CIOs Gather In Chicago To Discuss IT Strategic Planning

by Laura Koetzle

Laura-KoetzleLast week, Forrester’s CIO Group held its North American Fall Member Meeting in Chicago. In addition to enjoying some Chicago-style deep dish pizza and dinner at the Art Institute of Chicago, approximately 70 members gathered from across the globe to discuss top-of-mind issues. Sessions included presentations from Forrester analysts, case studies presented by members, and a workshop on IT strategic planning.

Read more


Experience The Data at Forrester's Consumer Forum 2009 Chicago

Forrester's Consumer Forum Theater Presentations highlight Forrester’s extensive data capabilities. Data is critical to the Consumer Product Strategy teams, and we work closely with our colleagues on the data team to produce our research. Forrester analysts will share highlights from our global benchmark survey data, as well as our forecast data, examining technology-driven trends in consumer behavior. These demonstrations will be hosted in the International Ballroom at The Fairmont Chicago.

Theater Presentations

Tuesday, October 27, 2009: 1:15–1:35 p.m.

Read more

Adaptive Brand Marketing and Consumer Product Strategy

You should check out Forrester analyst Lisa Bradner's post today over at our Marketing Leadership Blog. Her concept of adaptive brand marketing helps companies re-think their approach to brand management in a world where brand messages are no longer a one-way push, but in fact are shaped by consumers as they interact with and react to brands.

CPS pros should take away the point that marketers and consumer product teams (which might have marketers of their own, or not) need to coordinate their efforts in lockstep to make sure the brand and the organization are prepared for instant feedback from consumers. Because, right now, most organizations are ill-equipped to handle this new world of "always-on" marketing.

Back to work and new blog site

Chenxi Wang

Friends, after nearly three months of leave, I am back to work and ready to take on the world again.


While I was gone, a number of notable market movements happened: McAfee acquired MXlogic, AT&T acquired VeriSign’s security service business, and Verizon Business is forming a strategic alliance with McAfee to deliver cloud solutions. Many of the new announcements, which I am busy processing out of my inbox as we speak, have to do with cloud computing. Interestingly enough, in a week or so, I’ll be able to blog about a few more cloud-centric acquisitions and partnership deals. Looks like the cloud bandwagon is as hot as when I left it three months ago.


Read more

Cloud Computing Belongs On Your 3-Year Roadmap

James Staten

Welcome to the fourth quarter of 2009; what we at Forrester call planning season for most IT departments. In a typical year, this is the time that infrastructure and operations professionals spend lots of cycles burning through what remains of the 2009 budget and building plans for investment in 2010 with the hope of gathering a bit more budget than last year. Of course this is no ordinary year. Economists and financial prognosticators, like our own Andrew Bartels are predicting a long recovery from the recession and further delays in IT spending. That means another year of your infrastructure getting older. There’s two ways of looking at this problem and thus your budget proposals for 2010:

Read more

Rush To Records Management Certification

Brian-Hill  By Brian W. Hill

As we get closer to ARMA International's Annual Conference & Expo in Orlando, Florida, later this week, it’s likely that we’ll hear a lot about US Department of Defense (DoD) records management certifications. Some enterprises treat DoD 5015.2-STD V3 certification as a “check box” item for RFPs, but for others, such as US federal government agencies, these certifications are required.

Q3 2009 survey data show that in making future records management purchasing decisions, DoD 5015.2-STD V3 certification plays a key role. Forty-two percent of records management stakeholders rate DoD 5015.2-STD V3 (baseline) certification as "important" or "very important" in buying decisions. The comparable figures for DoD 5015.2-STD V3 (classified) and DoD 5015.2-STD V3 (Freedom of Information Act/Privacy Act) are 24% and 34%, respectively (see Figure 1). The survey data show that these certifications are more important for government (local, state, and federal) organizations, but not dramatically so. In comparison with their non-government counterparts and with some variation across the specific DoD 5015.2 certifications, 5% to 10% more government records management decision-makers rated these certifications as "important" or "very important."


Read more

Is Your Organization Planning For (Or Doing) Cloud Computing? We Want To Talk To You!

Forrester Principal Analyst, Randy Heffner is currently conducting research on how enterprise architects should incorporate cloud computing into their organizations’ IT strategies and architectures. He is looking for enterprise architects to interview — architects that have experience with evaluating Cloud offerings, if not actually using them. In the research, Randy is considering three broad categories of cloud computing offerings: Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS).


The SPI Model Of Cloud Computing


Because the term “cloud computing” refers to quite diverse types of services and products, architects need to analyze and build multiple cloud strategies. Although there are potentially strong benefits, the costs, risks, and best usage scenarios are not necessarily clear. At minimum, adopting cloud-based offerings requires changes in IT’s planning, cost management, solution design, and production operations. To predict and manage the impact, architects must examine cloud options to determine the impact on their architecture plans and strategies. This report will analyze how interviewees see cloud computing’s effect on their organization’s:

Architecture planning

Solution delivery architectures and projects

Read more

AT&T acquires Verisign Security Consulting

Khalid Kark

AT&T recently announced it has acquired VeriSign's Global Security Consulting Services business for an undisclosed amount. The news was not shocking, since VeriSign had been shopping around for a buyer a few years now and AT&T had to acquire additional competencies in their security service portfolio to compete with other telcos – who have already acquired specialized security companies. Here are my initial thoughts on this acquisition.

Read more

Put Off Making Strategic Decisions About Mobile Development Until 2010

In the first three quarters of 2009, I’ve had an increasing number of discussions with Forrester clients about the state of mobile development and what technologies they should be evaluating. These conversations usually start with the statement “mobility is a mess…” What I mean by that statement is that we’re in the midst of a sea change in the technology options that IT shops have at their disposal when it comes to building custom mobile applications. The frenetic pace of evolution makes mobile development one of the Top 15 Technology Trends and it warrants careful attention on the part of enterprise architects and application development professionals.  By the end of 2010, you’ll have at least five distinct mobile applications architectures to choose from, including:

Read more


Where are all the emergency exits?

Rob Whiteley

That was honestly a question at our recent Security Forum. During every keynote, we collect questions for the audience and one of the attendees took the time to write down: “Can you please have someone from the hotel staff come and inform us of the evacuation plan. Specifically, where are all the emergency exits?”

I love putting on these events. I mean, seriously, only at a security and risk management conference do you get people worried about emergency evacuation plans.

But it did get me thinking and I asked myself: What are the best and worst audience questions from the forum? The event was based on the three shifts we see reshaping the security and risk management landscape in 2010. So I culled through the 78 unanswered question cards we rounded up from our eight keynotes. Here’s a quick breakdown of what was on our security execs minds:

App security: 2
Data security: 3
General information risk: 3
Social media security: 4
General threats and exploits: 6
Security talent and staffing: 7
Outsourcing: 9
Cloud computing: 14

Read more