Author: Bruno de Vuyst    Follow @b_devuyst on Twitter

While spot prices suffered from the Fed Minutes released yesterday and sank, looking more closely at LME quotes for later delivery may be of interest. The volumes are picking up, albeit slowly. Moreover, there appear to be increasing delta’s between offer and bid as one progresses in time of delivery. This may be interpreted as writing on the wall for a further bear market in 2017, which would be in line with general macroeconomic forecasts of a weakly recovering global economy, with lags in trade

But this might also be interpreted as pointing to results in restructuring by miners and smelters, and the very beginnings of a new, realistic, price setting, which would be less bearish.

Key is now to follow closely progress reports in the sector, so as to see which of the players are first in succeeding in their restructurations. Such progress may not reflect immediately in earnings and may be buried inside a report, but they may be the key indicators of success to come.

Is there hope outside of that town in Arkansas? Rather than investing in a marketing organization and hoping for its further inventiveness in producing gadgets we all want to have, it may be profitable to ride out the bear market and to be ready to pick up on profitably restructured market participants at increasingly interesting p/e ratios.


Webinar on securing IT assets


, , ,

Having secure IT assets should enhance the overall user experience by ensuring security is more effectively and more seamlessly embedded into everyday IT and IT services provisioning activities. But IT assets have a lifecycle, and they need to be protected differently during this lifecycle. Automation of the protection process allows the core competencies of the staff to be focused on more strategic aspects of asset security than patch management or stolen passwords.

I recently shared a webinar with Dell and Markit on IT asset management and information security, which you can listen to on InfoSecurity Magazine here.

Some of the points I was making in my presentation on IT asset management were:

  • The lifecycle cost of an IT asset begins with planning and design and continues through procurement, adoption, operations, maintenance, rehabilitation/renewal, and disposal/replacement.
  • IT asset management (ITAM) seeks to optimize costs through each stage of this lifecycle, while meeting established levels of service, reliability, and risk. In today’s enterprise, ITAM plays a dual role of asset management and risk protection.
  • Protection levels can be performance-related (critical value to the business), or customer/regulatory related (impacting response times, complaints, information availability, etc.).
  • Risk is the exposure and uncertainty assumed due to the opportunity for significant damages. And data from IDC had previously forecasted that by this year, 25% of large enterprises will make security-related spending decisions based on analytical determinations of risk.

But what kind of IT assets bring the most concern to the enterprise today? Half the world’s population will be on mobile Internet by 2020. And the key drivers behind the growth in the mobile worker population include the increasing affordability of smartphones and tablets combined with the growing acceptance of corporate bring your own device (BYOD) programs. In addition, innovations in mobile technology such as biometric readers, wearables, voice control, near-field communications (NFC), and augmented reality are enabling workers in completely new ways, increasing productivity by enhancing communications and business workflows.  And these devices need to be secured to protect the enterprise.  But it is not just about endpoints, but also the network and the physical assets of the enterprise that are impacted by IT asset management not being automated and hardwired into the organization.

So one of the key points I made was that the key to a successful IT asset management program is the legwork performed before selecting solutions, including evaluating your existing IT environment, gaining executive sponsorship, setting program goals, committing the appropriate human resources, and designing strong processes that support your organization’s business objectives. Before getting started with your asset management security program, it is important to achieve the following milestones to ensure not only that the right solution is selected, but that the processes are formally established, understood, and documented.

One of the discussion points between myself and my fellow presenters was the fact that older IT assets are not as well documented as the newer ones.  I mentioned in the conversation that I had a 10 year old Dell from previous employment that was still able to access that domain. ( I am not sure which was the more startling statement, then 10 year old Dell still worked or that it could still log on to the systems of my previous employer!)   We discussed the concept of good practices (ISF Standard of Good Practice) and the importance, not only from a risk perspective but also from a compliance agenda, to be able to reduce the risk of information security being compromised by weaknesses in hardware / software and protect assets against loss, as well as support development of contracts and meet compliance requirements for licensing.

One other point I made in the presentation was around encryption. It is necessary that an IT department have an encryption plan to provide reasonable assurance that all enterprise owned devices, such as laptops, can be identified and encrypted. Encryption is at the heart of a complete endpoint security solution. When you safeguard the data, you reduce the risk of compromising sensitive customer or employee information, confidential files, and your company’s reputation.  So you need to make it easier to identify and activate new devices as they come on the network for their usage of encryption.  And to find the older devices as they log back in for software updates into the network.

The CISO on our panel from Markit talked about the convergence of IT asset management (ITAM) and security.  His point was the security professional had a very different point of view in the past on what an asset is because their focus is information risk. IT managers focused instead on where physical hardware was at any time; from a software standpoint, the focus was on consolidating license negotiations.  Now this is coming together, not only due to cyber threats but for protection of the rest of the assets (data or otherwise) of the enterprise.  Another point he made was that decisions regarding procurement, deployment and management of technology are not made centrally and then there is a disconnect. There is no point in putting into place sophisticated network forensic tools (from the network team) if there is no basic patch management from the desktop team.

Our main point: There needs to be a holistic view of IT asset management throughout the lifecycle of the object in question, and throughout the entire IT team as to how to address the risk profile of the assets.




By Bruno de Vuyst    Twitter: b_devuyst

The Rockefeller family is backing away from fossil fuel. Forget that the forebear built the family fortune on Standard Oil: the descendants want to invest in renewable energy.

For the time being, however, fossils will be needed. Nuclear energy has become a safety suspect, and wind, solar and water energy have not picked up sufficiently to meet energy demands. Moreover, the cost of these alternatives still leaves to be desired if one considers fossil fuel.

In the meanwhile, some fossil facts.

Or the lack thereof.

Venezuelan production numbers are shrouded in mist. Saudi Arabia has, in the last three years, lost market share in nine out of 15 of the most important client countries. All of this while volumes of production grew exponentially.

Crude oil prices hover today around USD 40/barrel, both for WTI and Brent (notice the lack of meaningful spread between the two).

No wonder. If prices go through 45 USD/barrel and sustain such a level, North American production of shale oil may activate again, causing a further oversupply and, ultimately, a price decline.

There is as much talk of higher crude oil prices than of the Fed raising rates. In both cases, there may be much ado about nothing. Indeed, as the supply/demand situation is not globally straightening itself out, there is no escape from a narrow price band. It may be until 2017, at best, that one may expect a price rise, and then it will likely be either a cautious one, not to awaken possible production entrants, or a brutal one, to take a temporary advantage of the lag between the decision to come on stream and the actual coming on stream, before the next price decline.

It is not unrealistic to expect some OPEC and some non-OPEC producers to choose the second scenario, as, apart from Kuwait, all are under budgetary pressure and any windfall may be appreciated.

This assumes that OPEC, and in particular Saudi Arabia, leaves caution – and market share. Giving in to other OPEC members, it would leave market growth to Iran in particular – not a happy thought for Saudi Arabia.

For that reason also, do not assume a production cut in reality. It may be pushed onto some more reluctant members; however, words may be words, and cheating might be rampant.

All of this may be the reality of 2016: a very brittle economic upturn in the US, possibly combined with an about ten per cent correction in the stock markets, Western Europe remaining in the doldrums, Asia attempting to climb out of a lack of export growth and China experimenting with an internal, consumption driven growth model, while at the same time dealing with a real estate bubble and with massive debt burdens in public companies and some municipalities.

Domotics and Digital Home Services


, ,

I have been a keen fan of the concept of connected home and the connected office for quite a while. In fact, I coined the term “personal service provider” for pre-cloud  era servers that would sit in your linen closet and remotely manage your personal documents (birth certificated, marriage licenses, home owner documentation, etc.) for you.   Domotics have always intrigued me, as the infrastructure in your home has always been under leveraged in my humble opinion.

I was reading an article at lunch in Fast Company from the March issue where it talks about our homes becoming the creative home of our work lives using Slack.  (NB: I also use Slack, and like it very much.)  And some of these ideas resonated with me in terms of digital home services.  For example, if you are in need of a contractor for your home, Slack could connect you to local tradespeople who are willing and able to work in your community.

But if you extend these possibilities, then your automated home could also reach out for a solution provider when it senses you will need one, in advance of the problem escalating to a more costly impact.  Imagine if you home belonged to Slack, along with other homes as well as people (contractors, energy firms, home automation vendors) that your home could help optimize your living environment.

A bit out there?  Not for long.  🙂

Impact of the evolving storage ecosystem business model


, , , IT Priorities Survey for 2016 has just released its findings, which questioned 194 IT professionals in the UK and Ireland. And they found that flash storage deployment appears to have plateaued. They stated that solid state storage (SSDs) is a key project for 16% of respondents, down slightly from just about plateauing across 2015 (19%), 2014 (20%) and 2013 (18%).

So is this a surprise?   Have flash storage priorities changed? Let’s take a look at what is driving flash in the storage ecosystem right now.  Naming conventions: The terms flash storage and solid state disk (SSD) storage are often used interchangeably to describe a type of storage that has no moving parts and can be erased and reprogrammed. SSD is a disk that does not have moving parts, and flash is the implementation that allows that to happen. Modern SSD hard drives are flash-based.

There are two main drivers for considering flash in the storage ecosystem: the increases in storage volumes required by higher definition in video and mobile computing, and the trend for higher performance for certain applications such as rapid SQL querying for customer online purchasing.  Last year we saw more flash technology embedded in servers to increase response time for consumers, specifically those in transaction rich industries such as healthcare, finance and retail, where instant transactions can define the customer experience.

And flash is impacting market consolidation and arguments in the market place, with EMC acquiring XtremIO, NetApp acquiring SolidFire, EMC and Pure Storage continuing to wrangle over infringed deduplication technology, and Violin Memory recently taking a restructuring plan and reduced headcount by approximately 25 percent.

There is no argument in the datacenter that the first tier should incorporate flash from a performance perspective.  Major storage suppliers already report that shipments of 15,000rpm disks have almost entirely been replaced by flash in the form of solid state discs (SSDs). The question is what should be chosen for the second (and perhaps third and fourth) tiers – disk, flash, hybrid flash combos, or what other option? And what is this uncertainty impacting flash adoption?

The storage ecosystem model explained

What data sits where, and why? Tiered storage is the foundation of information lifecycle management (ILM).  Data is stored appropriately based on performance, availability and recovery requirements. For example, data intended for restoration in the event of data loss or corruption could be stored locally — for fast recovery — while data for regulatory purposes could be archived to lower cost disks, either at a remote location or not in the production environment.

Like the “death of the mainframe”, the “death of disk” is also exaggerated as there will always be a need for HDD in some form or fashion in the overall storage ecosystem, whether it be for archiving, recovery, remote storage, cold storage etc. The big thing in storage ecosystem design now is consolidation.  But to build up the infrastructure could require adding hard disk drives (HDD) for performance, not capacity.

Traditionally, datacenter storage is tiered on the basis of latency, IOPS and relevancy of the data to operations.  With flash in the mix, datacenter storage is becoming more tiered than now, meaning that there would be at least three tiers:

  • Ultra-low or low latency, will be flash based if not all flash (AFA)
  • Low latency/high IOPS,  hybrid flash or HDD
  • “Cool/cold,” long term storage, mainly HDD

A report that was published in 2012 by the University of California and Microsoft Research (UCMR), The bleak future of NAND flash memory, painted a pessimistic picture of the future of flash: “Building larger-capacity flash-based SSDs that are reliable enough to be useful in enterprise settings and high-performance enough to justify their cost will become challenging. We show that future gains in density will come at significant drops in performance and reliability. As a result, SSD manufacturers and users will face a tough choice in trading off between cost, performance, capacity and reliability.”

Even with flash technology coming down in price, it will still be a while before datacenters start moving to all flash. Many think that going all flash would be a mistake, because not every application is going to need it. But if enterprises are forward looking with their storage footprint in their own ecosystem, where does flash fit in the tiers?  Is it price dependent, or application specific?

Price and performance

New flash arrays are generally available and priced competitively with traditional hard drive-based arrays. Which means that prices for SSD are dropping, but are also in line with the goals of the HDD business, which sets goals for itself mapping out the industry’s planned areal densities (bits per square millimeter of HDD surface) several years in advance.  This is managed by IDEMA (International Disk Drive Equipment & Materials Association), and is called the ASTC (Advanced Storage Technology Consortium).

So price is a factor, but not alone. For something like an all-flash array (AFA), scalability, particularly scale-out, becomes a primary differentiator. Even blended, SSD-HDD combinations will favor flash. For hybrid arrays, the ratio of flash capacity continues to grow as customers seek a balance between the cost-effective capacity of hard disk drives and the business-aware performance of flash.

Trade-offs – the implementation of hybrid flash

The shift for flash at present is pragmatic and more for going hybrid. A hybrid array combines flash memory with traditional disk storage, with flash mostly used for applications that demand a high number of IOPS and traditional spinning disks used for storage. Hybrid combinations of flash drives and HDD have become a viable option for organizations of all structures. There are many ways IT can architect solid state discs (SSDs) into the storage mix. Many are simply adding SSD drives to the PCIe slots in the servers, which also have hard disks (or configuring new server purchases with flash drives) or adding them as direct-attached storage (DAS). Companies managing storage networks are also increasingly adding flash to their storage arrays. In a growing number of shops where performance is critical, some are stepping up to pure flash-based SSD storage.

AFAs will likely only needed for the most performance sensitive application workloads.  The move to hybrid came after IT departments started to realize the challenges of what an all flash environment could face. For example, you have the “boot storms” that occur in the beginning of the work day with the simultaneous installation of software, patches or workloads with multiple people performing needed tasks on a schedule.

Reliability of SSDs

One of the remaining questions is if SSDs are reliable enough to replace disk drives completely. With an SSD, you must first erase the original data and then write the new data, so no overwriting. And ultimately memory cells wear out, limiting the number of times you can erase and write data. The more data stored on the drive and the greater the number of write operations, the sooner performance will begin to degrade. An important part of the management functionality provided by the controllers built into SSDs is wear leveling, a process that controls how data is written to prevent one set of them from wearing out before others. In this way, the controllers can help to significantly extend the life of the drives. SSDs are still susceptible to a number of vulnerabilities, and they tend to fail more spectacularly than HDDs. And data recovery can be much trickier with an SSD, often requiring specialized expertise or software to retrieve the lost data.

 How to best configure the ecosystem

The key is understanding the I/O profiles of the workloads and then using I/O profiles to generate workload models that can be used to evaluate hybrid offerings versus AFA vendor offerings and to determine the optimal configuration mix of HDDs and SSDs in the ecosystem. A focus on use cases can best drive the specialization of storage systems and new tiers of storage. Best action is to look into the use of storage workload modeling tools and load generators.  Tools such as Load DynamiX provide ways to determine the performance characteristics/limits for any storage system specific to your workload profiles.   For any storage deployment, it is important to get a handle on peak workloads, specialized workloads such as backups and end of month/year patterns, and impactful events such as login/logout storms.

Final note

There is a paradigm shift from storage being stand alone to more software-defined storage (SDS), which is another blog post in itself.  In the shift for enterprises to be application and use case led in defining their infrastructure, they are starting to understand the dynamic between applications, compute, network and storage. Storage is becoming an integral part of the entire stack and tightly integrated with the use case for the business and the necessary performance/ reliability trade-offs.

A different kind of day in Brussels

Most of you who know me know I am based in Brussels.  I had a very busy day planned yesterday, and got to my office at the university in the very center of town rather early, so I could get some writing in before teaching my 11am Foreign Trade class.  About quarter past eight, I went to see a colleague who normally comes in fairly early, and she said to me — it’s awful!  And then I saw what had happened at our airport. I went back to my office, and sent a DM to my friends in social media at Brussels Airport, wishing them strength and sending support.

And then saw a Tweet from a former student, Evan Lamos,  that he was in the metro, his ears popped and the metro stopped suddenly.   And then I started hearing about what happened in our metro. Evan’s pictures and interview were on many of the major channels and news senders.

I then heard a commotion in our hallway, and one of my colleagues had just come from the central station (2 min walk from our place) and was a bit hysterical about the security and the lock down of the station.  And then I heard about the transportation shut down.

And then all of our phones rang at the same time, which never happens.  The university had pushed an urgent message to us and to the students to stay inside and to make sure we carried our uni ID with us.  And our Dean came down the hall telling us classes were cancelled, and we need to go back to our offices (and get back to work!).

But two of us were scheduled to teach, and we asked the question if we could go across the street to the classroom building and see if students were there, and if we could help them understand the situation and answer questions.   We were allowed to do so, and I came to the classrooms to find most 9am classes had stopped lecture and were watching live streaming of the major news channel.

For my 11am class, only one student (out of 98) showed up, since she was already on campus.  I talked to her about her assignment (which was due at 5pm), and since she could not go home, brought her back to my offices, gave her a place to work, better WiFi and let her borrow my office landline to call her grandma and tell her she was okay.  The mobile network was fairly challenged by this time! She told me where she was from / where she lived, and I made arrangements with colleagues on the next floor down who had a car and lived in the same area to get her home later.

Because in Belgium, it is all about networking.  Before I knew it, several colleagues had come by (it is normal I drive to the uni when I come in, not normal for my colleagues) asking if I still had a seat in my car for the ride home.    Most wanted to leave ASAP, but I had meetings most of the afternoon.  Most of those got cancelled, and I left with a full vehicle at 4pm (Mr. Toad’s Wild Ride then started, I had four babbling guests and they have never driven with a Californian before 😉  ).

From about 11:30 onward, I started receiving mails, texts, tweets, etc. from folks around the world asking if I was safe and okay. Yes, I do travel a lot and yes, Brussels Airport is my home port and Twitter friend, so I do take lots of airport shots in my Twitter stream.  I have the utmost respect for the crisis communication from the airport team yesterday, and have said as much openly on Twitter yesterday as well.

A few things struck me about yesterday.

  1. The faculty and the parents of the students were a lot more unnerved about the events in Brussels than the students were.  The students were only wondering if their midterm exams on Wed would be cancelled, and did they have to study anyway?
  2. When push comes to shove, we know how to communicate.  Both formal and informal communication platforms worked well, and we arranged for transport and buses for the students and the staff.
  3. People care about people, whether it be first responders, people offering rides or places to stay, or people just inquiring if you are okay.
  4. This is not about religion, nationality, patriotism, belief structures — it is about compassion, understanding, cooperation.

Today the campus is shut, not out of fear, but because of the logistics of transport in Brussels today and for securing the facility even tighter for the coming days.  And with technology enabled faculty and staff, we still are doing business albeit slightly more 21st century version today.

This unfortunately reminded me of when I was at Cornell, and we had a hostage situation in our dormitory, which made the national and international news.   Surprising after all these years that memory came back for me.  Similar kind of panic due to fear and miscommunication, with a news media aftermath and then an impact on how we lived/worked, with processes changed and doors now locked.

Life goes on.



When the “C” in CRM stands for Citizen: My POV on the Optevia acquisition by IBM


, , , ,

When government (local, regional, federal or national) provides public sector services for its citizens, they should have a responsibility to provide them in a professional, timely manner. That’s not an easily scalable activity when dealing with thousands of citizen cases, often with limited resources. However the aim is to deliver consistently positive experiences to your citizens or constituents. And using external providers who may be better resourced or with a more rationalized core competency in this area can be beneficial to all involved. In my consulting for regional government, I find that they actually work even harder than federal government to find ways to engage their constituents, given how important the revenue stream is for them to be prosperous. Therefore a cloud-based CRM system is an excellent fit for a resource constrained yet innovative regional public service authority.

Which is why I was pleased to see that IBM announced Friday that they had acquired Optevia, a privately owned Software as a service (SaaS) systems integrator specializing in Microsoft Dynamics CRM solutions for public sector organizations. Optevia will join IBM Global Business Services and help meet the increasing client demand for CRM SaaS solutions within the public sector. Optevia’s main focus on UK health, housing, and emergency services, along with their role in both local and central government service provisioning, puts their services smack in the centre of the citizen’s world. Building solutions based on a foundation of Microsoft Dynamics CRM, Optevia has worked with governments from the local to central level, public service agencies, and more.

The acquisition of a Microsoft Dynamics CRM integrator highlights that IBM is interested in industry sector solutions, and is not adverse to that solution being based on another SaaS platform.

Why this is valuable for both IBM and Optevia is:

  • For IBM: IBM gains Optevia’s expertise, experience, and agility in the public sector CRM SaaS space, plus the benefit of their wide-ranging existing client relationships.
  • For Optevia:   Optevia gains access to IBM’s technical skills plus its reach and range, as IBM said that the Optevia solutions will be scaled across other areas worldwide.


Details of the acquisition were not disclosed. Optevia was founded in 2001.

To rethink the process, rethink the content creation


, , ,

I am multitasking right now, trying to finish a report, an article and two blog posts, as well as finishing my weekly assignment for my online teaching course. No, I am not bragging, rather I am a bit bemused by how the process of all of these is similar, but yet very different, because of the content.

One of the pieces is on process realignment, so I am stopping for a moment and sharing my thoughts on content creation with you.  So much of what we do now is crafting content for delivery, rather than focusing on content creation and then worrying about what form the delivery will take. This reminds me of a conference I went to a number of years ago where the focus of the conference was content creation, but almost all of the booths at the show were on delivery and distribution.

I was at the Shopping Innovation Expo on Thursday here in Brussels, and attended the session of Steven van Bellingham who seems to be well-known in Belgium for his expertise on social media.  What drove the audience in droves to his presentation was not how he packaged his message, although it was very well done, but his message itself.

Because of my work schedule, it is taking me much longer these days to get my content out, partly because I am too concerned about the packaging of the content for delivery.   So what hit me this morning, as I am making my to-do list for the weekend for work, is just how much of my time is spent on content delivery, rather than content creation.  And for me, content creation has been the joyous part of the journey.  So I am changing my processes to align with being in the “data” business, and will just focus on bringing you that content as best and as rapidly as I can get it out……!

Back to work.

Serendipitous – being lucky in making fortunate discoveries?

NB:  I wrote this small piece below in September, but decided not to publish it as it was a bit too personal.  But after this last week, thought better of it.  After a comment made to me by a teammate last night, I decided to push the button.  The comment was: “What is your motivation to push so hard right now?”

I have had a serendipitous weekend, and I wanted to share it with you.  I had an interaction at the university with one of the managers that left me rather low on Friday.   But that state of discomfort was eased by some unexpected pieces of interaction over the weekend.   I found these in many places: in a very timely article contribution by an old friend in my LinkedIn stream, in an unexpected email with a photo for me of old friends at a reunion who missed me, chatting with two US family members via Internet, and in the line of weightlifters I was weighing in for a competition on Saturday lunchtime who were happy I was there.

There are people who appreciate what I have to offer.  And these are things I grasp onto to move me forward, instead of holding me back to be just like the others around me.  When I am not, nor should I strive to be so.

I have always been more than a “glass is half full’ kind of person.  For me, the glass needs refilling and I push and drive and nag to get it there.    And so now I go to refill my glass again, and will continue to look with curiosity and interest for more in life than just what is in front of me.

A matter of non-fraud


, ,

I just had a very frustrating experience involving fraud and e-commerce.  But it is not what you think — quite the opposite.  I went to buy an electronic good via a well-known Benelux online store, using a major credit card I have not used for a bit.  Should be simple, right? As I can verify who I am and I have the card in hand.

Opened an account with the online store, placed the order, went to pay.  Would not accept the credit card. Then I received a fraud account activity mail promptly from the card provider.  Great, I said.  Thanks for checking  – yes, it is me.  Ah, go ahead and try again, said the card provider.

Placed the order. Order was accepted.  And then about midnight, as they are getting ready to load my order, the online store cancelled my order.   Because it is my first purchase with them, I must use a debit method, not a credit card method, to establish a secured relationship to avoid fraud. Even though the order was placed and accepted.

So I see this message, and get both parties online (separately).   The card company apologies and says please, try it again, do not worry, you were not yet billed and we are sure they will accept the card.   The vendor says yes, try again, but without the credit card.  And I lack the cash buffer in the account right now to do a debit payment.

So I am now without the object in question, but hey, no fraud!  And no shopping or customer satisfaction either.