ITIL improves the relationship between the business and IT

The most successful business can usually demonstrate a healthy relationship with its IT department. This is because over time IT has learnt what it is that the business require from technology and as a result have been able to design and deliver IT services that meet the needs of the business. This in turn can be seen as an enabler of the success of the business as a whole.

A very simple conclusion can be drawn from this and that is that if an IT department delivers to the business the IT that it wants and needs, then the business will be more inclined to listen to the advice of IT on technical matters in the future. There is also an increased likelihood that they will provide sufficient investment to meet future requirements. In other words business and IT will get on well with each other – a happy marriage!

Handshake through a laptop screen

Business and IT need to get on well

However, we’ve all probably been in the situation whereby the business is extremely demanding of IT. Where the business itself identifies technical solutions, before even identifying its needs. Where budgets are cut whilst demands continue to increase. Certainly in such circumstances, the IT professionals strive to perform as best they can, but frequently fall short of meeting the lofty expectations of the over demanding business community. This often results in more cuts and/or poorly managed outsourcing activities. The end result here is typically increased dissatisfaction, which in turn can easily lead to reduced business productivity and ultimately increased costs overall. Most definitely not a happy marriage!

The ITIL best practice framework is designed to improve the relationship between IT and the business. By building bridges between the two, the improved communication will help to ensure increased alignment between the IT delivered and the specific needs of the business. This in turn cannot help but improve productivity, both for the business community and IT itself.

An IT department should not be run from its own remote silo. Rather it should be considered part of the business as a whole and indeed central to the success of that business. ITIL facilitates a good working relationship between the business and IT, which can only be beneficial to both parties.

As the saying goes…. It’s good to talk!

Does Security Have to be Technical?

I had been a software engineer for at least 3 years specializing in digital security. A month ago, I attended a small workshop which talked about IT Security for corporate and the speaker said this somewhere in the middle of the workshop:

“Security is a process. It does not have to be really technical and the most important part is the process.”

I stunned for a while and suddenly my mind wondered away from the workshop deeply thinking, what is the speaker trying to deliver? I started this serious thinking simply because it is not said by some non-technical or sales person. Instead, the person speaking in front of me is a Certified Ethical Hacker.

A padlock key on a keyboardAt the end of the workshop, I begin to understand what he is trying to deliver. After 3 years of writing programs for the benefit of security, I turned out saying that security is a process. Why would I say that? Look around us. All the tech that you need to protect yourself from cyber crime is there. Anti-virus, firewall, anti keylogger, parental control, password manager and many more are all available in the software market. There is no reason for us to say in terms of technology, we are not good enough in security.

What makes so many of us a victim of computer or internet threat is the lack of proper process in computer and internet security. Security is not a short process where you only apply if you need it. For instance, you don’t only apply security when you had just downloaded a file from an unknown site which required a security scan.

Security is an end to end process. This means that the moment your computer boots up, security should be applied until the time your computer shuts down. People usually failed to stay secure simply because they don’t apply security from the very start. Agree?

So what’s your view? Do you still think that security has to be something technical?

Why Is Cloud Computing So Important?

Cloud computing has a lot of hype surrounding it. More than a few observers have wondered what is so important about this new internet phenomenon. The truth is cloud computing is leading to a rethinking of the internet’s capability. Cloud computing promises to completely delocalise computing power and technology. Users will be able to access and manipulate files, images, videos and other data remotely. Cloud computing promises the ability to keep networks and mobile devices synchronised at all times.

Infrastructure

A bank of sophisticated computers host operating systems and data for hundreds, if not thousands, of customers. internet search engine giant Google pioneered the use of data centers to store clients’ personal data safely. The same principle is being extended to cloud computing. Huge data centers will act as remote desktop computers. These centers will be able to store every file a user would need. All the user needs is a counterpart machine that can be as small as a conventional laptop with much less weight. These so-called “netbooks” serve only to connect the user to the internet so he can access his files.

A cloud computing network

An example of how cloud computing works – every device synchronises with the cloud, meaning that your data can be accessed anywhere!

A single data center can offer multiple services and applications. Theoretically, a cloud computing system could perform almost any function or task the user desires. In a typical system, each application will have its own dedicated server combined with multiple iterations to create redundancy and prevent sudden malfunctions. The whole center is managed by a central server that constantly monitors the traffic and load volumes. Balancing the differences between machines, it seeks to maintain the harmony of the system and prevent crashes.

Business Advantages

The advent of cloud computing is actually forcing businesses to change their strategies. Previously, hiring a new employee meant providing him with a desk, computer equipment and various other hardware or software. Cloud computing allows them to reduce these capital expenditures significantly. Now all an employee needs is a computer with an internet connection to access his work data. Desks and office equipment may still be necessary, but the investment in computer hardware can be outsourced to cloud computing companies.

The hardware and software demands on the business’s side decrease dramatically. Labor costs per individual employees go down, enabling a company to hire more workers. Productivity increases, raising the efficiency and profits of the business.

Concerns

The primary reason why cloud computing is getting so much attention is its effect on business strategies. The sheer cost pressure alone is forcing industry after industry to adapt to the new reality. The advantages notwithstanding, several valid concerns about cloud computing exist, namely having to do with privacy and security.

Business owners and executives may hesitate to turn over their sensitive data to a third-party system with good reason. Losing access to their own data or having it compromised is unacceptable in a ruthlessly competitive private sector. One major argument against this fear is the fact that cloud computing companies survive based on their reputations. This gives them a huge incentive not to lose their clients data or compromise accessibility. Despite the power of this incentive, regulations may still be required to ensure safety.

As for privacy, the obvious concern is the connection between the user’s computer and the cloud system. Privacy could easily be compromised by unscrupulous individuals who could access personal information like credit card numbers. A solution to this problem is to use authentication and encryption like regular secure connections.

These practical concerns are somewhat overshadowed by a number of philosophical and legal questions. For instance, who owns the data stored by the cloud computing system? While it is held in the client’s name, a case could conceivably be made that the cloud computing system is the actual owner and therefore has a right to it. These technicalities are still under debate, and no resolution has yet been achieved.

Conclusion

Cloud computing holds great promise for upending things as they are currently done in the business world. The practical effects on information technology jobs will likely be profound. These and other challenges must be met because cloud computing will continue to change the nature of the internet.