Results

Infor Advances Data Agenda With ‘Coleman’ AI, Birst BI Integration

Infor Advances Data Agenda With ‘Coleman’ AI, Birst BI Integration

Infor lays out plans for artificial intelligence and cloud-based business intelligence and analytics. Here’s what customers need to know.

Infor entered the increasingly crowded artificial intelligence (AI) arena July 11 by introducing its Coleman AI platform. Unveild at the company’s Inforum 2017 event in NY, Coleman was described as a language- and image-savvy AI platform that will automate rote tasks and augment human capabilities in a range of industry-specific use cases. Infor also used Inforum to detail its plans for Brist, the cloud-based business intelligence platform acquired in April.

Named for ’60-era NASA data scientist Katherine Coleman Johnson, one of three African American NASA mathematicians portrayed in the 2016 film “Hidden Figures,” Coleman builds on Infor assets including machine learning capabilities for retail acquired with Predictix and the work of the company’s Dynamic Science Labs. The labs have developed apps including a price optimization app for distributors and an inventory optimization app for healthcare providers.

Existing apps and machine learning capabilities are being folded into the Coleman portfolio, and Infor says it’s also well along in developing a unifying data platform for AI. Built on Amazon Web Services infrastructure, including an Amazon S3 data lake, the platform will aggregate petabytes of data available from Infor’s various industry-focused CloudSuites. The data will fuel AI-powered optimization, recommendation, and decision-automation services that will be delivered through Infor’s Ion API-integration platform.

Infor will use the speech recognition and natural language understanding capabilities of the Amazon Lex AI service to power conversational capabilities. This will enable Coleman to serve as a human assistant, answering questions such as, “Coleman, what are the payments outstanding for company X,” or “Coleman, forecast demand for product Y.” Conversational UIs will also support multi-faceted processes with simple requests such as, “Coleman, approve the promotion of Sara Jones.”

With image-recognition capabilities, Coleman will turn smart phone cameras into search tools. Take a picture of a product, for example, and Coleman will be able to identify the product and detail prices, specifications and availability details. Used internally, Coleman will tell workers how much inventory is available, what’s on order, when it will arrive and whether alternatives are available from other suppliers.

MyPOV on Coleman Vision vs. Reality

Infor certainly offered a compelling AI vision, but executives also acknowledged that it’s “early days” for Coleman. Data-pipeline development and modeling is further along in some industries than others, they acknowledged. Smart services for retail are likely to arrive first. As for the ingredients of Coleman, it’s a mixed collection of Infor and third-party IP. It remains to be seen just how it will all come together and when we’ll start seeing smart prediction, recommendation, optimization, and automation services beyond what existed before Coleman was announced.

I’m particularly eager to understand how and whether Infor uses generalized models based on aggregated CloudSuite data and then develops customer-specific recommendations and smart services. With its recent Leonardo launch, SAP talked about combining shared models and customer-specific models. Customers will also want to know whether it’s as simple as “turning Coleman on” from within a CloudSuite, as Infor executives suggested. We have also yet to learn just how much data will be required to generate reliable predictions, recommendations, optimization and automated actions.

Infor’s Birst Acquisition and Plans for Analytics

When Infor announced the acquisition of Birst in April, the first question for customers of the cloud-based BI company was, “will Birst disappear as an independent company?” The answer was an emphatic no. Birst operations continue unchanged under the direction of the existing management team. Birst founder and CEO, Brad Peters, continues as General Manager of what’s now known as “Birst, an Infor Company.”

The first question for Infor customers was, “how will Birst work with my existing Infor BI investments, including Cognos-based reporting tools and Infor BI cubes?” The company laid out detailed integration plans at Inforum.

In the first phase of the three-phase plan, currently underway, Infor customers can swap out like-for-like capabilities that they’ve licensed from Infor for newer, cloud-based capabilities from Birst. For example, customers using Infor’s Cognos-based reporting tools can switch to reporting tools available from Birst. They’ll also be able to add capabilities, at extra cost, that weren’t available from Infor, such as Birst’s ETL engine and self-service data-exploration and visualization capabilities.

Infor has already integrated Birst with Infor Ming.le collaboration and single-sign-on capabilities, but phase two, expected to be completed in September, will bring even deeper levels of integration. For example, customers using Infor BI will be able to use Birst as a cloud-based environment for analysis and reporting. This will enable Infor customers to leverage their Infor BI cubes while also blending in external data sources and taking advantage of Birst’s modern data-exploration and visualization capabilities. Integration is also underway between Infor’s Amazon S3- and Athena-based data lake environment and Birst. This will extend Birst’s big data analysis capabilities.

In phase three, Birst will add predictive capabilities from Infor’s Dynamic Science Labs unit. We’ll also see deeper integration of Birst-powered analytic services into the Infor XI platform as well as ties to Coleman AI services. The delivery date for phase three was unspecified.

MyPOV on Birst Integration

Infor is doing its best to preserve existing customer investments while providing an upgrade path to newer and more extensive Birst capabilities. On the reporting front there’s not a migration path for existing operational reports, so customers will likely gradually phase out existing tools supporting legacy reports while building new reports on Birst. The deeper and more significant value is in Infor BI, so it’s a big win for customers to see those cubes integrated with Birst’s cloud-accessible, self-service analytical environment. Overall, Birst brings significant upgrades to Infor’s analytics layer that will help support the company’s move into big data and artificial intelligence.

Related Reading:
SAP Machine Learning Plans: A Deeper Dive From Sapphire Now
Oracle Launches Adaptive Intelligent Apps for CX
Qlik Plots Course to Big Data, Cloud and ‘AI’ Innovation

Digital Transformation Digest: Sage Scoops Up Intacct, Google Landing Big Cloud Deals, the End of Flash, and More

Digital Transformation Digest: Sage Scoops Up Intacct, Google Landing Big Cloud Deals, the End of Flash, and More

Constellation Insights

Cloud consolidation: Sage is acquiring SaaS financials vendor Intacct for $850 million, in one of the larger pure enterprise application deals in recent memory. It's the biggest purchase in the history of Sage, which grew steadily in the 1990s through a string of acquisitions. For Sage, the move also takes a key competitor off the table, given the success Intacct has had in replacing on-premises Sage financials packages in midmarket accounts.

Intacct's leadership will remain on board after the deal goes through. The company is one of the most venerable independent SaaS vendors, having been founded in 1999. Intacct's sweet spot has been in companies with between 100 and 1,000 employees, although its current messaging states that its platform is "hard to outgrow." In general, Intacct competes with the likes of Quickbooks, Workday and FinancialForce.

POV: The acquisition seems like a beneficial one to both sides, with Sage paying a handsome premium for Intacct but in return gaining a mature product with a strong U.S. presence and more than 11,000 customers overall. The question now becomes how much Sage devotes to Intaact in terms of resources going forward, particularly with respect to keeping pace with longtime key competitor NetSuite.

Hubspot brings in AI with Kemvi: CRM and marketing software vendor Hubspot is adding some AI capabilities to the mix with the acquisition of Kemvi, a tiny startup that has developed an algorithm called DeepGraph. In essence, DeepGraph is about giving salespeople a headstart on learning more about their customers and prospects, as Hubspot's announcement describes:

DeepGraph uses machine learning technology to help salespeople better understand their prospective buyers. The system identifies new prospects, provides suggestions for creating personalized emails, identifies new market segments, freeing up time that can be spent on more valuable sales tasks. DeepGraph also acts as a knowledge graph with information about buyers, markets, and products, helping salespeople understand the nuances of their customers’ behavior.

POV: The deal is an acqui-hire more than anything else (Kemvi has just two staffers, according to Techcrunch) but gives Hubspot's platform additional AI capabilities to go along with existing ones for lead scoring and personalized content delivery.

Google Cloud Platform's big deals: Whatever Google's enterprise sales division is doing with Cloud Platform, it seems to be working. Either that or Google has now managed to deliver a combination of features and pricing that can deliver hockey-stick growth. In the second quarter, the number of GCP deals worth at least $500,000 grew 300 percent year over year, CEO Sundar Pichai said during Google parent company Alphabet's earnings call:

In terms of serving Cloud customers, we are world-class and available being reliable and those are things we want to stay best-in-class. So, we are clearly planning for that and planning ahead of our infrastructure and we have been consistently doing that.

And Heather in terms of your question about workloads and stuff, we are actually seeing quite a diverse set of used cases across sectors and industries and geographies.

POV: While Pichai characterized GCP as one of the company's fastest-growing businesses, he didn't specify the total number of large deals, or other metrics that would help provide context for the year-over-year growth numbers.

The uptick in deal size makes sense, says Constellation Research VP and principal analyst Holger Mueller. "Machine learning, AI and big data deployments all start with a trial and then get big quickly," he notes. The big money deals have only started coming Google's way in the past two or three quarters, and before that there was a lot of prototyping and validating going on, Mueller says.

RightScale targets cloud waste with Optima: As the IaaS and PaaS markets shake out to four big players—Amazon Web Services, Microsoft, Google and IBM—customers are looking to mix and match services for the best pricing and targeted workloads, particularly as overall usage of cloud grows. RightScale would like to rent you a tool for that. It's called Optima, and builds upon the company's existing portfolio of cloud management services:

Collaborative optimization: RightScale is the first cloud management platform (CMP) to help various resource owners in an enterprise to collaborate to take action on changes to cloud spending.

RightScale Optima includes data from all public and private cloud providers and enables organizations to see usage and cost data in a single unified dashboard; view costs by cloud account, team, or application to understand usage trends; perform chargeback and showback; and leverage tags to allocate costs to departments or business units.

POV: RightScale competes with other independent cloud monitoring vendors, such as CloudCruiser, as well as in-house services offered by IaaS and PaaS vendors. With Otpima, it's betting that customers will want to rely on a third-party—one presumably unbiased toward any particular service—to manage cloud spend.

Legacy watch: The end of Flash: Adobe has set a retirement date for Flash, its widely used but oft-criticized and famously buggy multimedia browser plugin. Flash Player will no longer receive updates after the end of 2020. Adobe is working with a number of partners, including Google and Apple, to phase out Flash over the next few years. (There's some irony in Apple's participation, given that many saw its decision not to support Flash on the iPhone as the proverbial writing on the plugin's wall.)

Flash has been on a steep decline of late. Three years ago, 80 percent of desktop Chrome users visited a site with Flash, but today that percentage is just 17 percent, Google said in a blog post.

POV: While few may truly miss Flash, it's pending doom nonethless stands as a major milestone in the future of the web, and paves a wider path forward for more modern standards such as HTML5.

Marketing Transformation Next-Generation Customer Experience Tech Optimization Chief Customer Officer Chief Financial Officer Chief Information Officer Chief Marketing Officer Chief Revenue Officer

CEN Member Chat: The Future of Work in HCM

CEN Member Chat: The Future of Work in HCM

During this CEN Member Chat, Holger Mueller, VP & Principal Analyst at Constellation Research, covers what you need to know about the future of work in HCM.

Future of Work Chief Executive Officer Chief People Officer Chief Information Officer Chief Digital Officer On <iframe src="https://player.vimeo.com/video/226033511?badge=0&autopause=0&player_id=0" width="1280" height="720" frameborder="0" title="CEN Member Chat: The Future of Work in HCM" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>

IBM Moves the Encryption Debate's Needle Big-Time with New z14 Systems

IBM Moves the Encryption Debate's Needle Big-Time with New z14 Systems

Constellation Insights

IBM's next-generation Z14 mainframe systems have arrived, and the watch-phrase is "full encryption." That means everything associated with a Z14—from applications to cloud services and databases—can be encrypted at all times with no appreciable performance hit, according to Big Blue.
 
It's a hook that should prove enticing to IBM's mainframe installed base, which tends to buy systems and then wait a few years for the next hardware release to refresh. (The Z13 arrived in early 2015). But the Z14's positioning also adds fuel to the online privacy debate, coming just a few weeks after the Five Eyes nations—the U.S., U.K. Australia, Canada and New Zealand—met to discuss encryption and national security.
 
"There is this clear trend among tech companies and cloud providers to basically stay the hell out of their clients' business, and this is what IBM's 'full Encryption' is all about," says Constellation Research VP and principal analyst Steve Wilson. "The company is saying that while they are providing sophisticated managed services, they are not watching or tracking how those services are used. They are promising that 'we cannot see your data, even if we wanted to.'"
 

This is the same promise being made by others, like Apple, which famously resisted the FBI's demand for a backdoor to an alleged terrorist's encrypted iPhone. "It's colliding with the interests of law enforcement, who are not accustomed to these absolute security features," Wilson says.

IBM's full encryption appears to be more sophisticated than cloud encryption to date, offering containers engineered to military-grade security standards. "This is a bit like a 'smart bank safety deposit box,'" Wilson adds. "The IBM containers don't just store secret data, they allow tenants to use the data and run their own processes, but still in complete secrecy, like a Swiss Bank.

Big Blue "has been promoting the quality and certification of its crypto, which I think is great to see," Wilson adds. "Every company needs to lift its game on behalf of clients. We need to see more systems built to standards like FIPS 140 level 3+ and Common Criteria level EAL 5+. IBM is in that league."

What will be interesting to see is how national security interests react to IBM's move. "I don't suppose terrorists will be buying main frames or renting space in IBM's cloud, so there is no need to panic," Wilson says. "And perhaps governments can try to negotiate with cloud providers some governance mechanisms that would keep bad actors out of the action, rather than banning this sort of capability for all businesses.  We shall see."
 
Tech Optimization Digital Safety, Privacy & Cybersecurity Chief Customer Officer Chief Information Officer

Cloud Configure Price Quote Solutions Deliver 10 Compelling Benefits - My New Report

Cloud Configure Price Quote Solutions Deliver 10 Compelling Benefits - My New Report

Questions about Cloud Configure Price Quote (CPQ) solutions have popped up in most of my inquiries from B2B sales leaders this past year. My new report, the CRO’s Guide to Sales Acceleration with CPQ, was a labor of love inspired by these many conversations I had with sales executives, field sellers, and members of the Sales Enablement Society, on their sales effectiveness challenges. With B2B sales cycles lengthening and complexity growing, CPQ solutions deliver compelling ROI whether it be increasing the average deal size or accelerating the sales cycle. With so many aspects of sales controlled by the buyer, CPQ empowers sellers be more effective in an area they can control - delivering an accurate quote to the customer quickly.
 
The report aims to help sales leaders achieve the following:
 
  • Understand the value CPQ solutions can deliver
  • Data to help you build a business case
  • Questions to ask when selecting a vendor
  • Success stories for inspiration
  • Implementation tips and best practices
I found 10 primary benefits of CPQ solutions, each with direct correlation to accelerating sales cycles, increasing margins, and streamlining processes so sellers can focus on selling. One of the key findings from my research was how long and arduous a manual quote process could be - 10 business days from submitting a request to delivering a quote to the customer. From the many discussions I had with users, CPQ solutions delivered a 300% average time savings compared to manual quotes. More concerning was how many errors these manual quotes often contained, such as outdated pricing or missed upsell opportunities by not including compatible solutions or service tier upgrades. Please see my infographic below for all 10 Benefits of CPQ.
 
Lastly, I’ll share one comment I heard consistently from all the CPQ end-users -- “I wish we had started sooner”.
 
Constellation clients can access the full report, or visitors can download an excerpt, at http://bit.ly/2tMxZA5. Are you a current CPQ user or considering deploying the solution? Leave me a comment below and I look forward to hearing your thoughts!
 
Infographic: 10 Benefits of CPQ
 
Marketing Transformation Next-Generation Customer Experience Revenue & Growth Effectiveness New C-Suite Chief Financial Officer Chief Revenue Officer

Digital Transformation Digest: Big Microsoft Software Launches, IBM's Encrypted Mainframes, and More

Digital Transformation Digest: Big Microsoft Software Launches, IBM's Encrypted Mainframes, and More

Constellation Insights

Microsoft ships LinkedIn app for Windows 10, first SQL Server 2017 release candidate: Microsoft is starting out the week with a pair of key software releases. First up is a new LinkedIn desktop app for Windows 10 PCs. The company promises a richer LinkedIn experience with the app compared to viewing the site through a web browser. It's launching through Windows Store in 22 languages, with global availability expected by month's end.

Meanwhile, the much-anticipated SQL Server 2017 has its first public release candidate, following seven community technology previews. In Microsoft parlance, a release candidate is considered essentially code-complete, although further testing and stabilization will occur before general availability. SQL Server 2017 is set to be a popular item among enterprises, of course, since it delivers both Windows and Linux support. There's an early adopter program available for companies who want to go into production with it now.

POV: The new LinkedIn app is another logical step in the process of integrating LinkedIn with Microsoft's platform. The question is whether Microsoft can achieve integration without blurring an important boundary, says Constellation VP and principal analyst Alan Lepofsky: "Overall, my fear about Microsoft and LinkedIn is that LinkedIn data is personal, not corporate. It's what I choose to write. It's who I choose to connect with. Microsoft needs to ensure the boundary is still there."

Meanwhile, although it came as a shock to many when Microsoft announced it would port SQL Server 2017 to Linux, the reality is that it had little choice. As Constellation VP and principal analyst Doug Henschen noted at the time, Linux is the dominant OS for the cloud, and provides ample cost savings compared to Windows. For its part, Microsoft says customers were demanding Linux support in the name of running mixed workloads.

IBM's new fully-encrypted mainframe: Big Blue is betting that full encryption, among other features, can spark a major refresh cycle by its mainframe customers. The new Z14 encrypts mainframe applications, cloud services and databases 100 percent of the time, with no performance hit, according to IBM:

The standard practice today is to encrypt small chunks of data at a time, and invest significant labor to select and manage individual fields. This bulk encryption at cloud scale is made possible by a massive 7x increase in cryptographic performance over the previous generation z13 – driven by a 4x increase in silicon dedicated to cryptographic algorithms.

It succeeds the Z13, which was released in early 2015. IBM is positioning the Z14 as ideal for machine learning and blockchain applications, two areas it has placed much emphasis on as of late. It also included a number of tidbits outlining the Z14's raw power, such as the ability to run 12 billion encrypted transactions per day on a single system.

POV: IBM's news release goes into great detail on the encryption features, as well as new software pricing models that it says makes the Z14 competitive with public clouds and x86 server environments. While it's not likely that the Z14 will pull in large numbers of new customers for IBM's mainframe business, it seems poised to draw significant interest from the installed base.

Court ruling upholds secret FBI data requests: IBM's new mainframe comes as government officials and tech debate over law enforcement's access to encrypted user data in the course of solving or preventing crimes. On a related front, a U.S. appeals court upheld a ruling that allowed the FBI to issue national security letters—essentially subpoenas demanding user data—under gag orders that in some cases are permanent. That means the company receiving the letter as well as the affected customer aren't allowed to discuss them.

The Electronic Frontier Foundation, which has fought against NSLs for years, calls them "one of the most frightening and invasive" examples of expanded government surveillance under the PATRIOT Act. 

Fortune's Brainstorm Tech: One of the more interesting and eclectic technology "big ideas" conferences, Fortune's Brainstorm Tech, kicks off today in Aspen. As usual, the three-day event will feature a wide range of speakers from the Fortune 500, hot startups, media, Hollywood and more. 

Bookmark the livestream of the event right here. Michael Dell, Target CEO Brian Cornell, Nest Labs CTO Yoky Matsuoka and former CIA director John Brennan are some of the dozens that will be featured on the livestream.

Legacy watch: Aggrieved UK postmasters have their day in court over IT system: About 500 UK postmasters have joined a class action lawsuit that claims problems with a post office IT system resulted in them receiving heavy fines over missing funds, and in some cases even jail time. Post office officials have denied the system was at fault, but this week they will deliver an outline of their defense to the class and its lawyers.

ComputerWeekly has the scoop on the latest move in the case, which has more twists and turns than Zig Zag Hill in Wiltshire.

Data to Decisions Digital Safety, Privacy & Cybersecurity Future of Work Tech Optimization Chief Customer Officer Chief People Officer Chief Information Officer Chief Digital Officer

Microsoft 365 Plus the Always Expanding Office 365 Portfolio

Microsoft 365 Plus the Always Expanding Office 365 Portfolio

July 10th at Microsoft Inspire, their Worldwide Business Partner conference, Microsoft introduced Microsoft 365, a new purchasing model that bundles Windows + Office 365 + Enterprise Mobility and Security.

They also introduced three new (SMB focused) business applications... plus made MileIQ available to select O365 plans.

  • Microsoft Connections—A simple-to-use email marketing service.
  • Microsoft Listings—An easy way to publish your business information on top sites.
  • Microsoft Invoicing—A new way to create professional invoices and get paid fast

Microsoft Continues To Strive for the Modern Workplace

I was very pleased to see Microsoft continue to push the messages around the intersection of Personal Productivity/Team Collaboration and Artificial Intelligence. In the keynote, they demonstrated several scenarios where Office365 is being enhanced with automation from Cortana and Microsoft Cognitive Services. Perhaps the most impressive (Future of Work) demo was how Microsoft combines Yammer and Stream to hold all company town hall meetings, where the talks are transcribed and translated in real time by Microsoft's AI tools.

Here is the information I collected during the keynote:

 

 

 

Future of Work

DisrupTV Dissects the Top Headlines on AI, Digital Transformation & Data Breaches

DisrupTV Dissects the Top Headlines on AI, Digital Transformation & Data Breaches


From “Black Friday in July,” to conference after conference, and a not-so-small data breach, this week was jam-packed with news and chatter from some of the biggest companies across industries.

We were lucky to catch up with Larry Dignan, editor in chief at ZDNet, on DisrupTV this week. He joined our hosts Vala Afshar and R “Ray” Wang to provide some blunt and entertaining commentary on the major news items that topped the headlines this week – from Amazon, SAP, Workday, Microsoft, Infor, and OpenText, Verizon and Wendy’s.

Jump into the video below at 39 minutes for the start of Larry’s segment.

 

 

DisrupTV Episode 70: Scott Hartley, Avi Goldberg, Larry Dignan from Constellation Research on Vimeo.

Innovation & Product-led Growth Data to Decisions Digital Safety, Privacy & Cybersecurity Tech Optimization Future of Work DisrupTV infor amazon SAP Leadership Chief Customer Officer Chief Digital Officer Chief Executive Officer Chief Financial Officer Chief Information Officer Chief Marketing Officer Chief People Officer Chief Procurement Officer Chief Revenue Officer Chief Supply Chain Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer

Digital Transformation Digest: Australia's Planned Decryption Law, New Twist in Oracle-Rimini Case, IBM Watson Under the Microscope

Digital Transformation Digest: Australia's Planned Decryption Law, New Twist in Oracle-Rimini Case, IBM Watson Under the Microscope

Constellation Insights

Here comes the 'Five Eyes' fallout: Last month, the so-called Five Eyes nations of the US, UK, Canada, New Zealand and Australia held their latest meeting on intelligence-sharing and cybersecurity matters. While the subject of law enforcement's ability to access encrypted messages was expected to be a focal point of the meeting, an official post-mortem said very little about it.

Some weeks later, the encryption debate is about to ramp up, with Australia's government proposing a new law that would compel companies such as Google to decrypt messages from alleged terrorists and other types of criminals, as the AP reports:

The new law would be modeled on Britain’s Investigatory Powers Act, which was passed by the British Parliament in November and gave intelligence agencies some of the most extensive surveillance powers in the Western world, the government said.

Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. Law enforcement agencies would need warrants to access the communications.

“We’ve got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists and drug traffickers and pedophile rings are up to because of the very high levels of encryption,” Turnbull told reporters.

“Where we can compel it, we will, but we will need the cooperation from the tech companies,” he added.

POV: "I am sympathetic to government and law enforcement's interest—on the surface—to access the telecommunications of wrongdoers and suspects, just as they do conventionally," says Constellation VP and principal analyst Steve Wilson. "But the reality is that cloud service providers have been under more and more pressure to remove themselves from the business affairs of their tenants. And the upshot has been encryption protocols where the keys are under control of the tenants. Several providers have moved to the same posture: We couldn't decode your data even if we wanted to."

That of course means that law enforcement would have to serve a warrant on clients, not cloud providers, Wilson notes: "It's important to see that this is not about encryption protocols but key management protocols. The cloud providers don't have the keys. So when governments say they insist that conventional rule of law applies to tech providers, do they appreciate how the technology works?"

It's easy to see a scenario where law enforcement demands data concerning a certain client, and then cloud providers simply hand them encrypted files, which officials would then have to crack on their own. Alternatively, is the government's intent to make cloud providers change their business models in order to retain clients' keys? "That's the only way to access suspects' data without a crypto backdoor," Wilson says.

Rimini Street makes tactical shift in Oracle suit appeal: Independent software support provider Rimini Street has taken a new legal tack in its appeal of a copyright judgment Oracle won against it in 2015, with its lawyer telling an appeals court that the dispute really is about contractual rights, as the Register reports:

The case hinges on Rimini Street's 2010 decision to host Oracle software on its own servers, as well as "cloning" that software and making it available to multiple customers.

The smaller company accepted some of the charges against it, saying it will pay $35.6m for "innocently infringing the software", but appealed against the rest following the October 2016 judgment.

Oral arguments in the case were heard by three judges in the Ninth Circuit yesterday, where Rimini's lawyer Mark Perry argued that the case should come under contractural – not copyright – laws.

Perry said that a "single fundamental error infected and pervaded the entire copyright case", arguing that Rimini should have been allowed to copy the software for its clients, as they had paid licence fees.

POV: The Oracle-Rimini Street case is complicated, and it's fairly easy to go deep into a rabbit hole in the course of understanding all of the issues and arguments. But it's also an important case to follow, given Rimini's status as the face of the third-party maintenance market. 

IBM Watson's performance under Wall Street's microscope: IBM has generated plenty of hype around its Watson cognitive computing technology, but questions remain about how much Watson is delivering in terms of revenue, equity analyst firm Jefferies argues in a new, in-depth report.

While IBM has issued 200 press releases with Watson in the headline since 2013, and spent $15 billion on cognitive computing development between 2010 and 2015, "the company has been very circumspect about sharing financial information about Watson," analyst James Kisner writes.

Moreover, while Watson is one of the most complete off-the-shelf platforms in the market, it requires quite a bit of consulting services, and IBM is also being outgunned in the competition for AI talent by the likes of Amazon, Microsoft and Google, he argues.

Azure gets nested virtualization: Microsoft added support for nested virtualization in Windows Server 2016, but it's only now that the capability is available on the Azure cloud platform. 

Nested virtualization is just what it sounds like: You can use it to run a hypervisor and VMs inside a VM. Why would you want to do that? There are multiple reasons, as Microsoft notes in a blog post announcing the new feature:

Such nested environment provides great flexibility in supporting your needs in various areas such as development, testing, customer training, demo, etc. For example, suppose you have a testing team using Hyper-V hosts on-prem today. They can now easily move their workloads to Azure by using nested VMs as virtualized test machines.

You could also use nested virtualization to run pre-production code on a server used by multiple users without impacting them, Microsoft adds.

POV: The public cloud war is being waged on multiple fronts: Cost, global availability and performance, and feature richness. Nested virtualization might be a bit in-the-weeds on its face, but its something that Microsoft shops large and small will find an appealing addition to Azure. Given the feature's sweet spots, it will also help customers build an on-ramp to using Azure more widely.

 

Data to Decisions Tech Optimization Digital Safety, Privacy & Cybersecurity Chief Customer Officer Chief Financial Officer Chief Information Officer

Blockchain or Distributed Ledger? Defining the requirement, not the technology

Blockchain or Distributed Ledger? Defining the requirement, not the technology

Currently Blockchain is firmly established on the hype curve, and as with all technologies at this stage it seems this is the answer to, well just about everything. At this early stage of the hype curve the exciting possibilities always exceed the tested deployed solutions. Reality arrives with early adopter experiences showing the real technology capabilities that match genuine business case requirements, with corresponding deployable product sets.

You don’t have too read too many articles to sense the lack of cohesion in technology views as to what the various pluses and minuses of Blockchain technology may be. Nor to realize the generality of the concepts as to the business value it brings. However these arguments can be better understood and rationalized by examining the two basic Business requirements, which are fundamentally different from each other.

Instead of launching into the usual definition and description of Blockchain, (inevitable in some way linked to Bitcoin), lets start with the basic capability requirements for the business solutions. It is for a shared Asset Register of transactions, but transformed from existing Asset Registers by Digital Business/Markets requirement for no single centralized controller to support its ‘any to any’ operating model. Event driven and optimized interactions rely on finding the right partners for any deal unconstrained by the need for pre-established relationships.

It sounds simple, but full-scale market places operating in a fully decentralized manner using, on demand any to any interactions business and technology model is a new phenomenon. However not all Digital markets have the same characteristics so the simple common requirement definition splits into two major, different requirements introducing the split between the two major technology approaches; Blockchain and Distributed Ledger Technology, known as DLT.

Two major Business requirements;

  1. Fully Secure and Authenticated Transactions; usually associated with FinTech, (financial technology) and the commercial settlement of financial transactions. Here the basic mechanisms of Blockchain are a key aspect of the attraction, and the challenge is to overcome the associated limitations.
  2. Mass Updates of Asset Registers; usually associated with IoT endpoints data transfers and associated micropayments. In this role there are questions as to the basic suitability of Blockchain architecture leading to the development of other techniques, including ‘Blockless’ Blockchain.

Though the differences between the two are substantial the basic task of managing and updating an Asset Base with transactions is common; as is the challenge of its distributed across a network of participants. The question is the tradeoffs between the two requirements concerning what is transacted and the manner in which every participant’s copy is maintained to be identical. The numbers of participants, the size of updates, their timing and manner of updating, the secure approach used, together with the form of cryptography are all variables to be ‘adjusted’ according to the exact business requirement.

There is one fundamental difference between Blockchain supporting FinTech and Distributed Ledger Technology supporting IoT. Participants in the former are permanently connected to the network to maintain their registers and authentication, whereas IoT devices are often only periodically connected to conserve battery and bandwidth usage. The basic Blockchain architecture requires the participants to maintain connectivity and abilities to update as a key part of its security authentication, IoT focused Distributed Ledger Technology solutions seek to overcome this.

Bitcoin illustrates some of the challenges in deploying Blockchain Technology based solutions. Bitcoin requirements suit its role as a specialized crypto currency, but with increasing popularity the limitations of transaction updates, and network/processor demands becoming obvious. The tendency for many articles to use Bitcoin’s success as the basis for Blockchain’s suitability other requirements frustrates those with detailed expertise, creating further confusion around ‘Blockchain’.

Bitcoin proves that it is possible to implement and deploy a global decentralized Asset Register and Transaction Recording solution that is automatic, autonomous, auditable, and securely authenticate by allowing all participants to understand the integrity of the process. This established starting point has created huge interest in the potential of using the mathematical principles of ‘Blocks’ as the basis of developing solutions for Business requirements.

Whatever the requirement; FinTech, or Asset Register; Blockchain or Distributed Ledger there are four common basic capabilities required in a commercially acceptable solution, and the challenge is to achieve this whilst enabling the other specialized requirements.

  1. Permanent unbreakable relationship between the Asset and the mathematic Authentication; a substantial and unacceptable risk lies in the two being separate entities that can be exploited and combined separately.
  2. Sophisticated Identity Management; able to support full identity authentication to the direct participant’s in individual transactions, whilst ensuring the individual transactions updating the distributed Asset Registers are totally anonymous.
  3. Complex Transaction Management; capable to ensuring the form of transaction is standardized, transparent, and distributed to all Ledgers within the determined time frame.
  4. Consensus based Trust model; to ensure that all participants collectively are able to verify all transactions through common comparison of their Asset Ledgers.

Examining just the most simple basic requirements for FinTech Transactions versus Mass Update Asset Registers illustrates just how different the Business solutions and resulting the technology development are;

Core Requirement

FinTech

Mass Update Asset Mgmt

Principle use

Auditable financial payment transactions

IoT Device updates with micro payments

Volumes/ Transaction sizes

Low volumes with relatively large transaction data

Massive volumes with exceeding small transaction data

Security/Reliability

Absolute, both transaction and end devices must not be accessible to hackers

Functional, acceptable as individual transactions low value, & dumb end devices

Cost

Transactions are each of high importance/value and higher cost is acceptable.

Transactions are individually of low value and cost must match

As a generality the development of Blockchain with its secure use of ‘Block’ technology suits the primary requirements of FinTech, whilst the inherent limitations that Blockchain imposes make it less suitable for the development of Mass Update of Asset Registers solutions. (HyperLedger, one of the most popular Blockchain consortiums, has now started ‘Performance and Scalability Working Group’, PSWG, to address this topic).

 

Whilst a great deal has been published about the development of Blockchain based solutions, (see appendix for Constellation Research reports and blogs), very little has been said about alternatives. Whilst there are a number of existing traditional centralized approaches for Asset Register management even if they could be modified in some way they would fail at least some of the four basic principles outlined earlier.

The Trusted Internet of Things Alliance, aims to rectify the lack of attention to the need for Mass Update Registers solutions for IoT market places by building on the work of one of its founding partners IoTA. Founded by David Sonstebe, with a group of mathematicians who had worked on Blockchain, the focus is on the IoT challenge. The initial Whitepaper on its approach can be found here, but the following quotes by its founder provide a simple explanation as to the goals of the IoTA’s Tangle Ledger approach;

At heart Hyperledger is a permissioned ledger, and that’s the antithesis of IoT, which has to be open to realize its potential. IoT cannot be a closed ecosystem because that is literally the opposite of interoperability. IoTA Tangle Ledger is a Directed Acyclic Graph, as opposed to the linear Blockchain design, allowing the systems to settle transactions with zero fees and allow trading in specified resources on demand.

The recent IoTA announcement entitled ‘IoTA’s Tangle meets IOT requirements better than any Blockchain’, sums up the issues to be addressed and compares Blockchain technology with the IoTA Distributed Ledger Technology. The detail makes clear the deep differences that have to be addressed and is a must read for anyone contemplating involvement in IoT solutions. There are more issues than just the often remarked through put and scaling difficulties including the need to support periodic connect and disconnection of participating devices that appear to render current Blockchain architecture unsuitable.

Blockchain has the headlines, and in Bitcoin has convincingly demonstrated that it can meet the difficult requirements for an any to any decentralized business transaction solution. When applied to Business requirements that require the rigors of secure authenticated decentralized transaction management between known Ledger participants then Blockchain has compelling features.

But there are other types of requirements for decentralized transaction solutions which require high volume, low cost, good enough secure Transaction management, often with periodic connection. Here alternatives to Blockchain based on Distributed Ledger Technologies are emerging

Reversing the approach by defining the basic business requirements helps rationalize the frequently confusing statements being made. As an example anyone involved in the design and deployment of IoT solutions should investigate alternative developments such as IoTA Tangle.

 

Additional Material; Constellation Reports and Blogs

Update on HyperLedger with release of Fabric 1.0 for the use of solution developers

Report; Blockchain explained in plain English

Video; Blockchain myths and realities

Blog; Distributed Business Service Models

New C-Suite Innovation & Product-led Growth Data to Decisions Future of Work Tech Optimization AI Blockchain ML Machine Learning LLMs Agentic AI Generative AI Analytics Automation B2B B2C CX EX Employee Experience HR HCM business Marketing SaaS PaaS IaaS Supply Chain Growth Cloud Digital Transformation Disruptive Technology eCommerce Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT CRM ERP Leadership finance Customer Service Content Management Collaboration M&A Enterprise Service Chief Information Officer Chief Digital Officer Chief Executive Officer Chief Technology Officer Chief AI Officer Chief Data Officer Chief Analytics Officer Chief Information Security Officer Chief Product Officer Chief Operating Officer