Analyst Comments from SAP Insider Event in Nice

This week I attended SAP Insider's European three-part conference — covering Logistics & Supply Chain Management, PLM, and Manufacturing — and got a chance to catch up with both SAP PLM customers and the SAP executive team on the latest SAP PLM strategy and roadmap. Over the years, SAP's PLM solution development has been a story of evolution. Starting with basic document and image vaulting in the 1990's, the SAP PLM moniker has steadily expanded to include BOM management (leveraging common data objects from SAP ERP), a complex, concurrent product-process module called iPPE (co-developed and piloted with BMW), specifications and recipe management (building upon SAP's Environmental Health & Safety database), and engineering change workflows (basically the major integrating denominator across these modules). Most recently and starting in 2005, SAP has gone to market with its New Product Development & Introduction (NPDI) xApps — a suite of tools which includes cProjects (for phase-gate project management), xRPM (for resource and portfolio management), and xPD (for ideation and concept management).

Read more

Thoughts On Recession...And ECM Adoption

Kylemcnabb_3By Kyle McNabb

While we all wait and watch numerous economic indicators (my favorites are easily found in the WSJ) to see if the US economy, and possibly others, will head into recession, here's a thought - just a simple thought - on what you can do if/when you get the call to pull back on your ECM spending. Turn you attention now to understanding your organization's business context. I'm not referring to business requirements - most of you have business requirements related to your ECM endeavors. Instead, I'm referring to discovering how your business people and business processes work with and use content, not simply how they manage it.

Read more

Categories:

Help Us Help You

Forrester values the insight and opinions of information and knowledge management (I&KM) pros, both clients and non-clients alike. Your thoughts, experiences, and insights play a huge role in shaping our research. Now we're building a panel for future surveys and we're inviting you to join us. If you participate, the panel will provide you with a unique opportunity to gain insight, comparative data, and best practices about IT in general, and specifically about content, collaboration, data management and business process technology adoption.

What's in it for you? As a panelist you will get complimentary access to pre-published insight, comparative data, and best practices drawn from the surveys conducted, including access to Forrester teleconferences that result from the survey in question. In addition, as a token of our appreciation the next 100 people to sign up for our IT panel will receive a $10 Hallmark Insight gift card. Thanks for considering our offer.

Viewpoint Two: The recession won’t affect security folks

OK, for arguments’ sake let's suppose we’re in a recession. What does that really mean for us security folks?

To answer that question, let’s turn the question on its head. What did security spending look like when times were pretty good?  Say from early 2005 to 2007 for example - did we see an upturn in spending? Our research found that security spending was flat or declining as a proportion of overall IT spending during that period. So then why, when the economy goes south would we spend less on security?

The vast majority of organizations spend money to counter threats and incidents that they’re seeing, and to comply with governmental and contractual requirements. Neither of these two factors are hugely dependent on economic cycles.

Read more

Recession brings a downturn in security spending and jobs

Many financial indicators are pointing to a looming global recession. This means that companies will be tightening their belts and drastically cutting down on their discretionary spending. What does this mean for information security industry? And what can CISOs do to recession proof their security programs?

This means leaner security organizations (yes that means lay offs), significantly reduced spending on security consultants and contractors, and squeezing the most out of every buck that is spent for information security. This would also mean longer sales cycles for security vendors, cost taking precedence over functionality. From a CISO perspective, it means more justification for security budgets, begging other parts of the business to fund security projects, and pushing existing vendors to provide more for the same amount of dollars.

Read more

Categories:

Dell Acquires MessageOne And Buys Its Way Into SaaS

Stephanie It’s official, the future of information management and infrastructure is software as a service (SaaS). Today, Dell announced its intent to acquire the powerhouse in email continuity and archiving, MessageOne. This acquisition will give Dell the cornerstone that it needs to build out its own suite of SaaS offerings. Dell clearly didn’t want to be left out of race as it watched Iron Mountain successfully building out its SaaS offerings and watched its competitors and partners complete significant acquisitions in the market including Seagate Services’ acquisition of Evault, EMC’s acquisition of Mozy and IBM’s recent acquisition of Arsenal Digital Solutions. Then there’s Symantec who is building out its Symantec Protection Network.

Read more

SDL Goes Shopping Again

Stevepowers_2By Stephen Powers

SDL announced today that it has acquired fellow global information management services vendor Idiom Technologies. Both SDL and Idiom sell software and services to help organizations manage global content. This marks the second significant acquisition for SDL in less than a year; last year SDL got into the Web content management business with its purchase of Tridion.

Read more

Complex Event Processing (CEP) For I&KM — Mouthfuls, Morsels, And Meaningful, Manageable, Multifaceted Streams of Real-Time Int

Jameskobielus_7By James Kobielus

This past week’s Forrester Enterprise Architecture (EA) Forum was quite an excellent experience. Being new to Forrester, it was a splendid opportunity to introduce myself to our customers, engage them in face-to-face inquiries, and present my research priorities. Not being new to the analyst space, it was also a chance for me to re-introduce — hence recontextualize — myself, and my focus areas, within the Forrester universe of research client groups, orbits, and domains.

Read more

OpenID family grows – How it can transform Identity Federation between enteprises

With Google, IBM, Microsoft, VeriSign, and Yahoo! joining the OpenID Foundation, we may actually feel that something in federated access management is going to change. It is finally not the case of a vendor proposing a new standard – and adding to the cacophony of federation standards – but a set of moves towards a simple technology that today can alleviate password management woes at service providers.

Technology aside, OpenID will greatly help with reducing and removing the legal obstacles in the way of  identity federation’s proliferation. When payment-grade, commercial, and trusted identity provider service becomes a reality – VeriSign’s joining the OpenID camp clearly points in that direction – and software-as-a-service companies (like salesforce.com),  accept OpenID authentication from these trusted identity providers, then enterprises can truly start thinking about outsourcing password management identity management processes. When required, strong authentication integration with OpenID can rely on VerSign’s VIP or other vendors’ strong authentication acceptance network.

Read more

IBM Expands IOD Portfolio, Perhaps To The Bursting Point

By James Kobielus, Boris Evelson, Paul Hamerman, Rob Karel, Kyle McNabb, Craig Le Clair, Colin Teubner, Merv Adrian, and Connie Moore

Simplicity is bliss, but complexity has the upper hand in many enterprise information and knowledge management (I&KM) environments.

To keep a lid on runaway complexity, enterprise I&KM professionals often limit their strategic solution vendors and professional services partners to a chosen few. Typically, strategic vendors are those that can offer the widest range of best-of-breed I&KM solutions. Sourcing from a core group of solution providers also allows enterprise IT staff to obtain better licensing terms, reduce maintenance costs, and tighten cross-product and platform integration across diverse solution components.

Read more