Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

Related Topics: Microservices Expo, Linux Containers, Open Source Cloud, Agile Computing, @CloudExpo, Apache, @DXWorldExpo

Microservices Expo: Article

Data Is Up, Data Is Down, Data Is on the Move

Connectivity is everything

Data is going up and data is going down. Its endless upward spiral to the cloud is being lauded as the platform and paradigm that we must now adhere to for future IT efficiency. At the same time, data is going down. It is being processed and (crucially here) it is being ‘analyzed' at an in-memory level, where new speed efficiencies outstrip the power of disk-based alternative options.

Data is on the move too of course. Mobile data (and most important of all, enterprise mobile data) is tracing a fast-paced location-aware fluid and functional vortex around us as the devices now keep up the application capabilities in this space.

Nokia shipped its latest Lumia 920 handheld with a promise to users that they have just bought the "world's best business smartphone" no less. Marketing-speak aside though, the ability to use apps on this type of unit that differ (by and large) from desktop equivalents only in terms of screen size is something of a revelation.

Connectivity is everything and if a businessperson can Skype on his or her phone rather than use a laptop or desktop (which they can now), then why wouldn't they?

Devices such as Nokia's latest offering should never have been marketed as smartphones; they are half-size mini tablets that happen to have a phone in them. This is game-changing stuff and no mistaking the term ‘superphone' has already started to be used to attempt to distinguish the newer models of later 2012 and onward.

Companies like SAP and HP are trying hard to break some of the mold here. SAP is pushing enterprise level mobile applications to the fore on devices that were not initially intended to host mission-critical apps supporting firm's systems of record. We're talking about the iPad for one, plus the rest of the tablet universe as it now orbits the software application development focused arm of the galaxy.

HP doesn't want to see the high-end laptop (or low and medium-end laptop for that matter) get left out of the rush to enterprise mobility. The company's Mobile Enterprise Solution Architecture Consulting division is only a stone's throw away from its Enterprise Mobility Services detachment, which, surprise surprise is aligned toward SAP technologies. The big guys know which side their bread is buttered on and they know the fat content too.

A Splattering Splunking Mess of Data Detritus
With this up, down, left and right of data on the move through mobile channels, some of them socially fueled... and many of them being disparate, disconnected and lacking any cohesive level of integration... is not always good news.

It might sound like it represents user freedom and it probably does; but it's a nightmare waiting to happen to the system administrator (sysadmins) and/or the database administrator (DBA) who have to sit in the engine room and get covered in a splattering splunking mess of data detritus as they attempt to track and pin down data status at every level.

Enter Splunk, a piece of Unix-derived data manipulation software that has been engineered and built for the purpose of diagnosing and troubleshooting software application problems in environments/platforms ranging from Amazon Web Services (AWS), Salesforce.com's Heroku, Google's App Engine and the Rackspace cloud.

Released by the firm at the back end of last year is Splunk Storm. This monitoring tool is focused on analyzing what Splunk refers to as "critical business metrics" so that, by viewing its results, operational controls can be tuned appropriately.

Rage Against the Machine (log)
IT industry analyst Robin Bloor writes in his 10 Companies & Technologies To Watch in 2013 piece this January that Splunk has built a technology and a business by enabling swift access to machine data: the data that resides in machine logs of every kind throughout computer networks from web logs to system management logs.

"It was swiftly adopted by many IT departments mainly for the operational management capabilities it enabled. But fairly soon companies began to discover that machine-generated data was a rich source of business information. Splunk had built a fast engine and platform for analyzing such data. This has now become a formidable business intelligence engine," writes Bloor.

Splunk's senior director of product marketing Sanjay Meta claims that Splunk can be "pointed at anything" in terms of the breadth of its potential usage. This is because it doesn't work to impose a schema upon the data that it captures at the point of execution.

Moving one step further, the ability of Splunk to "create schemas on the fly"(the columns and rows that describe the interrelationships of a database table) gives the software its greatest boost for freedom and potential power.

This new multi-dimensional environment for CIOs to perform their data management across is further complicated by multi-temperature data forms; we next move to classify hold, tepid and cold data depending upon its usage in real-time analytics.

Not all of this is going to be simple by any means. Nokia's "business" smartphone does have a strong Windows Phone 8 Xbox360 connected games option too. Perhaps that distraction is there for a good reason?

•   •   •

This post first appeared on CIO Enterprise Forum.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.