mercredi 22 mai 2013

What Are The Biggest Challenges Facing Marketers According To New IBM Study?

According to a hot-off-the-presses study conducted globally by IBM IBM (500 marketing managers) across 15 different industries, creating growth (through the acquisition of new customers) and sustaining growth (through superior loyalty) is at the very top.  42% of respondents suggested that acquiring new customers and 36% suggested driving loyalty and satisfaction were the biggest challenges facing their organizations.
While these results aren’t earth-shattering as it is likely that a survey a decade ago would have yielded a similar pattern, what is surprising is the items at the bottom. Only 21% of the respondents suggested that measuring ROI was the most challenging problem they faced, behind branding, leveraging data, understanding and effectively using social channels, and creating positive experiences for consumers. A few years ago, measuring ROI was at the top of everybody’s list. This perhaps suggests a sign of the times – a tough marketplace, increased competition, a more global marketplace, and more savvy consumers have made growth especially challenging.
Other key findings from the survey suggest that the marketers who are driving better firm results are doing something different than their less successful counterparts.  They tend to be significantly more adept at tracking, technology, and analytics and use these tools to develop more sophisticated and adaptable solutions. They are more engaged in all customer service interactions and tend to personalize marketing offers. In short, stronger firm-wide leaders are more engaged in all customer interaction, and seem to have greater competency in what is necessary to be successful today.  See a summary table that compares the top performing marketer performance with the balance of marketers (from IBM 2013) below.
What Does This Mean For Marketers?
  1. Marketers Matter: While the importance, value, and role of marketers – and marketing – in the firm may be debated, this suggests that marketers are focusing on what they can uniquely deliver, which is growth. Many functions are focused on internal operations and are not directly responsible for creating and sustaining growth in the same way that marketing is. This data suggests that when it comes to building growth, marketers are focused on being the growth engine for the firm.
  2.  Learn From the Successful: With unprecedented change and the plethora of articles talking about what marketers need to do to manage growth (e.g., manage big data, collaborate with finance and IT, integrate an omni-channel world, etc.) what needs to be done is clear. What isn’t clear is how to do it. A next step from this research that would be valuable is to create case studies of what the top marketers are actually doing that enables them to be successful. While there are a myriad of conferences for C-level marketers, what is missing is a business-school like approach to understanding how to solve these complex problems. A 1 hour discussion can’t really completely dissect the challenges associated with making this happen.
  3.  Acquire the Right Skills: This research suggests that the individuals who are driving better firm results just seem to be more competent at navigating the more analytical, technical, and complex environment that exists today. People who went to business school 20 or 30 years ago either need a refresher course or need to generate the intellectual capital required of today’s environment.
By: Jimberly Whitler
Source: http://www.forbes.com/sites/kimberlywhitler/2013/05/21/what-are-the-biggest-challenges-facing-marketers-according-to-new-ibm-study/http://www.forbes.com/sites/kimberlywhitler/2013/05/21/what-are-the-biggest-challenges-facing-marketers-according-to-new-ibm-study/
 

IBM Watson enters the realm of customer engagement

While I get to see and hear about hundreds of product announcements, this one is particularly interesting. The race to leverage computing power to synthesize incredibly huge amounts of disparate data in real time to meet the needs of customer demands is the next frontier of customer relations.
Today at the IBM Smarter Commerce Global Summit in Nashville, Tennessee, IBM plans to launch the Watson Engagement Advisor, aimed at helping organizations provide better customer service and product recommendations in real time at scale. The same technology that once outsmarted humans to win Jeopardy and has recently been used to diagnose cancer will now be used to help organizations sense and respond in real time.
From CNBC:
Big Blue announced five new clients working on using Watson’s cognitive computing and ability to crunch so-called big data, to help enhance service to their customers. The companies include Malaysia telecom provider Celcom, financial firms Royal Bank of Canada and ANZ Banking Group, IT services provider IHS, and the consumer research firm Nielsen.
“We’ll be exploring ways to use Watson for helping our agencies and their client brands engage more effectively with consumers across all devices—from TV to tablet to smartphone,” wrote Randall Beard, chief of Advertiser Solutions at Nielsen.
Source: http://socialenterprisetoday.com/blog/posts/ibm-watson-enters-the-realm-of-customer-engagement/ 

http://www.eweek.com/cloud/ibm-puresystems-gain-cloud-application-reliability-security/

star-trek-atom-art-1.jpg
Remember yesterday's stop motion video that IBM made using individual atoms as pixels? Well it turns out they also made some Star Trek art while they were at it. Why? Not sure, presumably because there's a new movie coming out. That or they just really love Star Trek. Or maybe a crazed Trekkie with one of those terrifying looking Klingon battle swords was threatening them bodily harm if they didn't. THE POSSIBILITIES ARE ENDLESS. For lunch today? The possibilities are super limited. It's looking like a Carnation Instant Breakfast or risk trying the cottage cheese that expired a week ago. I'm kind of afraid to look at it though because I love cottage cheese and if it's moldy I'll have a hard time getting the image out of my head the next time I'm at the grocery store wanting to buy more. Now listen: you might not like cottage cheese, but don't act like you don't know what I'm talking about. Shared experiences like this -- that's what makes us all human.
Hit the jump for a Vulcan salute and a profile of the USS enterprise that's only a nanometer tall. You're not gonna fit a lot of crew on a ship that size.
star-trek-atom-art-2.jpg
star-trek-atom-art-3.jpg
Thanks to Brandon and T, who agree art should be for everyone and not just people who have super powerful microscopes so they can see it.

By: Geekologie
Source: http://geekologie.com/2013/05/oh-cool-ibm-also-made-some-star-trek-art.php 

IBM PureSystems Gain Cloud Application Reliability, Security

IBM announced enhancements to its PureSystems family of expert integrated systems that provide greater reliability, security and support for new platforms such as Windows.

IBM recently announced enhancements to its IBM PureSystems family of expert integrated systems that improve disaster recovery capabilities. New features enable enterprises that are accelerating cloud deployments using IBM PureApplication System to get disaster recovery services up and running in four clicks. IBM announced these enhancements at its IBM Impact 2013 conference in Las Vegas. Other enhancements include increased security capabilities with advanced encryption options, greater system scalability and reduced application response times during unplanned spikes in demand, and new support for Windows applications. These enhancements are being announced as IBM marks the one-year anniversary of the launch of its IBM PureSystems family of solutions. To date, more than 4,000 PureSystems have been sold in more than 90 countries and across dozens of industries. PureSystems clients and partners include Altus, IT, Burlington Northern and Santa Fe (BNSF) Railway Company, the city of Bunbury in Australia, Desert Research Institute (DRI), DynaFront, New York Stock Exchange (NYSE), Proginov and XO Communications.

IBM PureSystems offer an alternative to other enterprise computing models by combining server, storage, networking and platform middleware resources into a secure, simple-to-deploy and manage system. The PureSystems family of solutions includes IBM PureFlex System, IBM PureApplication System and IBM PureData System.
   
Disaster recovery solutions are critical to avoiding service disruption during unplanned events, such as a natural disaster or IT outage. However, when setting up standalone disaster recovery solutions to protect data in the cloud, organizations can face costly and complex hurdles. With disaster recovery as part of the integrated system, enterprises using PureApplication System to run their cloud environments can now eliminate many of the manual steps required to set up and manage multiple point solutions. For example, PureApplication System transforms the configuration for replication and failover, with near-zero data loss, from days to a four-click process on each of two systems—the backup and the primary. ISPs and managed service providers (MSPs) can leverage this capability to deliver to their customers more resilient applications and application platform solutions based on the PureApplication System. "Disaster recovery is a critical piece of application lifecycle management," said He Guoping, chief technology officer at eWell Technology. "The ability to get these services up and running quickly across a cloud environment means we can offer this service to our customers efficiently and in compliance with related service-level agreements." Meanwhile, additional enhancements to the PureApplication System offer expanded software application support, greater security options and more system performance elasticity, IBM said. Specific capabilities of the PureApplication System platform include broad software application support, simplified encryption for the cloud and flexible system responses to usage spikes. The PureApplication System now features support for a broader range of software applications, including Windows and Linux, said Marie Wieck, general manager of WebSphere at IBM. Supporting multi-tiered applications than can run on the PureApplication System is particularly important for those using the system to provide a migration path to cloud environments. In addition, new security features include enhanced encryption capabilities. IBM is offering application-specific blueprints that automate software installation and ongoing management to enable users to set and enforce encryption policies to protect apps running on the system. New security patterns include the availability of FIPS 140-2 certified encryption. Moreover, the PureApplication System provides greater performance elasticity and improves the ability for applications to respond to spikes in demand to seconds while enabling users to provision fewer resources up-front, cutting operations costs. "IBM PureSystems is the ideal choice because it helps us to grow our business with higher flexibility and better time-to-market, at the same level of support staff," Christophe Bonnard, Sogeti France CEO, said in a statement. "Time-to-market for us is time to market for our customers." IBM continues to expand the built-in expertise of its patterns, and new capabilities to improve scalability and security of applications running on PureApplication Systems are examples of that ongoing commitment. Through its PureSystems Centre, IBM works with more than 275 ISVs to offer more than 375 software patterns across 21 industries that are verified "Ready for PureSystems." In addition to third-party ISV patterns, IBM CastIron, IBM API Management and IBM Datapower Gateway XG45 and XI52 appliances now support PureApplication System as well as new enhanced patterns for the WebSphere Commerce platform, IBM Maximo Asset Management, IBM Mobile Application Platform, IBM Business Intelligence, IBM Business Process Management and IBM Operational Decision Management.
 

IBM takes a big new step in cryptography: practical homomorphic encryption

IBM just released an open source software package called HELib.
The HE stands for homomorphic encryption.
Although it doesn't sound terribly sexy or impressive, HELib is actually an interesting and important milestone in cryptography.
HE is also a surprisingly relevant topic right now, with our ever-increasing attraction to cloud computing.
Bear with me, and I'll try to explain.
Imagine that I am your cloud provider, and I keep databases online for you.
Imagine also that I am a security-conscious vendor, so I keep all your data encrypted, both when I serve it up to you, and when I save it to disk.
That's about as good as it gets these days from a cloud security perspective.
→ It doesn't matter whether I'm a pure-play over-the-internet cloud provider, or just the manager of the server farm team in your own IT department. The situations are similar, though they may differ in degree: I've got your data, and you have no alternative but to trust me to do the right thing with it.
Now imagine that you want me to search through your data, for example to see how many ACME-WIDGETS were bought by customers called DUCKLIN in the last year.
Traditionally, the process would go something like this:
  • You encrypt the search terms and upload them to me.
  • I decrypt the search terms so I know what to look for.
  • I decrypt your data (perhaps only record by record, not all at once - that's a detail that doesn't matter here) so I have somewhere to search.
  • I perform the search using the decrypted data.
  • I encrypt the search results, if there are any, and return them to you.
Additionally, you hope that:
  • I get rid of all remnants, on disk and in memory, of both the search terms and the decrypted data once the search is complete.
  • I don't take advantage of you, since I'm decrypting your data for this search, to sneak in other searches at the same time, whether for my own benefit, or for my government, or for one of your competitors.
There's a lot that could go wrong - for you, at any rate.

The homomorphic difference

Imagine, however, if I could simply take your encrypted search terms, leave them encrypted, search for them directly in the still-encrypted database, and get the same results.
If I can perform calulations directly on your encrypted data, yet get the same results that you get from the unencrypted data, we both win enormously from a security and privacy point of view.
You don't need to give me any decryption keys at all, so you no longer have to trust me not to lose, steal or sell your data. (You still have to trust me to tell you the truth about any results I work out for you, but that is a completely different issue.)
And I no longer need your decryption keys, so I can't lose or abuse your data even if I wanted to.
That's the promise of homomorphic encryption, which we mentioned at the start.
Until 2009, no-one was sure whether homomorphic encryption was even possible.
Then, a Stanford student and IBM researcher called Craig Gentry showed that it could be done, in a PhD thesis entitled simply, "A fully homomorphic encryption scheme."
We weren't home and dry yet, though.
Gentry had what amounted to an existence proof, showing that homomorphic encryption could no longer be considered impossible, but he didn't have a practicable real-world implementation of the concept.
At the time, back in July 2009, well-known cryptographic personality Bruce Schneier praised Gentry's efforts, but pointed out that:
Gentry's scheme is completely impractical... Gentry estimates that performing a Google search with encrypted keywords - a perfectly reasonable simple application of this algorithm - would increase the amount of computing time by about a trillion.
Well, we're now a few steps further forwards, with IBM's release of the abovementioned software package HELib:
HElib is a software library that implements homomorphic encryption (HE). Currently available is an implementation of the Brakerski-Gentry-Vaikuntanathan (BGV) scheme, along with many optimizations to make homomorphic evaluation runs faster, focusing mostly on effective use of the Smart-Vercauteren ciphertext packing techniques and the Gentry-Halevi-Smart optimizations.
With a package description like that, it's obvious that consumer-facing homomorphic encryption tools aren't going to be a click away at the Play Store or the App Store for a while yet.
On the other hand, four years ago we didn't even know whether it would be possible to have homomorphic encryption at all.
So, watch this space! 

By: Paul Ducklin
Source: http://nakedsecurity.sophos.com/2013/05/05/ibm-takes-big-new-step-in-cryptography/

IBM analytics solving cancer

PORTLAND, Ore. -- IBM's medical diagnostics analytics are not exactly a 'cure' for cancer, but they are aiming to lower the cost of a promising new remedy for destroying existing tumors. The new technique uses a high-energy particle accelerator -- a room-sized version of the gigantic accelerators used to unravel physics -- that directs a proton beam to precisely kill the cancer cells inside tumors, leaving adjacent tissue untouched. IBM Research (Austin, Texas) is aiming to reduce the cost of this promising new therapy, using software analytics running on a Power7 cluster supercomputer.

The stakes are huge. Last year there were over 12 million cancer patients worldwide receiving various therapies, and that number is predicted to increase to 21 million by 2030. Unfortunately, today there are only 10 centers offering proton therapy, however 17 new ones are currently under construction at a cost of over $200 million each. Over $3.4 billion is being invested in current-generation proton accelerators, and smaller, less expensive accelerators are also being designed to make the technique more affordable.

The big bottleneck, however, is the computational workload required to utilize proton therapy.

Today proton therapy requires a long involved preparation process, starting with a magnetic resonance imaging (MRI) or computational tomography (CT) scan to identify the tumor's location, after which a bevy of doctors and technicians spend over a week mapping out exactly how to use a proton beam to destroy it. Unlike traditional radiation therapy, proton beams do not affect human tissue as they pass through it, only releasing their energy at the very end of the path, which must be carefully plotted to end precisely within the tumor.

Today it takes a team of doctors and technicians a week to map out the path for a proton beam to kill tumors, but in the meantime it grew, making success less likely. IBM's analytics running on a Power 730 cluster computer maps out the same proton beam path in 15 minutes. SOURCE: IBM



"The protons are accelerated to half the speed of light, but do not loose that energy until they hit a threshold, after which they release burst of kinetic energy," said IBM Research scientist, Sani Nassif. "Therefore, they can go deep into the body -- almost six inches deep -- where they create a very dynamic hot spot while not touching anything between the skin and that point." 

By: R Colin Johnson
Source: http://www.eetimes.com/electronics-news/4414133/IBM-analytics-solving-cancer

How IBM PureSystems can benefit your company

How IBM PureSystems can benefit your company

Virtualisation has revolutionised the delivery of services over the last decade. The ability to separate software environments from the hardware they are running on has provided numerous benefits. A single multi-processor unit can run multiple, even heterogeneous operating systems, which can be started and restarted independently of the underlying hardware. This has instigated the movement towards software-as-a-service that has taken place over the last few years. But whilst virtualisation can be hugely powerful, it still requires a large amount of technical know-how to configure and maintain. IBM PureSystems provides a fully integrated solution that aims to take the full benefit of virtualisation, and package it in a form that can be operated by a much wider cross-section of company employees.
PureSystems starts with the hardware, which has been specifically designed to maximise flexibility. The hardware comes in four main types, two for general-purpose usage, and two for workload-optimised deployment. The general-purpose options are PureFlex and Flex Systems.
The former is a full rack which can contain a host of integrated services, whilst the latter is a smaller chassis designed to provide everything you need in one box, although still with plenty of flexibility over components. Both can contain either X86- or POWER-based processing modules, or even a mixture of the two should you require this. For more details, and a full walkthrough of what the PureFlex and Flex Systems hardware has to offer, watch our video presentation with IBM Technical Product Manager Dave Ridley.
Moving on to the workload-optimised hardware, we have PureApplication and PureData. The former is focused on accelerating deployment of your choice of applications, whilst the latter is specifically aimed at data services, such as transactional and analytical provisions, including online transaction processing and data warehousing respectively. Unit options range from a 32-core “Mini” chassis to Large systems with up to 604 cores. For a more detailed overview of the various members of the PureSystems family, watch our overview with Chief Strategy Officer for PureSystems, John Warnants.
Whichever of these platforms fits your company's needs, however, the principal behind the system is the same, and revolves around the concept of Patterns. The traditional installation system involves a linear process of installing an operating system, then the necessary drivers, then the applications and other software you wish to use, followed by any data assets that will be required. Finally, there will probably be some further configuration required before the system can be used. This is clearly a rather involved process, and will take some time.
We haven't even mentioned the procurement process that will precede all this, both for the hardware platform required and the software that will run on it. It is possible to streamline this process somewhat using a standard disk image, and this is an effective strategy if you are rolling out multiple identical desktop workstations for end users. But if you need any new drivers or bespoke applications, you will be back in the realm of individual customised installation. Even in a virtualised server environment, a disk image can only ever be a generic collection of the key software, which may be fine for some uses, such as deploying a standard webserver, but it has very little flexibility.
The PureSystems Patterns concept provides the same sort of one-click installation as a disk image, but with a far greater level of flexibility. You can install a preconfigured Pattern from a growing library of presets. Depending on the utilisation of the underlying hardware, this can take a matter of minutes to complete, and only a few clicks will be required. There will be a few configuration options to decide upon, but deployment is so simple it can virtually be left to the end user. By attaching auditing functions to the Pattern installation, such as a departmental chargeback for its use and a set leasing period, users can obtain the resources they need for project work without the need for lengthy procurement cycles. They can be given a budget and allowed to manage resources themselves.
But the true power of PureSystems comes with the ability to build your own Patterns. You can do this at a fairly high level, specifying just a few component parts, or get right down to specifying the versions of software to be used and how the hardware in your private cloud is made up. The latter is particularly useful if you have proven compatibility between specific application and driver revisions. Creating a Pattern is a simple drag-and-drop affair, where you pull components into a configuration in the installation order desired. You can also include pretty much any shell script you want, for copying across data and configuration files.
The Pattern you create can be stored for future use by yourself or other users of your PureSystems environment. If you need to modify a Pattern, for example with a recent patch or new application version, you can simply edit the Pattern and all future installations using this Pattern will have the up-to-date versions. It's also possible monitor installed versions across your existing deployments, and update where required. You can watch a more detailed overview of the principles behind Patterns in our video with Chief Strategy Officer for PureSystems, John Warnants.
Forthcoming pieces will go into more depth as to how Patterns are experienced by administrators and end users, but here is a summary. The cloud environment of your PureSystems hardware is managed through the Flex Systems Manager, a web-based portal that lets you prepare the environment for Application Pattern deployment. You can set up the configuration of the compute nodes, including storage, I/O, boot options, and firmware. You can then monitor these nodes and deal with any issues that arise, such as BIOS and driver updates. You can set up strict or more relaxed compliance policies, and even call up a virtual view of your chassis with overlaid status information.
The next level of management comes via SmartCloud Entry, another web-based portal that turns the infrastructure you have created via the Flex Systems Manager into a private cloud. This presents a different range of options depending on whether you are logging in as an administrator or a user. As an administrator, you can define new clouds and configure users, as well as creating accounts for use in departmental charge back and projects within which to group users. You can assign virtual appliances to each project. As a user, you can merely deploy appliances from assigned projects, with a few configuration options, and these deployments will require approval from an administrator if this policy has been set. In future pieces, we will be showing exactly how the Flex Systems Manager and SmartCloud Entry portals function.
This then brings us to the unique part of PureSystems - the Application Patterns themselves. The IBM PureApplication System console provides the portal for this, and allows you to create two different types of pattern - Virtual Application Patterns and Virtual System Patterns. The Virtual Application Patterns don't give you a choice of middleware, but let you install an application with all the middleware it depends on at the same time, using a collection of Eclipse-based plugins. So, for example, you can specify an application and a database with only a few options to set, alongside a policy for handling demand.
The Virtual System Patterns, in contrast, give you much greater control over software versions and configurations, should your deployment require this. But it's still a drag-and-drop process, maintaining the ease of use found elsewhere in the PureSystems infrastructure. Again, we will be looking at the workings of the IBM PureApplication System console in detail in a future piece.
The simplicity of deployments in IBM's PureSystems can have some very real implications for your company's efficiency and costs compared to doing everything yourself in house, and not just at the deployment stage. The number of hours spent on Security and Change Management can be drastically reduced, with good savings in time spent managing capacity too. At the deployment stage, the system comes fully assembled and configured, with management software ready to run and the Pattern system available for action. You can monitor usage and scale automatically as required. The centralised nature of resources makes security far easier to control, too, and means that changes and updates can be rolled out in a very simple way. IBM PureSystems takes software-as-a-service to a new level, and this is why, since its launch in Q2 2012, over 2,300 PureSystems installations have been shipped.
PureSystems Patterns, like the hardware they run on, are based on the decades of experience IBM has providing integrated application and data server technology to companies big and small, covering every industry segment. The essence of this expertise is crystallised into Pattern components and the attendant server hardware, but now in a form that can be deployed in a flexible way by a much broader spectrum of company employees. IBM is very keen to demonstrate the power of PureSystems first hand, and provides demo rooms at its Innovation Centres around the world, including at its Hursley campus. You can request virtual access to try out PureSystems remotely at one of these centres, or come in to see the systems in action in the flesh.

By: James Morris

BlueM Super to Focus on Energy Research at School of Mines

The Colorado School of Mines has announced plans to install a new 155 teraflop hybrid IBM supercomputer dubbed “BlueM” to run large simulations in support of energy research. The new machine will be housed at NCAR’s Mesa Lab in Boulder and operate on the Mines’ computing network.
As the first supercomputer of its kind, BlueM features a dual architecture system combining the IBM BlueGene Q and IBM iDataplex platforms – the first instance of this configuration being installed together.

BlueM’s predecessor, RA, has been hugely successful but Mines has outgrown its 23 teraflops. BlueM will provide a greater number of flops dedicated to Mines faculty and students than are available at most other institutions with high performance machines. Researchers will be able to run higher fidelity simulations than in the past, get more time on the machine and break new ground in terms of algorithm development.

By: Inside HPC

IBM ready to get serious about the API market

At this year’s IBM Impact 2013 conference in Las Vegas; the second largest employer in the US unveiled an API Management Platform to extend the company’s huge software presence.
IBM offers software-orientated architecture (SOA) of which this latest platform is a part of; alongside delivering a MessageSight middleware appliance based on the company’s Message Queuing Telemetry Transport (MQTT) protocol.
Mike Riegel of IBM says about the MQTT protocol: “One of the big challenges for right now is that there is not a clear open standard for message communication with embedded systems.
“We know historically that unless you get to an open standard, it is not possible to drive the breakthroughs that are needed.”
He continued: “In much the same way that the HTTP standard paved the way for people sharing information through the World Wide Web, MQTT could set the stage for bringing online billions of low-cost, embedded data-collecting telemetry devices.”
This is all part of the rising “Internet of Things” concept; where all devices are connected to one another using their individual strengths to the benefit of all. Through support of this protocol, along with new APIs, IBM is positioning itself ready for the future.
The new API Management Platform consists of the Cast Iron Software which helps to integrate cloud applications; acquired by IBM in 2011, and the DataPower XML Integration appliance, acquired back in 2005.
Is IBM’s new platform a comprehensive solution? Is there more needed to be done to face the challenges of the future?
Be sure to check out the API strategies track at Apps World Europe 2013 in London on October 22 for more in-depth information on all the latest APIs and how to utilise them in your development.


By: Ryan Daws