@CloudExpo Authors: David Sprott, Elizabeth White, Pat Romanski, Liz McMillan, William Schmarzo

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Agile Computing, @BigDataExpo

@CloudExpo: Article

Two Digital Transformation Time Bombs

Hire a Chief Digital Officer to don the pirate gear, raise the Jolly Roger, and take your ship on an adventure

Adjectives like "swashbuckling" and "romantic" rarely if ever apply to enterprise technology, so the fact that "rogue" IT is now a Thing should give one pause. Errol Flynn swooping down from a yardarm, disarming smile on his too-handsome face? Hardly the image you'd expect bringing your iPhone to work would elicit.

Yet rogues there be, sneaking digital contraband into their cubicle, unbeknownst to IT Big Brother. And while we all like to bend the rules, if only to shake up our Dilbertian existence with a fleeting moment of swashbucklery, rogue IT goes far beyond your secret Angry Birds at work addiction, or dare we say, that contraband DropBox account your entire team surreptitiously shares.

Rogues, after all, come in all shapes and sizes. When the rank and file practice a bit of derring do, it's one thing. When Big Brothers themselves - the executives who steer the ship - practice rogue IT, it's quite another. Yet this top-down scalawagness pervades enterprises far and wide, threatening to upend the IT ship altogether, CIO and all. The name of this nefarious ne'er-do-well? Your Digital Transformation Strategy.

Digital Transformation: A Rogue's Gallery
Imagine, if you will, you've been working your way up the officer's ranks of your vessel, and now you're the captain (or other C-level executive) of this ship you call your enterprise. Information Technology has always been a powerful asset in your treasure chest, from the early data processing days to the rise of monolithic enterprise apps. Then the Web and its evil twin Y2K hit, knocking you and your ship for a loop, promising a New Economy yet delivering a dot.com crash. After that perfect storm you told yourself you'd never again fall for the empty promises of the new technology sirens, singing their songs of business transformation but delivering only broken dreams.

Yet here we are, in the 2010s, and the siren song of new technology is louder than ever - and this time, there are far more voices in this craven chorus: Cloud Computing! Big Data! Social Media! Mobile Apps! DevOps! Added to this cacophony are the digital denizens of this new era, the Googles and the Amazons and the Netflixes, no longer mere dot.com darlings, but massive behemoths out to take a piece of everyone's pie, including yours. This time, sitting on the sidelines is not an option. Siren song or no, the world of business is changing, and your enterprise must change as well, or risk the deadly depths of the Charybdis of digital disruption and irrelevance.

But then you wake up from this reverie and look once again at the cold, hard reality of budgets and balance sheets, and you realize your IT department has their hands full with dull, dreary, yet absolutely essential legacy systems of record - all those numerous apps and infrastructure that have been collecting over the decades, sucking up money, yes, but keeping you in business all the while. Disruptive innovation is all very fine and good, but legacy technology and disruption don't mix. That old gear is just too brittle and important to mess with, right?

That's when it hits you: it's time to go rogue. Your IT department has way too much on its plate to handle the digital transformation you crave so desperately. So instead of asking your CIO to drive these new initiatives, you hire a Chief Digital Officer (CDO) to don the pirate gear, raise the Jolly Roger, and take your ship on an adventure into the wondrous digital future.

Hear that Ticking? Beware the Digital Disruption Time Bombs
We all know that genuine pirates and other such rogues are ruthless criminals, and yet a century of Hollywood mythmaking has turned them into heroes, courageous nonconformists who can justify their questionable deeds because of the presumably greater evil of the establishment from which they have rebelled. Today, we consider CDOs and their digital transformation initiatives to be examples of rogue IT - bucking the establishment, true, but with the best interests of the enterprise at heart. Motivation enough to forgive a bit of swashbuckling, perhaps?

After all, the legacy technology that runs the established portion of the business has a history of intractability. Legacy modernization has a reputation as being expensive, risky, and often lacking clear business drivers. And when we tried to abstract our legacy as flexible Services with the last decade's SOA initiatives, we found that architectural approach to be more expensive and difficult than we expected. Most SOA initiatives overpromised and underdelivered, leaving CDOs with few options but to go rogue and build digital initiatives largely separate from establishment IT.

Errol Flynn and his modern counterpart Johnny Depp notwithstanding, is it truly in the long-term best interest of the company for the CDO to go rogue? In the short term, absolutely. The technology buzzwords du jour aren't holding still, and moving quickly is essential to successful digital transformation. And if there's one thing traditional IT is bad at, it's moving quickly. Yet, while Johnny Depp's Jack Sparrow has yet to meet his maker at the end of a rope, enterprises who place strategic bets on rogue IT risk two major time bombs going off in their face.

Time bomb #1: thinking that you can achieve the benefits of digital transformation without dealing with the legacy mess. It's tempting indeed to leave the established order behind. Many organizations think of their legacy IT as a single Gordian knot of complexity, where the only way to fix it is to somehow fix or replace the whole thing - an impossible task that would never come close to justifying its expense. The pirate's life sounds wondrous in comparison.

But remember, legacy is not monolithic. It's heterogeneous and multifaceted, and you don't have to fix the whole thing. Your core business agility drivers from transformation initiatives must connect to specific legacy goals while moving legacy toward agility, not away from it. Yes, you must pick your battles, as the legacy you do bring into your digital initiative will take time and money to fix - but never forget that your enterprise wouldn't be where it is today if it weren't for the best of your legacy.

The challenges with legacy modernization in support of digital transformation are first, to tackle the right problems, and second, to take an approach that will actually work. After all, such fixes require both the appropriate abstraction as well as technology that can support those abstractions. Not SOA - or at the least, not only SOA, but one big step above SOA. For specific legacy capabilities to properly support the digital transformation, we need a better approach for abstracting legacy assets to drive agility, an architectural approach freed from middleware and laser focused on the business agility drivers from the digital transformation initiative.

Even if you think you can avoid time bomb #1, however, you must also navigate your way past time bomb #2: Realizing you have to do something about the legacy mess, but thinking there's a shortcut. Examples of such shortcuts: migrating legacy apps to the Cloud, feeding existing data into Hadoop without a strategy for collecting new information, or perhaps building mobile app interfaces onto aging Web apps that were never designed to support them. True, you may be able to get any of these examples to work, but you'll have missed the point of digital transformation initiatives: they're not about the digital, they're about the transformation. After all, your entire legacy IT shop is already digital. Transformation requires entirely new approaches, not shortcuts.

The Intellyx Take
Perhaps you're not convinced by my scintillating, scoundrel-infused diatribe. Your digital transformation initiative is doing just fine on its own, thank you very much, while IT keeps the legacy lights on, and never the twain shall meet. Sorry to shiver your timbers, but you're not alone in your market. Your competition also struggles with their legacy burden, and the spoils will go to those enterprises who successfully deal with their legacy as part of their digital transformation. If you don't get this right, then your competition will, and no amount of derring-do will save your digital transformation initiative then.

The good news for some organizations is that if you have been successful with SOA you're ahead of the game (and I know there are a few of you out there who actually got SOA to work). But regardless of whether SOA paid off for you or not, to meet your strategic goals with your digital transformation initiative, you must follow a well-architected approach that both understands and connects the business drivers for digital transformation to specific, tactical legacy initiatives.

Remember, transformation drivers are always business agility drivers, which means Agile Architecture is absolutely essential to digital transformation success: an iterative, dynamic approach that focuses on solving problems instead of paperwork, an approach that incorporates regular input from stakeholders - in other words, architecture that is inherently Agile. Going rogue may be fun, but it's high time for your CDO and CIO to work together - or even be the same person. Errol Flynn would be proud.

Image credit: Pascal

More Stories By Jason Bloomberg

Jason Bloomberg is the leading expert on architecting agility for the enterprise. As president of Intellyx, Mr. Bloomberg brings his years of thought leadership in the areas of Cloud Computing, Enterprise Architecture, and Service-Oriented Architecture to a global clientele of business executives, architects, software vendors, and Cloud service providers looking to achieve technology-enabled business agility across their organizations and for their customers. His latest book, The Agile Architecture Revolution (John Wiley & Sons, 2013), sets the stage for Mr. Bloomberg’s groundbreaking Agile Architecture vision.

Mr. Bloomberg is perhaps best known for his twelve years at ZapThink, where he created and delivered the Licensed ZapThink Architect (LZA) SOA course and associated credential, certifying over 1,700 professionals worldwide. He is one of the original Managing Partners of ZapThink LLC, the leading SOA advisory and analysis firm, which was acquired by Dovel Technologies in 2011. He now runs the successor to the LZA program, the Bloomberg Agile Architecture Course, around the world.

Mr. Bloomberg is a frequent conference speaker and prolific writer. He has published over 500 articles, spoken at over 300 conferences, Webinars, and other events, and has been quoted in the press over 1,400 times as the leading expert on agile approaches to architecture in the enterprise.

Mr. Bloomberg’s previous book, Service Orient or Be Doomed! How Service Orientation Will Change Your Business (John Wiley & Sons, 2006, coauthored with Ron Schmelzer), is recognized as the leading business book on Service Orientation. He also co-authored the books XML and Web Services Unleashed (SAMS Publishing, 2002), and Web Page Scripting Techniques (Hayden Books, 1996).

Prior to ZapThink, Mr. Bloomberg built a diverse background in eBusiness technology management and industry analysis, including serving as a senior analyst in IDC’s eBusiness Advisory group, as well as holding eBusiness management positions at USWeb/CKS (later marchFIRST) and WaveBend Solutions (now Hitachi Consulting).

@CloudExpo Stories
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially publishe...
SYS-CON Events announced today that Impiger Technologies will exhibit in Booth #109 at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Impiger Technologies is a world-class, enterprise software product engineering company specializing in Mobile Application Development, Cloud Applications, Microsoft Technology Solutions, Web Technology and Telecom Services. Impiger Technologies helps enterprises improve busi...
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
SYS-CON Events announced today that Cemware will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Use MATLAB functions by just visiting website mathfreeon.com. MATLAB compatible, freely usable, online platform services. As of October 2016, 80,000 users from 180 countries are enjoying our platform service.
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...