On June 17, Forrester published my latest research on
how business buyers use social networking sites to inform purchase
decisions, the role these sites will play in future buying processes,
and three key ways for B2B marketers to tap into open, social network
Two key insights coming from this research:
discussion forums and online communities are poised to become the
online supplement for colleague interaction and the decision to join in
community activity depends mostly on the quality of the participants —
the discussion relevance, demonstrated experience, and shared
My BlackBerry battery died more quickly than usual yesterday as I received a wave of calls from reporterswondering about the denial of service (DoS) attacks against Facebook, Twitter, and other social networking sites. It seems many people are not aware of the long and storied history of denial of service attacks and this is their first personal experience with DoS. These types of DoS attacks have been around since the creation of the public Internet. A 15 year old named Mafiaboy famously brought down many of the top Websites of the day at the beginning of this millennium using similar techniques.
An early 2009 Forrester interview with the CIO of a retail firm produced a great quote: “Our business execs have two views of IT: a big budget blob or their BlackBerry.” Now, maybe those retail business execs think of IT as a strategic budget blob, but it’s more likely that’s a shop with alignment issues. If that CIO’s business execs don’t see technology as enabling anything more than mobile email, then they really don’t get the power of technology and they’re not going to see the value in the IT department.
But alignment issues are not limited to shops where business execs don’t see value in technology. The whole IT-to-BT transition is about how the business is enthusiastically embracing technology – they’re just not bothering to go through the IT department to find it, deploy it, or use it. Today’s alignment problem is more about the gap between the business’s valuation of technology’s potential and their valuation of the IT department’s ability to deliver on that potential.
The New York Times has put together a very interesting interactive graphic that shows how recessions behaved in the past, and what this means for the future. Please note that the picture below is a static image.
Saw this article today in moco ranking mobile ad networks in the US. They published these numbers, but don't stand behind them - at least entirely. I'm interested in digging a bit deeper into the UV calculation.
Millennial Media: 45.6 million
AOL/Platform-A's Third Screen Media: 28.6 million
AdMob: 25.7 million
Microsoft's MSN Ad Network: 25.4 million
Jumptap: 23.4 million
Quattro Wireless: 23 million
Yahoo! isn't mentioned. Google is not there - guess this doesn't include Search, but these online giants are popular at least with the consumers we survey. Oh, and no application networks or SMS. The article does back up Millennial's claim to reach. They'd have to be reaching just about every person who browses the mobile web in a given month - even those with one page view - to hit this published number. Aside from the rankings, good to see all of the networks doing so well. These numbers have been growing steadily over the past couple of years. With smartphones selling so well, usage of data services is growing. Forrester's data shows relatively few daily browsers outside of smartphone owners. Most of these ad networks show similar usage patterns. All of this traffic together Choosing ad networks isn't a topic I've researched yet. We do advocate though that brands find their customers, understand their mobile behaviors, and build a strategy from there. With the momentum in consumer adoption of mobile data services, it will soon be hard for any consumer or business-oriented brand to avoid the medium as a channel to engage with consumers for much longer.
Recently, I was on a call where a senior executive wondered whether or not kids entering the workforce in the next 5 years can write complete sentences now that everyone texts. For me, this is another example in an old story: fear (and some loathing) of Gen Y’s entrance into the workplace. And frankly, as a 20-something, I think a lot of it is unfounded.
At no time is this fear more clear than when the conversation turns to approaches and technologies related to collaboration and Web 2.0 – areas that I cover for vendor strategy professionals. At this point I think I’ve heard it all. “Gen Y is bringing in unsecure consumer technology!” “We have to adopt wikis and social networks to recruit college graduates!” “Email is dead because the kids don’t use it!” Being a good sport about this, I’ve tried to shrug it off as the typical complaining one generation does about its kids. But the longer I cover this space, the more I believe this isn’t going away for two reasons:
The founding Fathers of the United States understood all too well the importance of complex events when on July 4th, 1776 they wrote:
"When in the course of human events it becomes necessary for one people to...etcetera, etcetera, and etcetera".
Similarly, many of today's business and IT leaders understand the importance of reacting to business events as they occur in real-time and how that can dramatically change the performance and agility of their business.
Event processing, often called "complex event processing" (CEP) is a hot new enterprise middleware category. CEP answers the question: "What is happening right now in our business"? Sometimes the answer is as simple as ordering more products when the inventory dips below safety stock, but often it involves recognizing patterns of business events that foretell critical business situations that require immediate action.
CEP platforms analyze streams of data as they flow from live sources such as transaction flows, click streams, market data feeds, and myriad other sources of data swirling around inside a business environment. The platforms then prompt either downstream applications or people to react to the information by resetting processing priorities, changing online sales strategies, buying and selling stocks, or performing some other action.
Today Digeo went live with its Moxi Mate, the companion to its Moxi HD DVR, designed to provide whole-home DVR functionality. I sat down with Greg Gudorf, CEO of Digeo, a few weeks back and he previewed the box for me. A couple of my reactions were: 1) the quality of box-to-box streaming is phenomenal; 2) they even designed it so you can turn the panel lights off at night, assuming it will be a bedroom accessory.
The real secret power of this, however, comes with the free inclusion of PlayOn software, which allows your PC to stream online video from Netflix, Hulu, YouTube (and really any other online media content you want including music and photos) to your Moxi Mate box. This is a clever end run around the problem of trying to get the rights to integrate Hulu content into the box directly. (As we saw with Boxee, this is not something Hulu is excited to enable as it threatens their relationships with content owners.)
Love the device. But the fight over how media content will get around the home has only just begun, let the games begin!
Bringing velocity and low price to data center construction is certainly a new concept and one that could have revolutionary implications. This area of design and construction has been very specialized, with each project being unique and the magnitude of a single order in the $50 million range. DRT, a REIT focused purely on the data center market, has made a name for itself by building and operating data centers for corporate clients.
Hathaway joins a distinguished group of highly respected and accomplished people who have quit the position of Cybersecurity Czar. She wasn’t even the actual Cybersecurity Czar, she was just the acting one, but it appears even that was too much to take for her. She cited personal reasons for resigning, but media reports suggest a more plausible reason for resigning – frustration at “spinning her wheels” and not being able to accomplish anything. Sounds familiar, doesn’t it.Whether you are a Cybersecurity Czar or a CISO, the challenges for this position are very similar.