Welcome!

Containers Expo Blog Authors: Stefan Dietrich, VictorOps Blog, Pat Romanski, Amit Golander, Reinhard Brandstädter

Related Topics: SDN Journal, Java IoT, Linux Containers, Containers Expo Blog, Agile Computing, Cloud Security

SDN Journal: Blog Feed Post

Networking Strategy: Innovation and Adoption

Networking is a capabilities-driven industry

When we think about what’s next, our frame of reference is almost universally anchored to what we are doing now. We look at how things are, and then we aim our sights forward. In some cases, we might make incremental moves ahead; in other cases, maybe we look for improvement by orders of magnitude. But regardless of how far forward we reach, our starting point is where we are grounded today.

This creates an interesting dilemma in technology generally, and in networking especially.

Capabilities-driven
Networking is a capabilities-driven industry. We are constantly expanding what we can do with networks. In some cases, it might be how we handle complex policy, in others how we solve interesting traffic challenges. Whatever the problem, we have thus far been able to come up with some way to address it.

Some might read this and think: it’s not all capabilities! While it is true that the networking industry has spawned a number of efforts over the years aimed more at usability than capability, the inability to make a large business out of network management is a running joke. In fact, when we think of companies that have been very successful in creating useful products in the usability space, we probably think of companies that are a lot smaller than their tech justifies (Tail-f comes screaming to mind personally, but there are others).

So networking really is dominated by efforts around new capabilities.

But who invents these new capabilities?
Invention falls on the backs of the vendors. This is an obvious point. But what is the frame of reference from which the vendors build?

We all build from our current starting point. So as we evolve networking, we evolve it forward from our current base set of capabilities. There is nothing new in that statement, but consider this: what happens when an inventor’s ability to churn out new things outpaces a consumer’s ability to adopt it?

This is actually a dangerous state to be in. Useful innovation requires iteration. You need to come up with new ideas, prototype them, test them, collect feedback and iterate. But when new capabilities outpace the bulk of the market, two things happen: first, the capabilities go unused for the majority of consumers, and second, the lack of use inhibits the natural iterative process.

VMWare as an example
Let’s apply this to some specific industry examples. In using these examples, I don’t mean to judge the efficacy of any particular solution. Instead, I want to point out the strategic implications of this dynamic.

VMWare very famously pushed into the networking arena through the acquisition of Nicira a couple of years ago. With the acquisition and subsequent product launches, they effectively created the network virtualization space. They have built and shipped a product (NSX) that is the leader in this technology.

If you watch the technical dialogue around NSX, they have been building around their NSX beachhead. They talk about distributed firewalls now, and it won’t be long before they expand beyond that. They are clearly inventing quite rapidly, building lots of functionality that has the potential to be extremely useful.

Adoption, not innovation
But the issue that VMWare faces is certainly not related to their ability to innovate. Their primary struggle has to be with adoption.

When you create new categories of products, you sometimes address problems that people do not know they have. You build solutions that are beyond what a user’s current capabilities are, so the path from here to there is non-obvious.

Put slightly differently, while the frame of reference from which a vendor innovates is their product, the frame of reference from which a user grows is their deployment. In the same way that networking vendors naturally move forward incrementally, users will tend to make incremental architectural changes.

This means that product strategy has to include more than capabilities. It has to include migration as well. Migration is not just another way of calling out an insertion strategy. It really means that you have to strategize explicitly about how customers move from A to B. This means understanding what they perceive the transition to look like. What is their foundation? How does a shift impact things like training and process? How does a change intersect budgeting decisions? Do expanding capabilities muddy the approval chain as you bridge functional teams?

Understanding this, you can start to shape a strategy that extends beyond the product. Using the VMWare example again, the problems they are solving are tied to companies’ inability to manage their networks today. But they have built a dependence on the presence of a functional underlying network. If the underlying network is functional, then the problem they are addressing is less acute. But if the problem exists, then the architectural foundation is poorly suited for an easy transition.

In the latter case, the go-to-market strategy needs to consider the state of the foundation. It might make sense, for example, to then partner with vendors who make the underlying issues easier. Or perhaps you target accounts where there has been recent turnover at the CIO or VP of Infrastructure level, because that might indicate a change in architectural posture. If a company is already solving the foundational problems, you could potentially draft off that effort and solve the second problem of policy management for only incrementally more cost and effort.

Final thought
Whatever the path, the strategy has to reconcile that the vendor and user frames of reference are different. Adding even more innovation feels like the right thing to do (always be moving forward!), but does it widen the gap between vendor and customer to the point that transition is impossible?

Let me be clear here – I don’t actually think that NSX is necessarily at that state. I am really just trying to land the point that innovation ahead of adoption needs to be an explicit strategic discussion because it impacts how you eventually bring products to market. Again, the point is not about NSX but more about strategic consideration of the point from which users are building. If you think about innovation from a user’s perspective, you might alter your own strategies in perhaps unexpected ways.

As a final thought, as the industry continues down the SDN path, how should companies and open source organizations shape their offerings to ease adoption.

[Today’s fun fact: A hummingbird weighs less than a penny. I used to think I was like a hummingbird, but this ruins the comparison.]

The post Networking strategy: innovation and adoption appeared first on Plexxi.

More Stories By Michael Bushong

The best marketing efforts leverage deep technology understanding with a highly-approachable means of communicating. Plexxi's Vice President of Marketing Michael Bushong has acquired these skills having spent 12 years at Juniper Networks where he led product management, product strategy and product marketing organizations for Juniper's flagship operating system, Junos. Michael spent the last several years at Juniper leading their SDN efforts across both service provider and enterprise markets. Prior to Juniper, Michael spent time at database supplier Sybase, and ASIC design tool companies Synopsis and Magma Design Automation. Michael's undergraduate work at the University of California Berkeley in advanced fluid mechanics and heat transfer lend new meaning to the marketing phrase "This isn't rocket science."

@ThingsExpo Stories
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.