Social media has given consumers a voice, and brands are extremely concerned about how detrimental a bad review can be once it is posted online. But while this has taken the spotlight and has become an important, top-of-mind issue on marketing teams, it’s vital not to ignore the simple word-of-mouth review. Our Technographics® research shows that almost half of all consumers have complained directly to a family member or friend versus the mere 3% who have posted on a web site like Yelp/Trip advisor, or the 1% who have tweeted their complaints.
Listening software has made it easy for organizations to understand the latitude of negative feelings about their companies and brands and has given them some tools to directly address a complaint online by responding to an individual. It is nearly impossible to harness the conversations going on offline among groups of friends, although the numbers show that the effects of these talks are more widespread than the ones online — especially when you take into account that research shows that consumers trust friends and family most when making decisions.
Here we are again. As we approach Labor Day, less than three weeks after IBM announced its agreement to acquire Unica (see my blog post with Suresh Vittal here), comScore announced yesterday that it has acquired the venerable European Web analytics vendor Nedstat.
Total cash and stock consideration for the purchase is valued at approximately $36.7 million USD. Additionally, nearly the entire Nedstat staff, numbering about 120, will stay on at comScore.
Official information is available through comScore, the comScore corporate blog, and the regulatory filing for those of you who are financially minded. I also had the opportunity to speak with comScore CEO and co-founder Magid Abraham, who generously took time out of a very hectic day for a call.
The acquisition is predicated on the following benefits:
Geographic expansion. Nedstat provides an established European presence from which to serve current and prospective comScore clients in the region.
Product enhancement. comScore will enhance its Unified Digital Measurement (UDM) platform with Nedstat technology.
Deeper client relationships. The opportunity to upsell comScore’s existing client base with new and expanded product offerings.
Today at the Mobile Marketing Forum in Sao Paolo, the MMA announced a repositioning to increase its "effectiveness at the global, regional and national levels, and to create additional membership benefits." The association is shifting its focus from helping to build mobile marketing as an emerging discipline, to 5 tenets they've identified as the building blocks of the now-established industry. The press release describes these building blocks in this way:
My work at Forrester is focused on helping strategists at IT suppliers (vendors) align their development, positioning, and messaging with the big trends and disruptions in the industry. Mobility, cloud computing, globalization … trends at that high altitude. Over the last 3 years or so, that has included sustainability as it has appeared on and risen higher on the strategy agenda of companies around the world.
When I meet with strategists at tech suppliers large and small, we talk sustainability both in terms of how the companies are cleaning up their own practices and processes, and what they are doing to help their customers do the same. SAP’s “exemplar and enabler” language captures these parallel efforts nicely. But it’s still a limited perspective, one that I characterize as the IT industry playing defense. “We are improving our energy efficiency!” says the collective industry voice, as if trying to deflect public criticism of energy-hog data centers, or mountains of e-waste, or PCs left running 7 x 24. And yes, absolutely, the IT industry and its customers have more work to do to make IT infrastructure and processes less wasteful and more responsible.
Despite its networking roots, today’s Interop events have evolved to address an expansive range of IT roles, responsibilities and topics. While networking managers will still feel at home in the networking track, Interop addresses a variety of themes very relevant to the broader interests of IT Infrastructure & Operations (I&O) professionals, like cloud computing, virtualization, storage, wireless and mobility, and IT management.
IT professionals responsible for the “I” (or Infrastructure) in I&O will find the event particularly relevant. So much so that Forrester has partnered with Interop to develop track agendas, identify speakers, moderate panels, and even present. For the last two years, I have chaired the Data Center and Green IT tracks at Interop’s Las Vegas and New York events. And I am doing the same this year at Interop New York 2010 from October 18th to 22nd.
Last week, I attended the ONS (Offshore North Sea) 2010 conference, one of the world’s largest energy conferences, with more than 49,000 participants, in Stavanger, Norway. The conference theme was “energy for more people,” an important goal, not only to keep pace with the growth of the world’s population (expected to hit 9-plus billion people by 2050) but to fight poverty and increase living standards around the globe. However, soon after the opening ceremony by King Harald V, it became very clear from the first panel discussion that the path forward to achieve this goal has many facets and that the leaders of the world, including politicians, academics, business people, and other authorities, are far from reaching consensus on the right path today.
Conventional Energy Resources
Global energy demand will increase by ~45% within the next 20 years (according to the International Energy Agency), but what will the distribution of energy resources look like by 2030? Most scenarios predict that fossil fuels will continue to be the primary energy source, with oil and gas making up 65% of the total demand. To no one’s surprise, most of the presentations and exhibitions at ONS 2010 were therefore dedicated to the future of fossil fuels that can be combined into the following themes to satisfy the energy demand of tomorrow:
Unlocking new oil and gas reserves in the world. The concept seems to be straightforward: Overcome technical and political hurdles and drill deeper, faster, and more efficiently to carry exploration into new territories such as the Arctic or ultra-deep sea.
I get many questions from clients interested in evaluating different in-memory technologies. My first advice is not to mix apples and oranges and clearly understand the differences between in-memory indexes, in-memory OLAP, in-memory ROLAP, in-memory spreadsheets, and other approaches. See more details in my recent blog entry "I forget: what's in-memory?" to understand the differences. Then once you zero in on a particular segment, you can indeed do an apples-to-apples comparison. Let's say we pick the category of in-memory associative indexes, which would include Microsoft PowerPivot, QlikTech, and TIBCO Spotfire. We also sometimes run across Advizor Solutions, but typically in smaller clients (and we do not include them in The Forrester Wave™ process). I recommend a three-step approach to compare these four tools:
First, compare all of the commodity features of the vendors and tools like data integration and portal integration, operational features like administration, security, and others. You can leverage the detailed evaluation behind our slightly outdated 2008 BI Forrester Wave, if you are in a hurry, or you can wait for another month or so and the 2010 update will be published (it's in the last stages of editing at this point). Or if you are a Forrester IT client — not a vendor — client, send me a note and I'll share a draft preview with you.
How Authentication-as-a-Service becomes a part of leading IAM stacks and why virtualization is no longer a viable technology without identity and access management.
CA’s acquisition of Arcot signals that partnering with an adaptive authentication vendor is no longer enough to offer a comprehensive access management strategy: you’d also have to have an adaptive authentication product to allow your customers to retire costly physical tokens. But this is not the primary reason CA picked up Arcot. It is Arcot’s thriving hosted authentication and fraud management services that were the most lucrative assets to CA. Adaptive authentication is part of any organization’s fraud management strategy — however, CA’s inexperience here leaves a few questions to be answered. Will CA keep and grow Arcot’s fraud prevention service? If so, how will it integrate fraud management with IAM? The requirement for integration is clearly highlighted by Forrester’s conversations with its FinServ and other verticals’ customers.
I recently had an opportunity to spend a day in three separate meetings with infrastructure & operations professionals from three of the top six financial service firms in the country, and discuss topics ranging from long-term business and infrastructure strategy to specific likes and dislikes regarding their Tier-1 vendors and their challengers. The day’s meetings were neither classic consulting nor classic briefings, but rather a free-form discussion, guided only loosely by an agenda and, despite possible Federal regulations to the contrary, completely devoid of PowerPoint presentations. As in the past, these in-depth meetings provided a wealth of food for thought, interesting and sometimes contradictory indicators from the three groups. There was a lot of material to ponder, but I’ll try and summarize some of the high-level takeaways in this post.
Servers and Vendors
These companies between them own in the neighborhood of 180,000 servers, and probably purchase 30,000 - 50,000 servers per year in various cycles of procurements. In short, these are heavyweight users. One thing that struck me in the course of the conversations was the Machiavellian view of their Tier-1 server vendors. Viewed as key partners, at the same time the majority of this group of users devoted a substantial amount of time to keeping their key vendors at arm’s length through aggressive vendor management techniques like deliberate splitting of procurements between competitors. They understand their suppliers' margins and cost structures well, and are committed to driving hardware supplier margins to “as close to zero as we can,” in the words of one participant.
The new book Empowered highlights the benefits of empowering HEROes (highly empowered and resourceful operatives) within the workforce. As we approach our first-ever CIO Forum in October, I’m looking around for great examples of how governments are using social technologies to empower employees to serve empowered citizens.
When I think of government IT projects, I often think of multimillion-dollar projects lasting years before going live. But it doesn’t always have to be that way, as the following example illustrates.
Peter Koht is a HERO working for the City of Santa Cruz Redevelopment Office. In 2009, the city was facing its worst budget crisis (a problem familiar to many city officials). Running out of options, the city had already shut down civic services such as the community pool, museums, and a family resource center when it faced up to the reality that the people of the city needed to be involved in the decisions about what services to cut. Unfortunately, the voices too often heard at civic meetings were representatives of the extreme viewpoints at either end of the political spectrum. In an effort to collect more ideas from the silent majority, Peter suggested the city could tap into social media to connect with its citizens. Lacking any kind of budget or resources, Peter had to rely on the help of three volunteers to get a community site up and running in a week.