The turnout at Pulse 2013 is expected to top 8,000. Shouldn't you be there too?
Consider that every year since Pulse started in 2008, the Pulse turnout has been larger than the previous year. That suggests the Pulse experience is generating real value for attendees... and more and more service management professionals are taking advantage of that value as time goes by.
The headline of the event—"optimizing the world's infrastructure"—puts it plainly: If you want to deliver better services to customers, optimization of the infrastructure that delivers those services should be a critically important part of your strategy.
This is where Pulse 2013 delivers in spades. By addressing both the technical and business sides of the story—as well as how they interact—Pulse 2013 will help organizations understand how to improve their infrastructures, improve their services, and thus, improve their business bottom lines.
And while the specific tracks and streams have yet to be announced, you can be sure that Pulse will address some of the hottest topics in business today—in most of which IBM is a world leader.
Cloud and IT Optimization
Recent estimates suggest that the number of enterprises leveraging cloud computing as a key aspect of business innovation will double in the next two years. Why?
"By attending Pulse, you can find out more about IBM solutions related to the mobile enterprise, and all the ways IBM clients are already using and benefiting from them every day."
To begin with, cloud offers a clear opportunity to enhance service delivery. Because they allow key resources—processing power, memory, storage, and network bandwidth—to be allocated where they're needed in near real time, services are more available and more responsive to customers. Cloud also helps reduce operational costs, particularly labor costs. And, of course, cloud is also utilized via several different models, allowing organizations to choose the best fit for their needs.
Another selling point: cloud can help organizations link IT operations and IT development in new ways. Much of today's business innovation is expressed via software-driven services created in-house; in such a scenario, a cloud can serve as a shared platform leveraged both by the team developing the services and the team managing those services once they're in production. Because each group has access to useful information historically owned and managed by the other, both groups can improve service quality throughout the application lifecycle.
This is why IBM has, in recent years, devoted a great deal of time and energy to its cloud offerings and capabilities. And at Pulse 2013, those offerings and capabilities will be explored in considerable depth.
The IBM SmartCloud portfolio, for instance, represents a cloud foundation on which organizations can gradually build—moving from basic functions like virtual server provisioning and asset monitoring to more advanced capabilities, like IT service desks, change and configuration management, big data analytics, and service usage and accounting.
Beyond solutions and capabilities, though, is the question of specific business deployments and the benefits they generate in the real world. Here, too, Pulse 2013 will offer an impressive range of content, including case studies from IBM customers and business partners, emerging best practices gleaned from front-runners in the field, and new integration opportunities.
One of the best ways to optimize an infrastructure is to focus on efficiency.
For instance: Is the enterprise's complete infrastructure really as cost-effective as possible... or are there untapped opportunities to economize, in areas such as energy efficiency, real estate management, space management, and information sharing?
By identifying such opportunities, collecting the relevant data, assessing it in many different ways, and creating a strategy of improvement, organizations can rapidly create a better outcome, for both themselves and their customers.
One clear example: enterprise asset management. Today's enterprises typically have an incredible diversity of assets, spanning such groups as IT, facilities, buildings, mobile, and communications. The better those assets are maintained and configured, the better they will perform, the more value they will create, and the longer they will last. Tracking the complete array of assets, however, is an enormously difficult task—let alone creating and executing an optimal management strategy.
Similarly, energy efficiency is a growing concern for most enterprises. Data centers, increasingly the heart of both internal and external services, often represent a tremendous opportunity for improvement because energy costs are the fastest-growing element of their total cost picture. Many data centers were simply never designed to support their current and future workloads and will require significant energy optimizations if they are going to continue to function at all.
At Pulse 2013, you'll get a chance to learn about these and other ways to make your complete infrastructures smarter, and more resilient, via IBM's extensive range of solutions and capabilities.
The IBM Maximo asset management family, for instance, can unify all asset information in a single repository, then help you get the best use of it through an optimized business process engine. IBM TRIRIGA (link resides outside ibm.com) solutions can help you assess your energy efficiency and carbon footprint, then create a strategy to accomplish all your current business goals—or more—while reducing the total energy required. Space utilization and real estate management of buildings and entire campuses, similarly, can typically be substantially optimized—all part of a larger goal of creating the maximum value with the lowest effort, risks, and costs.
In fact, IBM is already helping entire cities achieve that goal! By attending Pulse 2013, you can find out how.
In the 21st century, no single transformation in consumer technology has been as dramatic as the success of smart phones and tablets. And going forward, enterprises are going to have to find new ways to leverage these devices... without creating unwanted complexities, challenges, or compromises.
Today's smart mobile devices have incredible potential to simplify access to information and services. And it's natural that an enterprise's workforce would want to use them to access business information and services. The problem, however, is that these devices were never originally intended for such purposes, are typically not owned by the organization, and therefore aren't configured and managed in the ways they need to be to minimize risk.
And that risk is considerable, particularly in the area of security. As the workforce increasingly uses smart mobile devices for business tasks, there is a growing possibility that business-critical data and services will be compromised, since they are being accessed outside the company's own infrastructure, using public networks, on insecure devices.
Pulse 2013 offers a great opportunity to bring yourself up to speed on exactly these issues—and everything IBM offers that can help reduce that risk, while still offering employees the convenience and familiarity that make mobile devices attractive in the first place.
As one good example, consider IBM Endpoint Manager for Mobile Devices. This solution utilizes both agented and unagented capabilities to secure smart endpoints such as phones and tablets as much as their underlying operating system will allow—helping to protect both the employees who own them and the organizations whose services they access.
Furthermore, organizations can also use this solution to create an in-house enterprise app store, bolstering security even more by offering only tested, proven apps to the workforce. And over time, as newly secured app versions become available, the solution can also push those versions out to the endpoints—all via a privacy-conscious model that employees personally understand and approve.
By attending Pulse, you can find out more about IBM solutions related to the mobile enterprise... and all the ways IBM clients are already using and benefiting from them every day.
Security intelligence and data protection
If security is on your mind—and it should be—Pulse 2013 will be an exceptionally good learning opportunity. Mobile solutions represent only a drop in the bucket of IBM's total value proposition in enterprise security, an area where the growing range of sophisticated threats has led to a new generation of smarter security solutions.
Consider the case of security intelligence—a special case of the larger concept of business intelligence. The idea of security intelligence is to pull together different forms of information, analyze them using best practices and smart policies, and thus respond more quickly and more effectively to a possible breach-in-progress.
Imagine, for instance, that your IT infrastructure could detect several failed log-ins to a database that were followed by a successful log-in. Imagine that it could determine the database was currently being accessed from Russia—a country where your organization has never done business. Imagine it could detect a download of that database in progress. And imagine that it could immediately shut down that event—stopping critical information from leaving your organization and potentially creating a tremendous negative business impact.
To accomplish such a goal, security intelligence solutions work by aggregating far more forms of information, drawn from more sources, than earlier generations of security technology, and then analyzing that information with incredible speed to determine the best possible response. That's what makes them different and better—and that's why IBM offers them to its clients today.
And, of course, security intelligence is only part of the complete story of IBM Security. Data protection also plays a critical role, in ensuring that data is as fully protected as possible, across as many repositories and systems as necessary, even when it flows between them and changes over time. IBM also offers leading capabilities in related areas like identity management and access management—to determine which employees, and groups, can access which services and data, with which privileges. Because these solutions are integrated both with each other and across lines of business, they can rapidly address many common security scenarios (example: an employee leaves the organization and her access rights should be immediately eliminated).
At Pulse 2013, you can find out all the ways this rapidly evolving field has changed in the last year—and the best available ways to keep your organization secure, against the complete range of threats both known and unknown.