I sat down with Steve Cowley, General Manager for IBM Watson, on Tuesday at IBM Insights to talk about Watson successes, challenges since the January launch, and what is in store. While the potential has always intrigued me, the initial use cases and message gave me more than a bit of pause: the daunting task to develop and train the corpus, the narrowness of the use cases, what would this actually cost? Jump ahead nine months and the IBM Watson world is in a very different place.
IBM is clearly in its market building phase. It is as much about what IBM Watson is and how IBM overall is repositioning itself as it is about changing the business model for selling technology. However, it is easy to get negative very fast on this strategy as seen with the tremors on Wall Street as IBM's stock has gone from a 52 week high of $199 to $164 at close on Friday 10/31, much of that happening in the past month since earnings release. Wall Street may not like company uncertainty during transitional periods, but enterprise architects care about what will make their organizations successful, make development and management of technology easier, and making sure costs don't sky rocket when new bright shiny objects come in. And, that is where IBM is headed with an eye toward changing the game.
IBM Watson delivers on information over technology.
Steve surprised me with this statement, "[With] traditional programmed systems, the system is at its best when it is deployed, because it is closest to the business need it was written for. Over time these systems get further and further away from the shifting business need and so either they fall in effectiveness, or require a great deal or maintenance." Steve pointed out that data is what is changing the game.*
Previously Microsoft tried to discourage customers from using virtual desktop infrastructure (VDI) on top of rival operating systems by applying complex licensing rules involving various TLAs such as RUR, VDA and CSL (which I’m not going to explain here, because they are, thankfully, no longer needed). The USL is far simpler - clear Windows licensing replacing translucent frosted glass, so to speak.
Technology has given your customers choices and digital predators the edge. Ask marketing, they will tell you about the decreasing effectiveness of traditional campaigns. Look at your business strategy and find plans to address new digital competitors that have become serious threats overnight. Across the board, Forrester finds high expectations that emerging technology will help firms stay competitive amidst these changes. But which ones should you pay attention to? Cloud, mobile, social, Read more
My January 2013 report “PaaS Market Dynamics in China, 2012 To 2017,” forecast that China’s platform-as-a-service (PaaS) market would remain in flux until 2015. But now I think it will take even longer for the cloud landscape in China to consolidate and stabilize, for three reasons:
1. The boundary between infrastructure-as-a-service (IaaS) and PaaS is breaking down.
2. Emerging technologies like Docker are having an impact on technology and mindsets.
3. China has emerging startups in both the IaaS and PaaS segments.
The startups mainly focus on differentiating the cloud user experience by automating various layers to deliver unique value to potential adopters of cloud solutions. They include:
QingCloud.Founded in 2012, QingCloud raised US$20 million in Series B funding in January 2014. Its IaaS offerings for public and virtual private cloud include computing (image and instances), network (VxNet, routing, elastic IP, and load balancing), storage (volume and snapshot), database (MySQL-based, master/slave synchronization support with auto-snapshot), security (group policy and SSH key pair login), and management features (web console to deploy, manage, and monitor resources), which are billed on a per-second basis.
My colleagues Sophia Vargas, Michael Yamnitsky, and I have just published a new Quick Take report, "HP Announces Innovative Tools That Will Bridge Physical And Digital Worlds." Sophia and Michael have written about 3D printing for CIOs previously, and all three of us are interested in how computing and printing technologies can inform the BT Agenda of technology managers.
Fresh off of the announcement that HP will split into two publicly owned companies, one of those new entities -- HP Inc, the personal computing and printing business -- announced its vision for the future with two new products that help users cross the divide between physical and digital. The Multi-Jet Fusion 3D printer represents HP's long-awaited entry into 3D printing, with disruptively improved speed and quality compared to existing market entries. The sprout desktop PC combines a 3D scanner with a touchscreen monitor, touchscreen display mat, and specialized software that allows users to scan real objects, then manipulate them easily in digital format.
In both cases, a video demonstration helps you to really grok what the product is about.
CNET posted a video tour of the Multi-Jet Fusion 3D printer on Youtube:
EY has released its Global Information Security Survey 2014. The survey, published every year, focuses on the issues facing information security pros for the coming year. Many of the trends identified in the report are trends that Forrester has seen evolve in the past two years. At the same time, these trends are accelerating. I am one analyst that is reluctant to paint information security with the fear, uncertainty, doubt (FUD) brush, but after reading the EY report I am not sure that FUD is inaccurate. We live in challenging times and the EY report validates this assertion. For example the research shows:
Attack power on the part of adversaries continues to grow. The capabilities and attack power of the adversary are on the rise. Criminal syndicates, hacktivists, and state-sponsored attackers top EY's respondents' list of top attack sources. This is not surprising based on the level of political instability in the world and the financial gains cybercrime can provide criminal groups derived from cybercrime.
Organizations are in battle with outdated weapons and strategies. Business today is using a set of outdated strategies and technologies to combat adversarial groups that are well financed and supported using some of the best offensive technologies available. These groups are well trained in the use of social engineering and technical cyberattack craft.
Organizations continue to see a dissolution of the perimeter. Mobility, outsourcing, cloud computing, and third-party consulting agreements continue to poke holes in companies' perimeters. All of these issues point to the need of a more flexible defense that uses a variety of smart detection and protection methods.
Previously, when CIOs and enterprise architecture professionals talked about “business-to-business” (B2B) commerce in China, most people thought of third-party B2B marketplaces like Alibaba.com or HC360.com. Very few companies use professional B2B solutions internally, instead relying on a combination of order management systems, customer relationship management, and third-party B2B marketplaces to trade with their business partners.
This is going to change. We have observed a few trends in the Chinese market that will become major drivers for the adoption of enterprise B2B solutions. These trends were further validated during the SAP summit last week in Shenzhen.
The legacy application architecture on the market won’t address the challenges of the age of the customer. Most of the companies currently doing business in China’s B2B market are small and medium-size companies with low IT systems maturity — many of them still exchange business information by emailing Excel files. These firms must rely on third-party marketplaces for business collaboration.
On Monday Microsoft officially announced the launch of two Azure Data Centers in Australia. This is big news for the many Australia-based organizations concerned about data sovereignty, as well as those who simply equate on-shore data residency with increased security and control.
Announced as part of TechEd 2014 in Sydney, Microsoft specifically called out Amazon Web Services (AWS) and Google as it’s key competition. In fact, Microsoft has gone to great lengths over the past year plus to consistently position these two companies as the only other viable longterm cloud providers. This is based on three cloud provider capabilities identified by Microsoft as critical: hyper-scale, enterprise-grade, and hybrid.
Overall it’s a good angle for Microsoft. All three players operate at hyper-scale as public cloud providers. All three also offer enterprise-grade services, (although this definition varies based on workload). Most importantly for Microsoft, neither AWS nor Google have a primary focus on enabling hybrid cloud services.
In contrast, all traditional large infrastructure vendors (Fujitsu, HP, IBM, VMware, etc.), system integrators (Dimension Data, NTT, etc.), and telco’s (Telstra) focus squarely on enterprise-grade services and hybrid cloud enablement. Rackspace, IBM and HP also have Australia-based data centers. But all these providers lack hyper-scale.
To bring a recent piece of research on content co-marketing to life, I created a mini-podcast (8 minutes) that includes excerpts from my interviews with marketing leaders. Give it a listen (if the Soundcloud player below doesn't show up or doesn't work for you, you can go straight to the Soundcloud page where it lives, here). Below I've included notes to the podcast, and a full transcript.