You may have seen this week that Salesforce acquired Mulesoft for $6.5 Billion. I always like to think about “what does this mean to me?”.
To answer that we arranged a conference call with Richard Ganley, SVP of Digital Transformation with Informatica this morning. He has been with Informatica for more than 13 years and seen this industry evolve and shift each and every year.

When you choose Enterprise Information Technology for your career you virtually guarantee two constants in your work life:

1. There will be a continuous inflow of new ideas and new technologies that will be important and disruptive.
2. You will be so busy with your job that finding the time to review, understand and assimilate those new ideas and technologies will be very difficult.

Guest blog by ThinkApps

How-to-Start-a-Startup-front-cover-print“Enterprises are not going to be able to survive in the future if they do not get good at technology.”

This insight was offered by Box CEO Aaron Levie during his lecture for the “How to Start a Startup” course at Stanford University. The course was the basis for a new book of the same name produced independently by ThinkApps, an on-demand service for designing and building stunning apps for web, mobile, and wearables.

The “How to Start a Startup” book, which was nominated for Product Hunt’s “Book of the Year” award, is the ultimate reference guide to starting a successful tech startup. Below is an except from Chapter 10 on building for the enterprise, which features advice from Levie’s lecture.

Start Small

By finding tiny gaps in existing products, you can make that small space your niche, learn it inside and out, and completely own that wedge of the market.

“What you want to start to do is say, ‘We will take this sliver of a problem and we are going to make the user experience on that incredible,’” said Levie.

This way, you’re not even worrying about the big guys until you completely own your space enough to grow and branch out.

Spot Technology Disruptions

“You have to look for new enabling technologies or major trends … that create a wide gap between how things are done and how they can be done,” advised Levie.

This is not only key to finding that little sliver for your business to fit in, it’s also important for realizing new opportunities for your business before the competition catches on.

Find Asymmetries

There are lots of perks to being the little guy — find them and use them.

“You want to do things that incumbents can’t or won’t do because either the economics don’t make sense for them, the economics are so unusual, or because technically they can’t,” explained Levie.

Before you do this, though, do your research and find exactly where your incumbents can’t afford to drop their prices or personalize their UX. Then fill in those gaps.

Find Outliers

Examining those users around the cusp of your industry can give you just the edge you need to take your next steps.

As Levie put it, “Find the unique characteristics of those customers.”

“If you find customers that are working in the future, you will be able to work with them to find what is missing in the future.” Then ask yourself, “How do we build technology that supports all these new use cases that are going to emerge?”

If you work with those outliers as early adopters, you can study them to see how your product can evolve. This will also help you to distill your overall customer needs and narrow in on the best solution, which as Levie said, may be one that they need, not necessarily one that they want.

To learn more about the “How to Start a Startup” book and get your own copy, visit ThinkApps’ website.

To learn how CMI can assist with cloud management and cost to serve start up options, check out our ADC framework Introduction video or contact us to continue the conversation.


Cloud Provider Compliance Programs

Key on cloud ; Cloud computing security conceptAs companies leverage the cloud in various forms such as SaaS, PaaS, and IaaS, your company needs assurance that the cloud provider has strong security for its offering. Cloud provider compliance programs are your company’s first steps in evaluating the maturity of the cloud provider’s security. Security standards can be international, industry-specific, subject-specific, or country-specific. Take a moment to consider the various security standards, as each standard has different objectives.


Your company shares security responsibility with the cloud provider. The cloud provider ensures the security of their offering, while your company must ensure security inside the cloud provider offering. Each company should look at the three broad objectives of Enterprise I.T. Security:

  • Confidentiality
  • Integrity
  • Availability

First, a company should define their desired and required risk profile for each objective. Of course, the type of data to be stored and processed in the Cloud-based applications is relevant as is the type of systems that the company will be using (and their criticality to the business). Secondly, a company will  classify the data and applications that may be moved to the Cloud and assign the applicable desired/required risk profile. This will help designate the applications and data that may be more ‘Cloud ready’ and, conversely, it will classify applications and data that the company is concerned about moving or unwilling to move to Cloud Providers based on their risk profile.

Once a company has outlined their desired/required risk profile and appropriately classified their data and applications and for the target data/apps that may move to the Cloud, they have the ability to evaluate the Cloud Providers. Here are four questions to evaluate the cloud provider’s security compliance program:

  • Which compliance certification has the cloud provider achieved?
  • Which compliance certification certificates can be provided for evaluation?
  • Which security controls are in-scope for the cloud provider’s compliance program?
  • Which security controls are the responsibility of the customer, versus the provider?

Some examples of cloud provider compliance programs are as follows:

Moving securely to the cloud can be daunting without a disciplined approach. We have outlined a pragmatic and successful process that helps to assure an orderly transition:

  • Define your risk profile
  • Evaluate your applications and data for suitability for cloud
  • Select the cloud provider appropriate to your risk profile requirements

Sounds simple on paper and works well when done properly.  CMI will work with you through each step to help assure you achieve the business outcomes desired from perspectives of cost-to-serve, agility, and security. You can be living the dream.

Michael Giraldo is a Security Architect at CMI.  You can follow him on Twitter @michaelgiraldo.