Thursday, November 3, 2016

HAL from 2001: A Space Odyssey is real and his name is Watson!

HAL from 2001: A Space Odyssey is real and his name is Watson!

IBM’s Watson is creating the cognitive enterprise

Matching the value of technology to bring real business value has always been a focus here at iSOA Group. And, what we learned at Worldof Watson Conference at the end October that we no longer have to use imagined images of movie-inspired AI to envision the new cognitive era – these new opportunities are already a reality!

This new era of technology, as discussed by Ginny Rometty, CEO of IBM, during her keynote address on Wednesday of the conference, is transforming industries and our present view of technology.

IBM's Watson has gone from a winning contestant on Jeopardy, to taking its "genius" on the road to learn about the world of service, and that can now:

1) Combine weather data and knowledge of the wear and tear on machinery (such as utility poles) to accurately recommend when to replace them before failure.
2) Read and understand 200 million pages of regulations in minutes to assess and assure your company’s compliance.
3) Help a musician understand a variety of musical genres according to listener preference in order to help guide him in writing a top 10 hit.
4) Continually observe and learn about our world without loss of memory, all the while becoming smarter and providing better guidance to humans.
5) Learn vs being programmed.
6) Help patients predict the occurrence of an asthma attack so that they can take preventative measures.

And it isn't just IBM; Cisco and IBM are teaming up to create smarter meetings. Think about it - Watson helps you schedule your next offer management meeting.  During scheduling, Watson observes you have included “Joe” as a required attendee, but Joe is a procrastinator and never responds to scheduling invitations until the last minute. Seeing this, Watson recommends making Joe optional and suggests the most convenient time.  Or, as the Cisco presenter suggested, what if Watson attends each meeting, listens, learns, and dare I say, remembers the discussion so that we’re assured progress and key milestones are achieved.

This “Augmented Intelligence” system is smart and getting smarter (hopefully not in the direction of  HAL) – but what are YOU doing to take advantage of it?  Are you looking at an API strategy that not only includes your services and external applications, but incorporates new capabilities from Watson and other services to assure your company is leading in innovation? 

Let's get smarter together!

Tuesday, June 7, 2016

What is next after Mobile? Smarter cars? Voice Assistants?

Brian Silverman
Senior Solution Consultant

As the USA Today article,   “Smartphones may loosen their grip over family life as voice devices rise” , highlights, there are new technologies that are hot on the heels of smart phones. 

It will be 9 years ago on June 29th that the first iPhone was released.  The smart phone, with its apps and ability to center itself in your hand provided useful information and interaction beyond the basics of phone calls and text messages, and thus changed the world.   Now, there is an app for everything.  An app for tracking your heartbeat, your lost pet, or predicting the weather down to the minute.  There are apps to find the closest restaurant or the nearest dog-friendly hotel. 

Just as the PDA’s (Personal digital assistants) were the invention of their time - remember Palm Pilots? – so have smart phones provided the connections that consumers swear by and are unable to live without. But, do we really have the crystal ball prediction ability to determine what will follow?  Will the next “interface” of choice be speaking to your car, Google Home, or Amazon’s Alexa?  Or will it be a completely new device? All require a well thought out approach to digital innovation in the future.

The good news is that it doesn’t take a psychic for IT professionals and companies to prepare for the next innovation. 

At iSOA Group, we know there are going to be some consistent requirements for the future devices and interfaces to work, including:

1) A consistent approach to communication and the ability to share key information. Whether this data populates to a web page, is a pop up on a smart phone, or is spoken to you through a speaker in your car, having a consistent interface for consumers to connect and communicate with their devices will be a necessity.

2) Integration with your systems of record, , as IBM calls your “business systems”. Turn information into business with your customer.  These new devices and interfaces all need access to common consistent information and consistent methods of interface to execute a business transaction, such as a hotel reservation.

3) A single place for developers, inside and outside your company, to access application information. The how, what and where will need to be leveraged for application information and documentation in order for developers and providers of services to assure success and innovation.

Along with IBM, iSOA knows that API’s (Application Program Interfaces) and a strong consistent framework will support innovation,; to be prepared for any or all opportunities that will provide growth into these new digital opportunities.

Want to know more? The IBM Solution, and iSOA Group, Inc. are leading companies in development of API Frameworks and approaches for digital innovation.

Join me, Brian Silverman, iSOA Group, Inc. Senior Solution Consultant, along with Bill Barrus from IBM, for a webinar on June 16th at 11AM PDT / 2PM EDT.

“Digital Innovation with API’s and IBM’s API Connect” and see a demonstration of the IBM software.  

Friday, May 20, 2016

Stephen Mori  iSOA Security Adviser

Since this is my first post to the ISOA Group blog, a few words of introduction are in order.  First of all, thanks to Bryon and Cheryl for inviting me to join iSOA Group as their new Security Adviser; I will be helping to articulate the development of iSOA Group’s security practice. 

My brief and abbreviated history spans forty years in various technology roles:  systems analyst, coder/developer, software designer, consultant, systems architect and security engineering and management culminating in the role as Autodesk’s first CISO (retired 2012).  Since my retirement I have continued with a few judiciously selected consulting gigs.  Retirement hasn’t allowed me much time for gainful employment.

I look forward to being a regular contributor to this blog; exploring what are hopefully topical issues across security, privacy and trust.  A particular interest of mine is cyber-trust.  There I’ve used “cyber”, now I’ll actively seek to avoid over-using it since others are handling that.  No small part of that interest is how we, as security professionals, bring the same sort of innovation to defending our company and critical assets as the bad guys bring to uncovering new ways of threatening us and our vital information assets.

But, first a look back to set the stage for future entries.  It is 1970 and Willis Ware, early computer scientist and security pioneer, delivers a commissioned report to the Advanced Research Projects Agency - predecessor to DARPA.  Known as the “Ware Report”, officially titled “Security Controls for Computer Systems: Report of the Defense Science Board Task Force on Computer Security”, the report was only recently declassified by the DOD.  Why spend time looking at a 46 year old resource?  Simply because it remains a resource and it helps me make my point about the need for innovation, while respecting history.

The report charter was to deal with the risks associated with the rapid growth of “multi-access, resource sharing computer systems”.  Rapid being relative, the authors could not have envisioned today’s democratized Internet, hyper-connected world of social media, computers in the form of watches, tablets, smartphones, let alone IoT enabled appliances; and, of course, virtual servers, Amazon Web Services (AWS), Docker, et al.  That charter remains valid in a world where factors are more connected - many factors faster than real-world 1970.

“Providing satisfactory security controls in a computer system is in itself a system design problem.”  Did Mr. Ware anticipate Agile development methodology, DevOps, and proliferating App Stores?

“A combination of hardware, software, communication, physical, personnel and administrative-procedural safeguards is required for comprehensive security.” Defense-in-Depth, anyone? Implied in the statement are IDS/IPS, Next Gen firewalls, vulnerability management software, SIEM, multi-factor authentication, security awareness, policy and technical controls.

What of Advanced Persistent Threats, intentional and accidental internal threat actors, and (Distributed) Denial of Services?  Systems ought to be “...acceptably resistant to external attack, accidental disclosures, internal subversion and denial of use to legitimate users.” Effectively, this covers anything connected to the Internet with open access to the Web, e-mail, text.

Finally, the report outlined what arguably remains the most common system vulnerabilities:  accidental destruction of data by a system failure, user or administrative error, active attacks that exploit weaknesses in user credentials, or deliberate or accidental flaws in software, “unauthorized entry points...created by a system programmer who wishes to provide a means for bypassing internal security controls...”.  All of which evoke directory attacks, credentials/identity theft, and back doors.

The “Ware Report” pretty much covers the CISO’s world.

So that is my bit of context setting.  Future entries will hearken back to these legacy security issues, but with an updated perspective and current terminology.  My first thought upon reading summaries of the “Ware Report” is the greatest progress we’ve made has been in creating new acronyms.  We need to endeavor to get just as good at developing innovative responses to these classic and evolving threats as we are at simplifying technical jargon.

Monday, April 11, 2016

View from 40,000 Feet: Security is more than just passwords, and locked doors!

Bryon Kataoka, iSOA Group, Inc. CTO and Thought Leader

Security is more than just locking doors and barring the windows, and there is no magic piece of software that will assure IT security.

Companies need to be vigilantly concerned about how they manage security of their most trusted assets, their customers, their intellectual property, their partners and the privacy and well being of their employees.

iSOA Group, Inc. is an officially authorized IBM Security Solutions Partner.  iSOA has always focused on security, as it pertains the edge of the network, XML and Application Firewall, and integration with companies authentication solutions and directories.  Today we are expanding our security focus beyond the edge fo the network including recent certifications in QRadar, IBM's SIEM (Security information and event management) solution.

As I direct my team, as we expand our security focus, we need to keep focused on key challenges:

1) Keeping up with the latest threats and vulnerabilities.  With new threats coming along every day, such as the rise of Ransomware, we as advisors need to be on top of the latest challenges.  There are resources of information, such as IBM's Xforce Report, and most importantly to keep listening to our customers to assure we stay aware and also understand the risk to reward trade offs when making security decisions.

2) The fundamentals of security have not changed.  Protecting access to information, keeping systems up to date, access and authentication, as well as deploying and maintaining anti-virus and network protection solutions continue to be at the core of keeping companies protected.  Many thieves focus on known vulnerabilities of systems that have not been kept up to date, allowing the malicious hacker to access these systems with a known nefarious path to entry.  A study by CSIS stated75% of attacks use publicly known vulnerabilities in commercial software that could be prevented by regular patching” showing that one of the first steps to being secure is to assure these fundamentals are implemented successfully.

3) We need to perpetually remind our clients that security is a domain that spans IT as well as physical security.  If we have locked down systems, but people can easily enter and exit the building and possibly data center, our clients are still exposed and have a challenge.  Most threats come from inside, and actually they will take the easiest route to take valued information.  As an example, to be PCI (Payment Card Industry Card Production Standard) Compliant, they have both "IT" requirements as well as physical security requirements for companies to be compliant.

As I mentioned at the beginning of the year, we will use the process of design thinking to help prioritize our focus and help guide our priorities and how we best approach working with customers.  We will continue to use this approach with our customers across our solutions for Integration, API Management, and now Security.

If you would like to know more about the iSOA approach or how we can be of assistance please reach out to me or my Solution Consultant Brian Silverman or our Customer Service leader Cheryl Bertini at

Wednesday, March 9, 2016

A View from 40,000 feet: IBM Interconnect 2016 Interesting Turn of Events!

Bryon Kataoka, iSOA Group, Inc. CTO and Though Leader

This year’s IBM InterConnect conference was full of interesting turns of events!  Although I was not a scheduled presenter and ended the conference with what seems to be the “Vegas” flu, there was much to learn and exceptional energy at the conference!

IBM continued its focus on Hybrid Cloud leveraging IBM’s Cloud capabilities, along with key offerings for security, integration and more.  The focus on Hybrid Cloud complemented my presentation at Interconnect in 2015.  I presented with a customer on developing a Hybrid Cloud integration framework, that provides secure integration between cloud based applications and key on-prem solutions.  This was also our focus this year at our Integration Roundtable breakfast.

As far as new announcements, what stood out to me was the new IBM APIM version 5, now called “IBM API Connect”, as well as some of the complementary capabilities announced with IBM’s DataPower 7.5.  IBM is listening to its partners and customers and subsequently delivering on a completely integrated API Management offering that incorporates Strongloop, which IBM acquired in 2015, creating an industry leading API Management solution for the development, management and security of developing and consuming API’s.

I was also impressed with where IBM is going with security.  IBM’s Security portfolio, including QRadar and its XForce security threat intelligence, shows IBM’s strong commitment to security. It was also beneficial to see IBM return to known product names, such as BigFix, as IBM removes the obfuscation that occurred when they originally purchased the product.  Lesson learned, don’t mess with a well known brand name!  

I was so amazed with IBM’s Security direction, that I have directed my team to expand our security focus in 2016 to incorporate some of these key IBM offerings. With these new editions to our portfolio, we can assure our customers that we can deliver the integrated security required into today’s digital age.

Although my week was terminated early by contracting the flu (and darn! I missed out on the Elton John concert), I was still able to present at the DataPower Customer Forum, standing in for a client, and thus making 2016 the 9th year that I have presented at IBM’s conference.

Friday, March 4, 2016

Taming Las Vegas: iSOA's IBM InterConnect 2016 Recap

2016 brought another exciting week at IBM’s Interconnect Conference.  If you were not able to join, let us share what we observed while attending the event of over 20,000 people that spanned across the MGM Hotel and the Mandalay Bay.  

The energy across the conference definitely seemed more electric and connected than in 2015.  There were multiple keynotes and the conference was a great opportunity to see the future of IBM, as well as hear what our customers, partners and IBM colleagues had to share.

Hybrid Cloud leadership was IBM’s mantra from day one and this set the tone for the conference.  IBM announced its BM Cloud and VMWare partnership, as well as expanding its support for Apple’s Swift programming language.   Apple’s VP of Product Marketing, Brian Croll, proclaimed that IBM was already the largest developer of Swift applications and their natural partnership would help move and extend the Swift language to servers everywhere.

Always eager to connect with our clients and colleagues, the iSOA Team hosted our annual Integration Round-table breakfast, with our own focus on Hybrid Cloud Integration.  We were joined by our good friends from IBM, Jeff Sinason, Certified Architect and Rich Kinard, Worldwide DataPower Sales leader and author! Discussions revolved around how our customers are looking at the cloud, as well as the challenges of integration. 

iSOA Group, Inc. continued our passion for taming IT Anarchy, as shown on our Sons of Anarchy themed iSOA t-shirts.  

For more information please contact Brian at or Chery at .

Monday, February 8, 2016

iSOA Group, is Controlling IT Anarchy once Again in Las Vegas at IBM's Interconnect 2016 February 21 - 25th

Join Bryon, Cheryl, Peter and Brian as we once again tame the Anarchy of IT in Las Vegas!  (IBM Interconnect 2016)

Announcing iSOA OnDemand Services:  Your iSOA Expert on Call to help you gain the most value from your IBM Software (e.g. DataPower, Integration Broker, WebSphere and MQ).  Helping you with best practices, new features, and helping to solve your challenges with your unique environment.  (please refer to the onsite Interconnect program guide and see our ad on the inside cover)

"Get Fit" With our iSOA IBM Middleware Survey and Drawing for a Fit Bit Blaze Watch: We know you may be faced with certain challenges relating to your particular IBM Middleware solution.   Our Research department is conducting a survey to better understand these challenges, and by completing this quick survey, and you will be entered for a chance to win one of 3 FitBit Blaze watches!

Hybrid Cloud Integration Round Table Breakfast (7am Tuesday February, 23rd):  Join our CTO, Bryon Kataoka and IBM Technical leaders to discuss best practices to developing a Hybrid Cloud Integration framework for your enterprise, leveraging IBM technologies such as DataPower, Cast Iron, and MQ Series.  The iSOA Approach creates a secure and flexible framework that integrates all of an enterprises applications (on premise and cloud) to be more responsive to the needs of your business.  

Education, Networking, and a little socializing:  Find the iSOA team in our T Shirts and hats, and join us in helping to tame the IT Anarchy in Las Vegas and you could win your very own Tame the IT Anarchy tshirt or hat!

Want to know more?, follow us on Facebook and Twitter, or reach out to Brian  and Cheryl at

Tuesday, February 2, 2016

A View from 40,000 feet and Las Vegas Bound for IBM's Interconnect 2016 Conference

Author: Bryon Kataoka, iSOA Group CTO and Thought Leader

Well it’s that time again.  Time to go to InterConnect 2016 and network with clients, peers and reconnect with some old friends.  It is also a great opportunity to understand the trends, direction and opportunities we are all facing with technology in the New Year.

This year, security is at the top of my mind, and I’m really excited about IBM Security, including offerings such as QRadar to Maas360 to Big Fix to Guardium. You will probably find me at any session that is showcasing these products.    I’m also very interested in StrongLoop and what IBM has planned for its marriage with IBM APIM.  I’m looking forward to announcements in that arena.  There are usually great labs at Interconnect so I hope to attend a few if our schedule permits.

This year I will not be speaking, which is a rarity! I am looking forward to being an attendee and absorbing a lot of new information.  I’m sure there will be many dining opportunities and meetings with clients, but I do plan on using this time wisely and attending what I think will be the important sessions.  I may even schedule a certification test or two.   Nothing like filling your week up to the max!

Once I have my schedule of sessions chosen I’ll post again to let you know what are my recommended sessions.  My team will be tweeting as we progress through the week, so  follow the iSOA Team, to learn where we are at and my thoughts on key takeaways.

What are your hot topics this year?  Any sessions you would recommend to your CTO at 40000 feet?   I and my team hope to see you at Interconnect and have a great 2016!

Bryon Kataoka is the iSOA Group, Inc. CTO sharing his experience as a technical leader for over  20 years.  In his role at iSOA Group, Inc. he is a thought leader as well as a consultant to many companies helping them be successful with their Middleware strategy and implementations.

Monday, January 11, 2016

The View from 40,000 feet

Author: Bryon Kataoka, iSOA Group CTO and Thought Leader

Happy New Year!  Its 2016 and I’m already traveling across the country to be a thought leader to our various customers. I have a few resolutions, or action plans, I’d like to focus on this year, but first a few thoughts for 2016, before I get into the resolutions……..

For 2016, I have a feeling that this is going to be a fantastic year for Enterprise Innovation!  With the increase in hiring in 2015 I believe we will start to see new products and innovations.  I also believe cyber security continues to be a battle we must continue to wage war on. With so many events happening around the world we cannot be complacent and stick our head in the sand.  So hang on to your hats, it is going to be a wild ride!

As a thought leader I’m always trying to find better ways of conveying information and providing solutions to my clients.  My first resolution is to try to find ways of making that easier for my customers.  My second and last resolution is to find processes and tools that make my first resolution easier.

So here is what I’m going to start with; the first thing that I’m going to incorporate in my lifestyle (both personal and professional) is “Design Thinking”.  For those of you unfamiliar with Design Thinking, it has helped entrepreneurs and engineers develop and create successful new products and businesses.  What Design Thinking does is help identify the obstacles that are holding you back from achieving your goals.

There are five steps in Design Thinking, the first two being the most important.  First is to “empathize”, that is, understand what the real issues are that you need to solve and the second is to “define the problem”.  Steps 3, 4 an 5 follow a path of brainstorming ideas and possible solutions, prototyping or design a plan and finally test the idea and garner feedback from others.

Design Thinking has been around for some time.  It is taught at Stanford University in the heart of Silicon Valley, which is a veritable think tank for creative ideas.  To find out more, check out this 90 minute crash course on Design Thinking:

For my second resolution I’m going to dovetail with “Design Thinking” and look to implement a tool that would help me with Step 3 of “Design Thinking”.   As I am always looking for ways to keep my brain sharp, I am planning to use “Mind Mapping” tools to help me brainstorm ideas and provide a better way to convey the information.

In the future I’ll follow up on how we are incorporating Design Thinking at iSOA Group and how you might also use Design Thinking in your daily lives.

So there you have it, my resolutions for 2016.

I wish you all a successful 2016, and I hope to see you at the IBM InterConnect Conference 2016 in February.

Bryon Kataoka is the iSOA Group, Inc. CTO sharing his experience as a technical leader for over  20 years.  In his role at iSOA Group, Inc. he is a thought leader as well as a consultant to many companies helping them be successful with their Middleware strategy and implementations.