Feeds

Computer Associates - has the worm turned?

Can CA reinvent itself?

Protecting against web application threats using SSL

Computer Associates (CA) have had a pretty miserable time over the past few years. I guess they felt like the underpaid and overworked airport staff at New York's JFK airport as I came through on a flying visit to catch up on their latest news.

Having lost a chief executive, chief salesperson, chief financial officer, and legal counsel in what has been a well documented contract backdating scandal the $4bn company has had to endure a tough couple of years.

Certainly, the reputation that CA had of being ruthless, out to screw every last penny from oppressive software supply contracts still hangs over to this day in many quarters. Certainly anyone that has been in the industry for a few years will be familiar with customer war stories and many an ex-employee has spilt the beans on how bad the setup was.

I must admit to being a CA virgin. Yes, I had followed the stories and was most amused when someone very close to me had their company acquired by CA a number of years ago and worked there for a total of three weeks before realising how awful the place was.

That aside, I thought I would follow this opportunity up as I was curious as to how a company could reinvent itself and have the balls to invite a bunch of analysts to a briefing-cum-social do to hear about the reinvention that has been going on, no holds barred.

The world according to CA is now EITM - Enterprise IT Management.

"Hmmm", I thought. This stinks of gorgonzola and sounded so 90s I was thrown into a brief reminiscence for the days of 486 processors and Windows for Workgroups.

But, hang on, CA EITM started to sound interesting.

Now CA is one of those companies that have developed or acquired a large number of products across a range of technologies. Some of these have been cash cows, others have been old dogs that were probably still on the price list as they generated some annuity income.

EITM is the strategy, announced at CA World in November 2005, designed to pull all of these disparate technologies together under a single umbrella, using web services, SOA (Services Oriented Architecture) and XML interfaces to glue them.

No problem here, I thought. The architecture is spot on and credit to the CA team for getting to grips with web services and SOA. Still, they would have been monumentally dumb for doing anything else.

IT has gone through a huge change in the past 10 or so years. Now we are seeing IT transition from being a cost heavy support role into something that may actually be useful for a business. Some, including CA, would even suggest that IT could be a "business driver". Whether that is true is open to debate and very much depends on the organisation you are talking about. I would suggest that most businesses see IT as a necessary evil and until suppliers provide robust and manageable products that work as reliably as they should many business people will remain sceptical.

And this neatly reintroduces what CA believe EITM is all about - bringing together horribly isolated solution silos along the lines of govern, manage and secure.

This strategy strongly supports the old military adage of attack being the best form of defence. Instead of sitting back and letting HP and IBM take their customer base CA have come out fighting and appear to be reinvigorated.

I am really up for giving CA a break and seeing if they can deliver EITM as the industry needs to show that it has finally grown up.

Copyright © 2007, IT-Analysis.com

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.