can’t give $$ based answers to that question outside of a specific proposition, but we can focus on results and ramifications.

LittleBlogAuthorGraphic  David Hodgson, February 24, 2016

Often commentators like myself will focus on the causes and drivers of change, and this can be useful. But this blog entry will focus on what I see as the three main overarching results of the ongoing digital transformation.

This analysis may make specific ramifications clearer to a CEO and help them see how to adapt a strategy to both survive and maybe gain a competitive edge. It is a generalized overview. As a CEO you must answer your own specific questions to see and create the results that will allow you to successfully compete.

#1 The digitization of all we use and touch

A convergence of technical breakthroughs and economic forces is now setting a course for the digitization of everything. This includes the mundane, like images, texts and music, to the incredible, like genomes, body parts and our very thoughts.

Digital forms are always more flexible, lower cost and ultimately more valuable than their physical equivalents, because of the ways they can be re-used in the digital world.

Any business that thinks it won’t be impacted is likely to be the next to go bankrupt. No industry or job will remain the same and many will cease to exist.

What digital assets do you have, or should you acquire to compete in this new age? Can you be the leader in transforming your area by transforming something important to a new digital form that could amplify its value? Could you leverage a new source of data, or an API from one of the new digital players?

#2 the democratization of playing fields

In his book “The World is Flat”, Thomas Friedman explains something he labels as “Globalization 3.0” which has had the effect of leveling the global playing field in terms of commerce. Underlying what he describes, are the same forces behind what we now call the digital transformation.

But commerce is just one playing field that is being leveled. We can now all have access to knowledge, tools and perhaps most importantly, communities, that enable us to be artists, scientists, musicians, developers or inventers. Whatever we want to do. Few domains of activity remain exclusive to an elite in the same way as they used to be.

This does not mean that there aren’t economic and power elites. In fact within many communities (like the USA) the last decade has seen an economic polarization and a concentration of money and power. However, globally we see a flattening and ultimately I think that the forces of the digital transformation will make massive polarization impossible within any community. But then I have always been a technological optimist.

CEOs must realize that the forces of digital transformation have empowered consumers and small business more than large companies. In many cases power is being fragmented and distributed and this has largely been through the app and the smartphone as tools of digital conveyance. For example, banks have to compete harder to retain fickle customers who can now switch easily. Teenagers don’t have to buy an album to hear the one song they like. Alternate offerings are easily compared and there is always a new competitor.

What do your customers really want? What is changing about how they want to consume or use what you have to sell? It is imperative that your strategy focuses on gaining a competitive edge via the experience and value you deliver to the “users” of your digital assets.

#3 the disruption of incumbents

Facets of the first two results I have described above, combine to create this third result. Generally speaking, because of the digitization of everything and the leveling of playing fields, the cost to entry in any business area is greatly reduced.

It costs so little to set up what would have been considered a sophisticated business just a few years ago that it becomes effective for small startups to offer products and services for “free”. Incumbents used to near monopolies, or established customer bases, might have been charging premium prices for what can now be offered massively cheaper.

The software industry is being turned upside down by open source software. Amazon offers cheap IT infrastructure. The hotel industry is being threatened by Airbnb turning a community of individuals into an unstoppable competitor. We know what happened to Blockbuster.

Sometimes, as with Uber, the incumbent is threatened mainly by what the user perceives as a more attractive experience. For Uber this would be easier access, better quality and a reasonable price as compared to taxi’s and regular car service.

Death or Glory

The CEO of an established firm must realize that it is death or glory for incumbents. Who are your new “Digital Transformation” competitors? If they aren’t here yet how could they appear? – what is it about your current business model that could be a weakness in this new world.

In summary my advice is that it is transform or be transformed and you must embrace all Clayton Christensen’s thinking on the “Innovators Dilemma” to engage the issues.

 

Image credit: McKinsey

Advertisements

How mobile-to-mainframe apps help you get more from your mainframe

MobileApp

Mainframes are here to stay and are more relevant than ever before in the application economy – so it’s time your business thought about “reframing the mainframe”.

LittleBlogAuthorGraphic  David Hodgson, October 19, 2015

Too often in a haste to rush towards the future, we easily eschew what we did in the past. But as companies race towards an increasingly connected world where customers are more demanding than ever, there’s a machine in the background, underpinning the business and driving some of the most important apps we use every day on our smartphones. That’s right, folks it’s the mainframe.

Mainframes are here to stay — after all, millions of lines of COBOL code continue to run the most important business applications in the world. That’s why we need to reframe the way we think about the mainframe.

In fact these days, mainframes are expected to do far more — from providing easy data access for big data projects to supporting cloud and mobility. The specialized skill sets required by the mainframe team are becoming even scarcer and most IT departments are under pressure to keep costs down.

That’s where reframing the mainframe comes in. Recognizing that success in the application economy will require investment in the mainframe and that the investment will directly grow your business. The rise of mobile-to-mainframe applications is a key driver here.

The mainframe at play in the application economy

In my first blog post in this series, I talked about the curse and blessing of connectedness for the mainframe in the application economy. It’s this same connectedness that is empowering customers like never before.

And in my second blog post, I talked about how the customer is always right — so it’s incumbent on mainframers to create flexibility for the mainframe platform of the future. The interplay between cloud and the mainframe has presented new opportunities, including Linux on z Systems.

The three largest banks in the U.S. already have 50 million customers using mobile banking — and that adoption rate is growing at a rate of 15 percent annually. Even checking your bank balance on a mobile phone requires hits back onto the critical transaction-processing component of the data center.

To connect mobile-to-mainframe apps, developers need processes and tools that span the divide. This helps to speed up time to market and improves quality with software change management.

Past legacy equals future innovation

Moving forward, the most successful organizations will evolve from supporting legacy business processes to driving innovation.

How will they do this? They’ll develop applications exploiting mobile-to-mainframe architectures that are managed as a whole, not within silos, allowing greater visibility into operations and performance.

This empowers IT staff to perform tasks and access relevant information to accelerate service delivery. Workloads can be more easily orchestrated to run on the best-suited server — the cloud, distributed or mainframe — and data is transformed into insights to drive opportunities.

Learning to become Agile

And it’s already happening. The proportion of professionals with four or more years of Agile adoption at their firms has increased significantly, according to analysts. Many teams are already leveraging core Agile practices: 20 percent are using Agile from ideation to deployment (including DevOps), while 51 percent are using Agile in the upstream.

“Behavioral change is the biggest barrier to adoption; properly skilled business product owners are also a big impediment for Agile adoption success,” according to analysts. “Organizations are finally realizing that the lack of cross-functional teams is one of the top impediments for successful Agile adoption.”

Managing mainframe costs as a strategic asset

What we often hear from customers is that it’s hard to justify the cost of their mainframe platform. Mainframes, however, can be managed as a strategic asset that creates value — if you create mainframe platform flexibility for the future.

According to analysts, the top three benefits of becoming Agile are better business and IT alignment, faster delivery of solutions and more opportunities for midcourse corrections.

The right testing tools can help you deliver higher-quality applications faster, while keeping costs under control. Integrated Application Quality and Testing Tools from CA Technologies, for example, are designed to help you test, diagnose and fix problems in mainframe applications quickly — before issues affect application performance.

By reframing the mainframe and connecting mobile-to-mainframe applications, you can reduce costs, improve efficiency and reallocate resources to more strategic business initiatives. You’ll maximize what you already have, while integrating new service offerings — turning your mainframe platform into a competitive differentiator with potential new revenue streams.

 

Colorful fall insights for reframing the mainframe in the application economy

SaveColors

Usher in the changing of the season with CA’s Virtual Summit in partnership with InformationWeek and gain insight into how to run your business better.

 LittleBlogAuthorGraphic David Hodgson, September 28, 2015

Like clockwork, fall is in the air and this is my favorite time of the year: the crisp, cool air, the changing colors and a sense of acceleration as we head towards the holiday season.

For myself, the fall ushers a fun, frenzied but fulfilling pace at work – so much that has to get done and of course don’t we all love it – making sure we are doing right on our commitments to the business and planning for next year. As I speak to many of my colleagues and customers, I am learning mainframers are in a similar frenzy figuring out questions such as:

  • Will our current capabilities around monitoring and automation be sufficient for new growth and compliance demands of my organization?
  • How do new options around Linux on the mainframe offer us greater flexibility in our hybrid data center plans?

Join CA and InformationWeek on September 30

So, just in time, I am really excited about the upcoming Virtual Summit CA is hosting with InformationWeek“Mainframe Reframed for the Application Economy” on Wednesday, September 30, 2015.

The change of colors is a nice metaphor for our clients’ new mission, internal transformation and conversation around “mainframe reframed.” Should we really be spending our time continuing the debates and defensive stances about the mainframe?

A much more productive conversation is one about the business value and growth the mainframe can help you deliver. That’s why I urge you to take a day to connect and catch up with us.

Here is a quick sneak peek of sessions you shouldn’t miss:

  • Linux & Open Source: Driving New Innovation and Value on your Mainframe: Join a panel of industry experts from IBM, SUSE, Brown Brothers Harriman and CA as they discuss the new Linux and open source options, and what the new Open Mainframe Project consortiummeans to you.
  • Reframing the Mainframe to Thrive in the Application Economy: Join Gary Barnett of Ovum and myself, as we cover a variety of issues that combine ideas to improve overall enterprise performance, including advancements in DevOps, mobility, data management, network performance, data security and mainframe performance.
  • De-Siloing End-to-End Ops in an Increasingly Trans-Platform World: Join a panel of experts to learn how IT organizations are unifying ops across platforms to keep their multi-platform front-ends, mainframe back-ends and hybrid clouds all working together in harmony.
  • Apps and Ops: Keys to a Superior Customer Experience: To deliver great customer experiences, IT has to develop awesome apps and ensure the availability and performance of those apps with equally awesome ops. Get actionable insight into addressing some of your DevOps challenges as we explore the apps and ops approach to reframing your mainframe.

Last but not the least – you asked and we listened. We are committed to you – our user community – and making sure you are successful as you reframe the mainframe in your organization.

The Virtual summit is designed to help you catch up on the latest updates to key solutions that help you run your business. In addition to keynotes, the virtual summit hosts 15 booths for live-updates, demos, videos, on-demand tech-talks with product experts spanning application development, testing, automation, infrastructure, operations, performance, storage and security.

The summit environment will be live for 12 months so you can come back for quick refreshers or find what you need.

Grab some coffee, tea or apple cider and join us on September 30, 2015. It will be informative and fun.

Connectedness for the mainframe in the application economy: blessing or curse?

Network.png

With the mainframe online and connected to apps that people use every day, the proximity of users on the mainframe has never been closer. So how should businesses think about security in the application economy?

LittleBlogAuthorGraphic  David Hodgson, August 20, 2015

I recently discovered an app that dials you into conference calls without the hassle of having to dig up phone numbers and participant codes. All you have to do is put your network ID and password into the app once and you’re off.

This begs the question: What is being done with this data and is it secure? What if at the other end is someone sitting in a café halfway around the world, calmly sipping a latte while receiving data from the app and using it to access your company’s network or maybe even the mainframe.

In a white paper I recently authored: “Mainframe Reframed for the Application Economy,” I explore the implications for the mainframe in today’s application economy and the need to reframe the mainframe for this new era’s demands. I point out that as this digital transformation is occurring, where we’re interacting with companies more through the palm of our hands than face to face, there’s pressure mounting on all areas of IT, including the mainframe platform.

The curse of connectedness

The application economy is driving the need for transparency, availability and reliability to meet customer demand in an always on, 24-7 world.

That very connectedness which makes apps like the one referenced above possible in the application economy is also shrinking the proximity of people to enterprise systems, including the mainframe, exposing businesses to unprecedented security risks.

With many high profile security breaches of late, the old “fortress” security mentality of keeping the bad guys out is no longer the prevailing approach to guard against the bigger risk – the people inside your organization, who often times do not realize they are creating vulnerabilities, or sometimes are themselves the threat.

Security is now more about detection and compliance than it is locking people out. More specifically, that is:

  • Knowing who is in your network
  • What they are doing
  • Whether they should be doing that.

A savvy auditor is certainly going to ask you how you would know if someone accessed data they were not supposed to.

In these days of rampant identity theft, people are not always who they appear to be. Once hackers have phished someone’s credentials the only way you detect a breach is when they start doing something anomalous. Social engineering is now much more sophisticated and your ‘trusted’ mainframe expert in the data center is as susceptible to social engineering as anyone else.

Remember also that as mainframe experts retire the very lack of skills and know-how left in their wake could inadvertently open new doors if proper transition plans aren’t put in place. That way, businesses can take action early when they know something is amiss.

Security breaches haven’t seen anything yet

While to-date, relatively few security hacks involve the mainframe, think of the impact of something such as the recent breach of U.S. computer systems for visas and passports and how much worse that would be if it was the mainframe of a major bank or airline, for example.

A recent MIT Technology Review article discusses how the mainframe, which has been around since the 1960s and houses some of our most precious data from banks, airlines and governments, has been put online, exposing it to a previously unknown world of cybercrime. The article goes on to quote security researcher Phil Young, who said he has found around 400 mainframes on the Internet prompting a login screen to anyone who connects.

Mainframe modernization or exposing the classic system of record data to new services means that the data is no longer isolated on the mainframe – the world is now “unknown, unknown.” We have lost sight and control of where the data is going the minute we try to harness mainframe data for other purposes than batch or transaction applications.

Think of the potential and, more importantly, the scale of damage. We’re not just talking about one database of customers of a retail chain – this would be something more far reaching than we could ever imagine.

How to catch a thief before they act

So how can organizations build the ability to detect problems before they arise into the mainframe platform? I came across this post by bigendiansmalls.com that shows how to use USS shell script to create a C program that can be piped over a network to run on z/OS. Fundamentally, it’s the same as how you’d do it for any other platform, just that you have to generate z object code and call different system devices.

While this is simply one vector into a system, it’s possible to create a product (or put it into an existing product such as CA Auditor for z/OS) that can scan for these vulnerabilities on a system, plug them and report on the number of times these attempts were blocked.

Last but not least, such news about technical exploits helps, but there is a huge cultural and communication barrier for mainframe security professionals in getting the broader organization and the rest of the security community to understand the risk. There is still a culture of denial or, “Wait my mainframe has never been compromised.” This is why we believe the mainframe reframed discussion is a timely and thoughtful conversation we need to have as a community.

If you want to find out more about how the mainframe is being reframed to handle the new security threats in the application economy, join us at CA World ’15. We will be giving a number of talks about security across platforms – including mainframe security in sessions such as “Castle Walls under Digital Siege – Risk Based Security for the z/OS.”

You will learn how identity can be applied to engage, serve and protect customers while they interact with your digital business – and make the connectedness we all enjoy in the application economy a blessing rather than a curse.

The answers to your Big Data questions are everywhere

StarrySky

I follow up my previous post with questions that you should be asking yourself when it comes to getting more out of the data your organization probably isn’t using – unstructured data.

LittleBlogAuthorGraphic  David Hodgson, March 3, 2015

Where is unstructured data? As they said about 60s radio series character Chickenman, “He’s everywhere!”

It’s inside your organization under your nose, and outside your organization ripe for the picking like low hanging fruit and in strange places needing a degree of pre-processing and parsing.

In my last post I talked about the power of combining structured and un-structured data to unlock the business value realized by recent revolutions in data analytic technologies. But what is unstructured data? If 80 to 90 percent of the data that you have today is unstructured what is it? Where is it? How can it be used? And how can you get more?

Given that 80 percent of the valuable business data that most companies use today is structured data, this means they’re not getting business value from the majority of the data available to them right now.

You must accept this challenge: the winners in the application economy will be those that find business value in unstructured data and use it in combination with the structured data that undergird their existing mission critical business systems.

Being the Biggest loser is not a positive statement in the world of Big Data!

The big picture: what is it and where is it?

What is it? Any source of information that doesn’t have a defined format or structure intended for generalized data processing as rows and columns is probably unstructured or semi-structured data and could be valuable to you, including a report, a log, an image, a form or any sort of document or file.

Even Excel files that are visually organized in rows and columns are considered semi-structured data for the purposes of this discussion – only the Excel application knows how to do anything with it. In the big picture, this isn’t very useful.

Inside your organization think of where the most valuable, prescient data really is: could it be in notes people take, emails that people exchange, Excel spreadsheets they create, logs of their activity, CRM records or social media interactions with customers?

Sure the reference data in your business systems is critical, but the data that is driving daily business decisions and longer-term strategic decisions may be elsewhere. Could you access that? Would it be valuable if you could?

Outside your organization, where is the data that describes your adjacent markets, or the next innovation that you will (or should) either create or capitalize on? Where is the low hanging fruit? Only you know really but could it be on news websites, in discussions on social media, stock price reports or in SEC filings on company websites? Could it be on a government website that lists foreclosures, or competitive bids, in weather reports or news reports? It could be anywhere accessible via the Internet.

Sure your employees could read all this stuff and process it mentally to your advantage, but can they really and do they? How could you get hold of it in an automated way if it was valuable? This is the low hanging fruit usually available through published APIs, for purchase, or collectable using simple and free open source tools.

The big secret: how do I get hold of it and where do I keep it?

Unstructured data usually requires new tools and processes to extract intelligence and deliver business value. Absent of structure you need ways to extract or create context and metadata about the data: what is it about, when was it created, when and by whom.

For the goal and purpose we are discussing this metadata cannot be created manually. To be useful, these processes need to be scalable and in real-time. They also need to be relevant to business and they can’t cost more than their derived value.

Enter the magic of open source tools and commodity processing power either on-premise or in the cloud. Without these ingredients you would not be able to get hold of Big Data or store it in a cost effective way.

Forget your conventional data warehouses – while they’re not going away, they’re also not your go-forwards tools. In the age of the Internet of Things (IoT), you will be looking at one or several of the new file systems and so-called NoSQL databases that are available today.

The table below gives some idea of the popular offerings available and what you might use them for. What is it you want to do?

SarahTable

How can I be the ‘biggest winner’?

You can’t be the ‘biggest winner’ without asking the right questions and finding the answers. All the questions above, and the specific questions for your business will help you uncover your own secret sauce. Will you mine data others have collected, or create a new collection for yourself?

Take a look at what other companies have done:

Twitter has got millions of people to enter their thoughts on every subject under the sun. LinkedIn has got people to enter their career summaries and their contacts. Nike found personal health data. Some clever electronic medical records vendors have found drug usage data. Every web-commerce site is a potential source of profiling data and geospatial data.

To ensure you don’t get left behind, ask the questions, get engaged with the potential for your business and carve out your winning, differentiated position in the application economy.

After all, the answers are everywhere.

Image credit: Sergei Golyshev

How security can be the key to your castle

Castle

In the application economy does security help or hinder your business?

LittleBlogAuthorGraphic  David Hodgson, September 23, 2014

Traditionally people view security like a castle moat. That is a great start but while a firewall with strong authentication is good it is not enough. Conceptually it does not go much further beyond: “Stop, who goes there?”

We are constantly seeing examples of people finding ways under, over or around our moats and in the current digital era this problem is getting worse. The fortress mentality just doesn’t work well in our highly connected world.

A wholly, more sophisticated approach is needed. One that keeps our resources secure, but doesn’t involve the ‘clunkiness’ of heavy security that ends up hindering your business.

With this post I complete the four-part series about navigating your journey in the application economy – exploring the topic by drawing allusions with my daily walk to work and back. The four principles I have suggested are:

 

In this post I’ll cover the topic of security.

Untethered capability

I quickly found out that wearing a tie while walking to work in Manhattan is a killer – I need much more air circulation around the neck area when moving at speed, particularly in the warmer summer months. So now I keep some ties at the office.

Keeping that tie in the office is a security feature for me in case I feel the need to put one on for an important meeting. Now I don’t have to slow down my walk and secure at work.

If your security slows down your employees or your customers it is holding your business back. In today’s connected world a well thought and thorough security strategy is critical.

We cannot deny the benefits of the cloud, but we need policies and tools that enable BYOD and the use of tools like Dropbox, not a police-state mentality that blocks useful activity. Security in the application economy must allow seamless application experiences while being sure that only authorized people are using the services.

The answer for the application economy is content-based data placement and content-based access to data, coupled with a much stronger concept of identity. We need a stronger sense of who is doing what and a stronger definition of how to do it.

However, it must not be restrictive to the user experience, because today’s user of both internal IT and consumer apps has choices, and if one service is slow or hard to use, they will use another that is easier and faster.

Who goes there and why?

At CA Technologies we have solutions for single sign-on and two-factor authentication. We also have the leading solution for credit card authorization that can dynamically detect anomalies and decide if a greater degree of authorization is required.

And new for the mainframe, we are developing content based access control that will allow you to set up policies to control access, changes and movement of data based on what it is rather than what container it is in. This will maximize usage and streamline management while ensuring good control and compliance with regulations.

The possibilities for this are awesome and much needed in today’s Hybrid Cloud infrastructures. Our new Cloud Storage for System z (CS4z) allows applications to seamlessly place tape data onto on-premise, private storage clouds or at public providers like Amazon and Google.

This is an incredible break-through in flexibility for the mainframe. But how do you manage that data placement? How do you stay in compliance with the latest regulations? Do you even know for sure what is on those 10-year-old tapes?

Awareness of data content allows both policy based data-placement and policy-based access control. So old reports that don’t contain personal information can be stored on Amazon Glacier but confidential information must stay in-house.

And if you connect identities to roles, you can limit access to data not only by a file name but also by the metadata that describes the sort of data that the file contains. This is an approach that will be safer, more adaptable and will expand securely to your business needs.

Arriving Home

The best part of my daily commute is of course the walk home. I hope you found value in this series and it helps you along your journey into the application economy.

We are right at the start of our journey and we are all learning from each other. I’d love to hear your stories. What security challenges have you bumped into along the way?

If you have solutions that help Development integrate tightly with Operations, I would love to hear about them too. Just leave a comment below and I’ll be sure to reply.

And I hope our paths will one day cross somewhere along our travels.

Image credit: Ashitaka San

Tips to make DevOps the newest best practice in your organization

Team

In the application economy how does Development mesh with Operations?

LittleBlogAuthorGraphic  David Hodgson, September 15, 2014

DevOps describes an IT culture for developing new application features and rolling them out to the user base at a rapid pace without disrupting operations.

It probably represents a profound change in your organization’s IT culture, a change that adopts agile and lean practices and requires breaking down operational silos so that constant changes can be coordinated to avoid catastrophe.

I am in the middle of a four-part series on how to best navigate your journey into the application economy, drawing allusions with my daily walk to work and back. I introduced four principles and so far we have covered:

 

In this post I’ll discuss the importance of DevOps to your success in this new era of IT.

On my morning walk up 5th avenue I like to keep moving rather than starting and stopping, and yet I have to cross 28 streets. To do this I must look ahead, predict what the next traffic lights are doing and I adjust my pace so I never stop walking.

DevOps is a bit like this. The challenge is to ensure that an application rollout is never prevented by an operational limitation and operations are never impaired by the rollout of a new or changed app.

Mainframe applications are alive and still running the economy

Since one focus of this blog post is the role of the mainframe in today’s IT, it is worth noting that few companies are doing new application development on the traditional mainframe.

A few are starting to write new Cobol and Java apps to run on z/OS, but these are the progressive minority who are taking advantage of the huge improvements in System z. Most are maintaining their Cobol base, amending it as needed to adapt to business needs.

All IT groups are focused on mobile apps and distributed systems that frequently send transactions back to the mainframe or link to the heavy lifting, mainframe applications. Even without major new application development, Mainframe applications are alive and running the economy.

CA AppDev or DevOps strategy for the mainframe focuses on solving the problems of rapid change in distributed applications that send transactions to be processed by backend application code and transactions on the mainframe.

Relationships are based on communication and understanding

The number one DevOps problem we have heard from mainframe customers is that the development groups working on mobile and web apps do not understand the impact of changes on the mainframe.

Worse, once something is rolled out, the potential bad effect may not be seen for a few weeks until a peak load when the mainframe CPU spikes and causes a failure somewhere else. The root cause is much harder to find in that situation.

It is imperative that such changes are tested with tools like CA LISA Service Virtualization so that impacts to the mainframe are known in advance. It is important that code changes across platforms are coordinated (between Harvest and Endevor for instance) and can then be packaged and rolled out in a controlled way with a tool like CA LISA Release Automation.

What customers really need is end-to-end workflow coordination of the develop, test, rollout and maintain lifecycle. This means clearly communicating among the different groups so that everybody knows what has changed and has the same understanding of the impact of those changes.

And of course you need to be free to choose your tools for this to allow you to use multiple tools or have the agility to change if you want to.

I hope you can join us at CA World this year because we will be showing you where we are with delivering on this DevOps dream and I think you will be surprised.

It’s as clear as a bell

As St. Thomas’s bells chime 8 a.m., I cross over 53rd and into the office. The harmony reminds me of all the parts working together and the sound reminds me of that expression, “It’s as clear as a bell”.

To achieve your DevOps vision you need organizational clarity and effective communication.  If you have solutions that help Development integrate tightly with Operations, I would love to hear about them in comments below.

In the new world of the application economy, we are all learning from each other and sharing will help the industry accelerate.