Wednesday Jan 22, 2014

The Application Security Manifesto – The Great App Re-Architecture

Author: Greg Jensen, Senior Principal Product Director

In our previous post in this series, we touched on the “State” of our current Applications and how we have traditionally incorporated security models into these applications in the past. We also touched on how the next generation of application requirements are evolving to incorporate a number of ground-breaking changes in how we leverage security within the application, and how we use the applications themselves.

The Great Application Re-Architecture

It has always been the great give and take in IT.  The lower IT product owner wants the most capable product, regardless of what the rest of the business is using, forgoing the possibility of cross pollination benefits. It’s about being able to do their job as well as one can.  The other side is, the executive who wants an integrated approach where multiple products from one vendor are designed with integration in mind, to cross pollinate data and information across teams. Individual product capabilities may not be as strong but the greater benefits of a single vendor approach sit better with executive teams.  This has been the struggle companies have been dealing with for decades and only recently is there a light at the end of the tunnel with the advent of an open framework based on an open standards approach for sharing information between “best of breed” products and vendors.  This allows the individual IT product owners to get the best of breed product they want, while the executive teams who look for cross-pollination and integration, reap the benefits of a standards-based method of integrating across the stack. 

So what is this gain?  This has allowed us to now look at a new methodology for the application and development of our Applications and the services that support it.  When we are able to de-bundle and share services such as security, rather than building security into every application, the benefit is obvious and immediate.  It means applications can be brought up in near real time, with a simple hook into the security module, using a standards based (Service Oriented Architecture - SOA) connection, to pull Identity profiles and policies into new applications.  This means one can now repeat this process again and again with new applications and services, without creating new security profiles and infrastructure. It’s all about repeatability, re-usability and the added benefit of centralizing all of your auditable data in one location for compliance-based reports.

The Five Transformational Principals

There are always drivers of transformation, and for applications, it can be summed up in five principals that are currently driving the transformation we are discussing: Fine-grained Entitlements, Identity Platform Services, Social Integration, Complete Access & Mobile/Cloud.

External Authorization & Fine Grained Entitlements

Today, access just isn’t about the managing passwords and user ID’s inside the enterprise anymore. We have to move beyond the old model of granting access privileges to specific repositories of information and for each application separately with the expectation that the role of the user never changes.  The reality is…it does.  Take the example of a group of users for a large investment bank.  You would like to treat your junior traders with more limited privileges that are based around restricting trading limits and times in which they can initiate trades.  However, as your junior traders grow in their careers within the organization, it is important that their access grows with them.  This means their access needs to change over time, rather than just being layered and added upon to ensure “over provisioning” does not occur over the course of an employee’s career.  At the same time, you’re most senior fund managers need to be given the authorization to perform larger transactions, day or night, without any daily limits, from any Geography, and from any device inside or outside the bank network. This is the kind of “context based” Identity Management that truly unlocks the potential of enforcing just what each employee role is capable of doing.

Identity Platform Services

Organizations are putting a major emphasis on cost reduction efforts, and there are many areas this is being accomplished throughout the enterprise. Common data repositories, common reporting systems, common event collection systems, common security information management tools and the next step is utilizing common security frameworks for externalizing the security from applications and platforms.  This has the added benefits of cost savings from a licensing standpoint, ramp up time on projects, training and overhead, and ability to re-use.  There are also secondary savings in reduced exposure to audits by centralizing all of the regulatory and compliance event data in one single location, one report, and one auditable database. 

Social Integration

Criminals understand well that one of today’s fastest trends is the use of “social sign-on” or the use of Facebook credentials for authenticating and logging into other applications and services.  We can create new accounts on a web site, or log in using our Facebook credentials.  This is all in the name of making things more convenient. A form of “single sign-on” for the masses, called “social sign-on”.  How often do we read about social credentials being stolen, compromised and being taken advantage of, so why are we putting so much faith in them without extra precautions?  Imagine what one can do with these social credentials if one used them across a variety of services and offerings for authentication?  This is why there needs to be an additional effort in securing these social credentials, by absorbing them within a broader Identity that is provisioned to you, that is more secure.

Complete Access

This takes us to how we can expand all of our digital identities, user identities, passwords and more into a single set of credentials that one has to remember and authenticate.  Now to the average person, this sounds like a risk.  In the world of Single Sign-on, we are more likely to change our master password every 30 days, than we are the 30-40 passwords that it manages underneath.  Criminals understand that many users are likely using the same Gmail password today, that they did 1 year ago.  Many also understand that many of these users also repurpose personal passwords into their work environment.  So the idea being…if you can compromise their account, you can compromise their HR account at work, or their financial records database.  This is simply because the human mind is unable to remember too many complex passwords, and if they are changed every 30 days, then we struggle even more often.  Enter the world of Complete Access and offerings such as Single-Sign on.  This allows one to set up a master user ID, and password, which you are required to reset the password on a frequent basis. For extra protection, companies may ask you to provide multi-factor authentication, such as 1) What you have (smartcard, key or biometrics) 2) What you know (pin #, passphrase).  Once this Authentication takes place, the SSO client quickly unlocks access to a small database of all of your User ID and passwords for each of your applications and services.  Now the idea here being, now each individual application and service you set up can now be a strongly cryptic password, and not a variation of the same password. Now you can set time limits of 30 days and expire your passwords.  Now you can set up a provisioning process for your enterprise applications so that you provision only one User ID and password, and never share any of the unique User ID and passwords for the individual apps underneath it.  This allows you to more easily de-provision applications and services at will.   This doesn’t stop at just the desktop; this is what extends to mobile platforms now as well. So regardless if you are on a Windows, Mac, Android or iOS device, your Complete Access follows you.

Mobile & Cloud Security

With the mobile platform, enters a whole new category of applications underpinned by what we call the “Cloud”, and this brings into question how we address the security implications of both of these platforms. Five years ago, a 5,000 employee organization was struggling with how to manage the provisioning model for 5-7,000 user IDs for their employees.  Today, that same company is dealing with 5 to 10 identities per device, per user.  With each employee leveraging 2 to 3 devices, this could be as many as 200,000 identities in itself.   Now businesses are facing the bigger dilemma with the cloud.  How do we create, provision and manage credentials for all of our partners and customers who do business with us over the Internet?   In a consumer oriented business, this could be millions of identities. What is needed is an architecture that can scale as the business needs transform to include new technologies, new services, and new avenues of sales and distribution.

Maturity of the Optimized Application

As with everything in technology, we are seeing maturity and capability grow in leaps and bounds in the areas of our Application Optimization.  We have moved from the days of our first applications where our security focus was limited due to its complexity and high cost, as well as limits in regulatory reporting, to models where we started to consolidate our applications. Here, we started to see some degree of centralized security controls, but they were very limited in nature.  Today, we are in a phase of what we call the “Optimized Platform��, where the main driver is Data Governance for Risk & Compliance.  This is not where our maturity for applications will end.  The future is a bright one, and we will see Optimized Processes where the drivers are automated auditing and compliance reporting, in the not too distant future.  It doesn’t stop there.  This maturity and capability has to take us to the point where we are including Self-Healing and Automation where some of the main security drivers are automated fraud management and automated IT & User provisioning.  The key to this maturity is having an infrastructure in place today that is capable of growing with you, as the capability grows.

In Summary – The Platform Transformation

We have discussed where we are with our state of applications today.  We have shared where we need to be and the transformation principals that will drive this Great Application Re-Architecture.  All of this is supported by a platform transformation here at Oracle that we call Oracle AppAdvantage.

Oracle AppAdvantage for Security, is simply when we de-bundle from the application, and make it part of the platform, a sharable component that all applications can leverage.  When you build a car, the car battery isn’t used for just the engine to start with.  It’s used to power the radio. It’s used to power the lights, the horn, the seat warmers, and the fan. Everything.  It’s a shared component within the car.  It’s a platform approach to building an automobile, and we are now doing the same for security. 

Tuesday Sep 17, 2013

Inside the OOW Session: 5 Easy Steps to Modernizing Business Applications

Let’s face it – our applications map in the company isn’t clean. We have multiple applications, some homegrown, some acquired, a few other purchased. Chances are there is some overlap in what these applications do for us. We are in a constant state of motion with our applications. Add to that changing business needs, technology disruption with social, mobile, analytics and big data and the ever-evolving regulatory landscape, and we are far from achieving Nirvana with our applications infrastructure.

The question then is how do you extend your applications and enhance the value you provide to your application users, especially customers without having to sneak in brittle customizations within your applications and adding to your application development, maintenance and upgrade cycles?

5 steps! Yes, at Oracle OpenWorld next week, we will walk you through 5 easy steps to modernizing your existing business applications to meet your evolving business needs without having to re-code your applications. Make sense of it all in a scalable, sustainable way.

To prove it, we will have Fred Stern from Flextronics joining us on stage to discuss his very successful implementation and the business impact of doing it the AppAdvantage way.

Join Fred Stern, my colleague - Ajay Khanna and I at Oracle OpenWorld as we discuss this some more. Be sure to add this session to your Schedule Builder.

CON9284: Five Easy Steps for Modernizing Business Applications with BPM
Thursday, Sep 26, 11:00 a.m. – 12:00 p.m.
Moscone West - 2014

We will see you there!

Learn about this and other Oracle AppAdvantage sessions at OpenWorld in the Focus on AppAdvantage Guide.

Tuesday Aug 27, 2013

Focus on AppAdvantage at Oracle OpenWorld

Heading to Oracle OpenWorld this year? With the conference less than a month away, as you start to build your schedule, we wanted to make sure you had some key information handy.

If you are an Oracle Applications customer or looking to modernize your company’s IT infrastructure, or are interested in finding out how current and expected industry trends like social, mobile, cloud, big data and more are impacting IT plans for organizations today, you may want to look at the Focus on Oracle AppAdvantage document and attend one or more of these sessions.

This year, Oracle Fusion Middleware and Oracle AppAdvantage sessions are designed to give you a 360-degree perspective on business transformation and IT platform modernization implementations. Hear first-hand from your peer organizations, implementation experts, consultants and technology experts on how you can bring a successful implementation to bear. You will especially find multiple sessions focusing on how Oracle Fusion Middleware is augmenting the value you are deriving from your Oracle Applications implementation. Oracle AppAdvantage sessions this year are all about how the sum of Oracle Applications and Oracle Fusion Middleware is greater than the individual parts.

We suggest you bookmark the Focus On Oracle AppAdvantage document link. The document lists the schedule for primary Keynotes, General Sessions, relevant Oracle AppAdvantage conference and Hands-On-Lab sessions that you will find at Oracle OpenWorld.

And here are the top must-attend sessions we recommend for our readers:

CON9600: General Session: Accelerate Business Innovation with Oracle Fusion Middleware
Monday, Sep 23, 3:15 pm – 4:15 pm
Moscone North, Hall D

CON8082: Innovation Awards Ceremony: Oracle Fusion Middleware: Meet This Year’s Most Impressive Innovators
Monday, Sep 23, 4:45 pm – 5:45 pm
YBCA - Lam Research Theater

CON9301: General Session: Transform the Enterprise—Optimize Applications Investment with Middleware
Tuesday, Sep 24, 12:00 pm – 1:00 pm
Moscone West - 2002/2004

CON9302: Enterprise Application Innovation: Business Impact of Oracle Fusion Middleware
Tuesday, Sep 24, 3:45 pm – 4:45 pm
Moscone West, Room 2014

For complete information, please view the Focus On document.

We recommend you log in to Schedule Builder to search sessions, view schedules, browse exhibits and demos, and add events to your calendar.

A complete listing of Focus On documents across all solutions and product areas can be found here

Monday Jun 17, 2013

Happy National Small Business Week

This week is all about you – small businesses that have made it or are looking to make it from the ground up. This week we are celebrating your creativity, your courage, your endurance and resilience. You do what you love and share with us and for that, we applaud you.

As you waddle through the challenges of operating small businesses and look to scale your operations, at Oracle, we are busy thinking of how to make your lives somewhat easier. Here are a few ways Oracle Fusion Middleware can add value to your growing businesses:

Build business mobility: If thinking of taking your business applications mobile, scale with declarative development of native on-device mobile applications, enable seamless access across multiple mobile devices and operating systems with Oracle Identity Management and connect back-end systems to mobile devices with Oracle SOA Suite for mobile integration for your enterprise.

Enable online collaboration: Connecting online with your customers, vendors, et al? Take control of the web experience! Deliver a consistent, superior and targeted online experiences across web, mobile and social channels. As you look to go global, integrate social collaboration tools, content and experience management technologies with your existing sales, marketing and customer applications.

Move your applications to cloud: If you are looking to leverage cloud to take advantage of low operational costs, better efficiency, enable business agility, consider simplifying your application integration strategy by adopting a service-oriented architecture and enforcing security to mitigate any risk.

Extend your business applications: Get the customizations out of your ERP applications and alleviate the costs & effort involved with upgrading and maintaining customized applications. Bring it all to the logic (process) layer and build composite applications that improve your speed to market and give you the agility you need to build your business while managing data across all systems.

The idea: you worry about running your business, let Oracle Fusion Middleware take care of your back-end systems. Happy National Small Business Week!

Wednesday Jun 05, 2013

A Look Back - Embracing the New Social, Mobile, Cloud Imperative

Earlier this year, we launched one of the biggest social media programs in the company’s history. Titled “The New Business Imperative: Social, Mobile, Cloud”, the campaign showcased, week after week, how the new technology trends – social, mobile and cloud are transforming the way we do business today and discussed how Oracle Fusion Middleware technologies enable adoption of social, mobile and cloud by businesses. The series featured short screencasts, customer videos, informational materials on how Oracle Fusion Middleware offers the foundational platform for organizations looking to embrace these new trends to improve customer engagement, boost productivity, bring agility and improve the company’s bottom-line. If you missed a portion of this or would like to revisit, we suggest you bookmark this link.

We greatly appreciate your interest and feedback in this program. As the 5-month long program draws to an end, we wanted to recap the essence of this program by featuring an introductory screencast from Howard Beader, Senior Director, Oracle Fusion Middleware. 

And, download the whitepaper “The Enterprise Imperatives: Social, Mobile, Cloud” to learn how organizations today are embracing these new technology trends using Oracle Fusion Middleware.

To remind you, this is just a look back, not a goodbye. There is still more to come from this program so do stay tuned. As always, we look forward to hearing from you.

Thursday Mar 21, 2013

Managing Security in the SoMoClo World

Identity Management Product Marketing Team Blog

As we look forward in 2013, we look at the key trends driving the IT transformation today. Surely, mobile, social and cloud would top the list. With the proliferation of mobile devices companies are looking to offer access to the most commonly used (or user facing) business applications on users’ personal mobile devices. The spread of social networking is forcing organizations to allow users to access company resources using their social media sign-ons. And regardless of whether it is in a datacenter or in the cloud, the business application needs to be just as secure and reliable.

Customers today are demanding a seamless online experience, one that is geography agnostic. But most applications that are required to support this seamless digital experience were architected 10 or 20 years ago and are not scalable or agile enough. Worse, the applications still keep user experience and security at cross-hairs; you inevitably compromise on one or the other.

The applications for today and tomorrow will need to support the internet scale, offer a seamless user experience across all channels and yet be secure to enable a digital interaction with confidence. Which means, a re-architecture that adopts SOA for flexibility, BPM for collaboration and participation, a scalable user portal and Big Data for better business analytics and Fast data for the massive scale that will be required and a Security Inside Out approach. To learn more about how each of the Fusion Middleware components fit into a social, mobile, cloud strategy, we recommend you peruse all the videos and assets for The New Business Imperative: Social, Mobile, Cloud screencast program here.

In our previous posts, we talked about the essentials for Securing the New Digital Experience and how Oracle has adopted a platform approach to provide a solid foundation to enable a secure, seamless digital experience. If you missed our screencast, you can watch it now.

We wanted to share with you, some customer experiences. Industry leading organizations have adopted the platform approach to Identity management and have started to leverage the capabilities of our latest release, Identity Management 11gR2 to enable secure mobile and social access. Companies, like SaskTel, are offering Identity Management in the cloud to some of the most security-conscious organizations.

SuperValu, for example, is leveraging Identity Management to bolster employee productivity in their stores by delivering secure, simplified sign-on for store managers on iPads.

And Oracle itself is using Oracle Identity Management internally to offer a centralized, single identity system, a simplified identity context to its employees across a myriad of applications the employees have (and need) access to. Managing a dynamic workforce across geographies, folding in M&As, leveraging Identity Management to power the cloud services – Oracle Identity Management within Oracle is another good example of the success of a platform approach to identity management and security. Catch this podcast to get the full Oracle on Oracle story.

Engage with Us

Wednesday Mar 20, 2013

SoMoClo Drives the Next Evolution in Identity Management

Identity Management Product Marketing Team

The world (and hence an enterprise) today is very different from what we had say even 5 years ago. Lines between social and professional worlds are blurring fast. I use my smartphone to connect with friends and colleagues, check in on FourSquare for business meetings, follow my friends’ updates on Facebook, check work email, respond to LinkedIn requests from my professional friends and review the .xls sent by my colleague.

The pace of technology evolution is driving the customer expectations today. User experience is key as noted by Naresh Persaud, Director, Security & Identity Management in this screencast. A user needs to be able to sign on using say, the Google account, and use that across all his/her media experience – a smartphone, an iPad, gaining access to business applications, logging on to social media sites like Facebook, LinkedIn, others.

But so is security. A spate of security incidents in 2012 has, once again, brought the security issues to the fore. Did you know that 76% of mobile applications today store credentials on the device and 10 percent of those store passwords in pain text on the device? With 90% of organizations looking to offer mobile applications by 2014, those are indeed grim statistics. In a world where 62% companies are looking to connect with their customers and build relationships via the social networks, news stories like LinkedIn password hacking definitely make users like you and I pause.

Identity Management is the lynchpin for security and user experience. Breaking away from tradition, the latest release of Oracle Identity Management, 11gR2, marries convenience with security in offering a complete, seamless and secure digital experience to the users.

Focusing on reducing time to deployment and overall Total Cost of Ownership (TCO) and easing the user experience, R2 takes a platform approach to Identity Management bringing innovation, simplification and extreme scale to bear.

Leveraging the innovation in Oracle Fusion Middleware implies Identity R2 utilizes a common, standards-based model for workflow and UI customizations. R2 offers a scalable internet-grade identity platform that leverages ADF for UI customizations and workflow extensibility, SOA for flexibility, on BPM for collaboration and Coherence for extreme performance and WebCenter clustering for scale support.

Learn more about how Oracle Identity Management 11gR2 supports usability and scale requirements and the out-of the-box features that it offers to support the social, cloud and mobile security features. Catch the on-demand R2 launch webcast today and engage with us on OracleIDM to discuss your emerging identity requirements and whether or not you think R2 meets those. We look forward to hearing from you.

Engage with Us

Monday Mar 18, 2013

Do you Trust Social, Mobile, Cloud?

Identity Management Product Marketing Team

The last decade or so there has been a complete transformation in the way we work or how we consume information. Work is no longer about geography, it is an activity. “Company resources” are not just servers and systems in your server room, these could be in a data center, in the cloud or even the employees’ smart phones, iPads, tablets and more. Users of these “company resources” could be employees with physical badges, vendors, partners or customers connecting through the social media channels as Facebook, Twitter or Pinterest. Work can happen anywhere, via any device, through any network (intranet/social media channels/internet) leveraging company resources.

And why are organizations adapting this “work anywhere, anytime” model? The reasons are plenty - to improve efficiency, bring agility, build user productivity, offer seamless user experience to its customers or to simply establish a trust relationship with the customer. Social, Mobile and Cloud (SoMoClo) together is a business opportunity, a competitive advantage that organizations are seeking. And Security is the lynchpin in this new work order. Without a secure, seamless digital experience, it all falls apart.

With each new experience, the security risk increases. Each channel presents its own security points of failure. How can my company enable social trust as a means of connecting to customers & employees? How do I accommodate dynamic workgroups and teams of people around the globe that need to be part of my value chain? Is the Bring Your Own Device (BYOD) threatening the security of my digital and intellectual property? How can I securely connect mobile devices to my enterprise without compromising security? Are my applications secure enough to be cloud ready?

The security solution, thus, needs to scale and span across all the channels, encompass the growing breadth of both the “company resources” and the user population. The solution needs to provide the foundation (a platform) that feeds uniform security policies and extends identity context to the complete digital experience.

Naresh Persaud, Director, Security and Identity Management at Oracle, discusses the IT transformation driven by SoMoClo and underscores the need for a sound security solution. Catch this brief screencast on Securing the New Digital Experience to learn how the latest advances in Oracle Identity Management and Oracle Fusion Middleware solutions are fueling the transformation that is driving innovation in IT today.

Engage with Us

Friday Feb 15, 2013

Ready, Set, Go! Learn about “The New Business Imperative: Social, Mobile, Cloud”

And we’re off … over the next 5 months, you will learn about New Business Imperative: Social, Mobile, Cloud and how you can help transform your enterprise, your industry.

On Tuesday, we had our screencast, “The New Business Imperative: Social, Mobile Cloud” (you can catch the replay here).

Did you know?

80% of Fortune 500 executives say enterprise-wide collaboration is the key to success

By 2014, 90% of companies will support their applications on personal mobile devices

56% of surveyed executives believe the cloud will make their organizations more agile and competitive

For the next 5 months, we will be featuring a new topic each week, exploring the key trends that are impacting businesses today, You will gain new insights as to how Oracle Fusion Middleware can help transform your enterprise by taking advantage of today’s business imperatives.

For more information, download the latest white paper, “The Enterprise Imperatives: Social, Mobile, Cloud” (download here).

Join us next week, to learn more about creating a social business culture that engages employees, customers and partners with Oracle WebCenter.

Engage with Us

Thursday Feb 14, 2013

Learn More about Social, Mobile, Cloud in White Paper

Did you enjoy our first feature: “The New Business Imperative: Social, Mobile, Cloud.” If you missed the screencast, you can catch the replay here.

We have written a new white paper, “The Enterprise Imperatives: Social, Mobile, Cloud” to provide valuable insights as to how Oracle Fusion Middleware provides:

  • An engagement platform for their employees, customers, and partners
  • A mobile computing strategy that enables developers to easily and securely extend enterprise applications to mobile devices
  • Unified BPM that delivers faster time-to-value, reduces complexity and risk, and enables strategic advantage while delivering the tactical results enterprises need today.
  • Open, standards-based middleware technologies that let organizations create, modify, maintain and upgrade to next-generation applications easily.

Download the paper now and to learn more about how your enterprise can embrace social, mobile, cloud technologies and transform into the market leaders of tomorrow.

Engage with Us

Tuesday Feb 12, 2013

Introducing “The New Business Imperative: Social, Mobile, Cloud”

We are very excited to kick off our new social program called, The New Business Imperative: Social, Mobile, Cloud. For the next 5 months, we will discuss the key trends that are impacting businesses today and how Oracle Fusion Middleware is helping to transform enterprises by taking advantage of them. 

Watch our keynote this week, featuring Howard Beader, Senior Director, Product Marketing, Fusion Middleware, to learn:

  • About the impact of social, mobile, cloud technologies to your organization
  • How companies embracing these technologies are transforming their industries
  • How your organization can not only prepare, but embrace these technologies

Engage with Us

Thursday Feb 07, 2013

Ready to Launch!

Author: Howard Beader, Senior Director, Product Marketing, Technology Business Group


One of the coolest parts of my day here at Oracle is being able to watch the various marketing programs launch and run all over the world with you all consuming the content.  This only happens following months of effort designing the program, creating the content and then of course coordinating the various launch and execution activities.  Today’s post as you might imagine is focused on a new type program we are driving called “The New Business Imperative: Social, Mobile, Cloud” and this one is rather different than what you may have seen in the past from us. This program is running only through our social channels, so you won’t get an Evite, email or direct mail asking you to sign up for yet another Oracle Webcast. 

This program is also one that that will run over an almost 5-month period segmented with weekly topics that are highlighted by a video or screencast.  We are making available related additional content and of course there will be lots of social activity and promotions.  All of these videos are short and to the point, no more than 5-8 minutes in length.

So you may now be asking, why are we doing this via social, and not just running a set of webcasts or events or providing content for download from the Oracle website. Well, the answer really lies in the name of the program itself, New Business Imperative Social, Mobile and Cloud. The way we all work, the way we consume content and the way we access enterprise applications has significantly evolved over the past few years.   Think about how often we are now always online, whether it’s via the browser on our laptop or via the smartphone we all have with us at all hours of the day.  People, customers, employees all want to access and consume content the easiest way possible and this is relevant for both consumer and enterprise content.  If you look at some of the newest mobile apps that are making news today, apps like Vine where you can record 6 seconds of video to tell a story are gaining huge momentum and are driving eyeballs to check it out.   It provides a simple way for creative folks to tell a story. I believe that it’s this type of digital marketing that is going to drive significant value moving forward for both awareness and demand generation for organizations.  Now every story can’t be told in 6 seconds, but its the short focused content that is easily accessible and easily consumable that will drive the most viewers and hopefully will translate into the most value for the organization. 

I am hopeful that you all agree with our approach and enjoy the content. I hope the content is educational, relevant and interesting. Feel free to comment and engage with us across our social channels to tell us what you think!    

We will be kicking off the program here on the Fusion Middleware Blog next Tuesday and you can engage with us on Twitter (@OracleMiddle) or Facebook.

Additional Information

Wednesday Oct 31, 2012

Top 10 things I Learned this October

Last week, I attended the second largest IT conference. It was Gartner Symposium IT Expo held in Orlando, Florida. Earlier this month, I also had the opportunity to be part of the largest IT conference earlier in the month – Oracle Open World . Both were gatherings for senior IT professionals – CIOs, Senior IT  and Line of Business executives, and Developers. At both events, I learned a great deal about how companies are innovating and leveraging technology.  Here are my top 10 take-aways:

#10.  Everyone is talking about Social, Mobile and Cloud  - Whether listening to Gartner discuss The Nexus of Forces or listening to Oracle’s Executive Vice President Hasan Rizvi deliver Oracle Fusion Middleware General Session  -- everyone is talking about Social, Mobile Cloud, and Information – Gartner, Oracle, our customers, partners, -- everyone. 

 #9. SOA is NOT dead, it is more important than ever before – it is an imperative! 

#8. The big question around IT security is not “what will you do IF?” but “what will you do WHEN?”

#7. General Colin Powell is an IT guy! Aside from having served as National Security Advisor, Chairman of the Joint Chiefs of Staff and as the U.S. Secretary of State. Gen Colin Powell was an inspirational speaker at the Gartner Symposium and it was clear he understands IT and the powerful impact it has on our society and our youth today.

#6. Change will happen, we need to plan for it!

#5. When everything is connected and just works, we have harnessed the power of technology. Middleware is at the heart of social, mobile and cloud.

#4. Innovation is happening everywhere! Attending both IT events I was able to hear from companies of all sizes and across industries – including Tesco, Nike, Electronic Arts, Nintendo, International Speedway--  they all discussed how they are transforming their companies and their industries.

#3. “One size fits all” strategy does not work instead it alienates IT and business. The PACE Layered Application Strategy is a framework that allows IT to have that Nexus of Forces conversation with the business.

#2. To stay relevant, we need to hire the innovation workers, develop for that innovation layer.

#1. My smartphone is the most valuable tool I own! Everyday with it, I am able to communicate via phone, email, text with family, friends, colleagues. I am able to look up directions to my hotel, make reservations at restaurants, view my calendar, take pictures, record messages, check in for flights and so much more…. I can never leave home without it.

Look forward to catching up again soon!

Additional Information


Get the latest on all things Middleware. Join Oracle's Middleware Community today.

Find Us on facebook Follow us on twitter Catch Us on YouTube 


« November 2015