Are your Master Builders free to create? Are your Ordinary Builders helping them to execute? And more to the point, are you acting like the evil President Business, hindering innovation, placing talent in silos, and keeping your organization frozen in the past?
If so, you may find an unlikely role model in Emmet Brickowski.
OK, Emmet may be an animated character made of plastic blocks, but don’t dismiss him so easily. If you are a manager looking to ensure your team is the best it can be, you may want to check out Emmet’s starring role in “The LEGO Movie.” I believe there is deep wisdom in what this little character has to say.
One of the key themes of the film is that many organizations adhere too strongly to their legacy traditions. Though such traditions may have served them well in the past, they can also sow stagnation and put a brake on agility and adaptability. This is especially true in the Internet of Everything (IoE) era, as a massive wave of network connectivity and innovation upends organizations, business models, and entire industries. In the process, longstanding assumptions around strategy and success are falling by the wayside.
Emmet lives in a world run by President Business, the head of a successful corporation that fears any change to the status quo. President Business will even resort to supergluing LEGO pieces to keep them in their rightful places. President Business divides the world into two kinds of people: Ordinary Builders and Master Builders. He rewards Ordinary Builders who follow the rules, building from their LEGO Kits; he disapproves of the “anarchic” creativity of the Master Builders, who like to improvise from a pile of blocks, and he is determined to capture all of them.
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda.
Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, queried, and the results inevitably take too long to return. Enter the graph database, a fundamentally improved database technology for specific threat analysis functions. Representing information as a graph allows the discovery of associations and connection that are otherwise not immediately apparent.
Within basic security analysis, we represent domains, IP addresses, and DNS information as nodes, and represent the relationships between them as edges connecting the nodes. In the following example, domains A and B are connected through a shared name server and MX record despite being hosted on different servers. Domain C is linked to domain B through a shared host, but has no direct association with domain A.
This ability to quickly identify domain-host associations brings attention to further network assets that may have been compromised, or assets that will be used in future attacks.
“This conference is designed not only to make you think about the application of automation, but also to help you take action” – David Greenfield, Automation World, editor in chief and TAC event director
The conference achieved this goal and more. The framework of the sessions encouraged audience collaboration and dialogue around the challenges and practical steps and strategies being designed and deployed to achieve an integrated and scalable IoE architecture that drives value across the entire manufacturing value chain, as depicted in the video below:
What better way to meet that objective than to leverage a manufacturing use case around beer!!!!
Automating Brewing Operations from Two Different Perspectives
I attended this session where Highland Brewing, Sierra Nevada and Vicinity Manufacturing gave an interesting perspective around the challenges and strategies in deploying their next generation manufacturing operation.
Highland Brewing is a regional brewer of craft beers based in the Southeast and Sierra Nevada is a larger brewer with more of national brand. The interesting contrast between the two is that Highland Brewing is designing more automation into their operational facility and Sierra Nevada is scaling their automation and IoE strategies across all their facilities. Both perspectives and approaches have the same objective. How do I effectively integrate all the various technologies into an intelligent, flexible and scalable system/architecture to meet the following business outcomes:
Increase Customer Loyalty
Supply Chain Optimization
To paraphase Kevin Wheeler, Director of Operations, Highland Brewing Co,“Our core competency is crafting great beer. We have an opportunity to drive efficiency into our operation by an integrating IoT/IoE platform … the challenge is figuring out the best approach.”
Like Highland Brewing, manufacturers must begin to transform existing business processes and fundamentally rethink how they create, operate, and service smart, connected products in the IoE. For those that get it right, the future represents a huge opportunity to create product and service advantages.
Are you having challenges putting together the “IoE technology puzzle?” Is security the main barrier to IoE adoption?
Introducing New Adapter for Cisco UCS Manager, Lightweight Java Client, Multi-domain AD/LDAP Authentication & Runtime User Support for TES Workgroups
Managing and automating mission-critical business process is key to the success of your enterprise. By managing the delivery of the right data to the right application at the right time you can ensure that everyone in your organization has the information they need to be successful.
End-to-end Workload Management with Tidal Enterprise Scheduler (TES) 6.2
Adapter for Cisco UCS Manager The Enterprise Adapter for UCS Manager allows users to schedule UCS Manager component infrastructure jobs through Cisco TES so that users can leverage the scheduler’s capabilities to automate, simplify, and improve job scheduling and workload performance. The UCS Manager Adapter integrates with UCS Manager using the XML API and provides for the automation of UCS Manager activities for blade and rack-mount server management in the form of UCS Manager jobs. This allows you to control and manages server instances as part of an overall infrastructure and data processing workload management solution.
Job Definitions for Cisco UCS Manager
Lightweight Java Client For power users who are managing thousands of workloads and their associated objects in their database, the Java client syncs data directly from the Master, but it is many times faster than the client manager because all data is stored in-memory on the Java VM rather than to an external database. Many interactions through the Java client will see marked increases in performance including smooth scrolling with zero latency and faster search and filtering.
Lightweight Java Client for TES 6.2
Flexible Security Feature For large enterprises that segment globally or for any user who creates domains for their data center, Cisco TES now supports multi-domain coverage from a single client manager allowing greater flexibility and ease of use. And for greater runtime flexibility, Cisco TES allows users to associate runtime users to workgroups to be used while defining the workloads.
Data in data warehouses doubles every 2.5 years. For users, this means more data to analyze, leading to better business outcomes. That’s the good news. The bad news is that this extra storage capacity and computing power comes at a cost. A high cost it turns out.
So what is an enterprise to do?
Keep writing bigger and bigger checks to the data warehouse vendor? At least the business can take advantage of the extra data?
Or should they move some of the lesser-used data to tape? That will save money. But it will also limit business access to this now “off-line” data which may mean missed business opportunities.
What if there was a third option that would preserve the on-line access for the business analysts and control these escalating costs for IT?
Log in here to access the presentations at Cisco Live on Cisco’s new Big Data Warehouse Expansion.
Cisco Big Data Warehouse Expansion is a new offering that combines hardware, software and services to help customers control the costs of their ever-expanding data warehouses by offloading infrequently used data to low-cost big data stores. Analytics are enriched as more data is retained and all data remains accessible.