With this purchase, the major offerings that Autonomy picks up are CA Records Manager (which stems from CA’s 2006 acquisition of MDY Group International) and CA Message Manager (which comes from CA’s 2005 acquistion of iLumin). In 2009, I evaluated records management offerings and rated CA Records Manager as a leader in this category. Forrester clients can access the June 23, 2009, “The Forrester Wave™: Records Management, Q2 2009” report for further details.
From its prior acquisitions of Interwoven in 2009 and Meridio in 2007, Autonomy has two existing records management applications. Largely leveraging its 2007 purchase of ZANTAZ, Autonomy also currently markets several message archiving solutions including Digital Safe (cloud-based archiving solution), Enterprise Archive Solution (on-premise archiving software), Arcpliance (on-premise archiving appliance), and more. After it completes the acquisition of CA Technologies’ Information Governance business, Autonomy will have three distinct offerings for records management and over four for message archiving.
Earlier this week, Forrester Research published my Market Overview: Enterprise Rights Management report. Brian Hill and I examined eight vendors in the enterprise rights management (ERM) space: Adobe, Microsoft, GigaTrust, Liquid Machines, NextLabs, Oracle, EMC, and Covertix. We found that the space is evolving to become less of a standalone market. From the report:
Because ERM allows data to protect itself via encryption, it is theoretically the perfect security technology for a world where the “dissolving perimeter” is an established fact. But historically, most enterprises don’t use ERM on an enterprisewide basis and do not use it to protect documents shared outside company boundaries. High cost, application rigidity, and integration shortcomings have limited market adoption. Forrester expects that ERM’s appeal will widen in the future. Integration with data leak prevention technology, content management infrastructure, and other risk mitigation solutions will drive adoption growth, particularly as enterprises roll out the latest versions of Microsoft Exchange and SharePoint.
Yesterday, June 8, 2010, Microsoft released 10 security bulletins, three rated as "critical" and seven rated as "important," to address a total of 34 software vulnerabilities. Of these bulletin items, users should prioritize these four:
MS10-033: Critical on all supported versions of Windows. This update addresses a Windows media file vulnerability that could potentially enable drive-by downloads.
S10-034: Addresses an ActiveX vulnerability.
MS10-035: A cumulative update for Internet Explorer.
MS10-038: Addresses critical vulnerabilities in Excel.
It’s important to note that MS10-038 addresses 14 CVE vulnerabilities, all related to Excel. Many of these vulnerabilities have a “critical” rating. Of the 14 vulnerabilities, only 11 affect Office 2002. Office 2010 is not impacted by any of these.
If you are still running MS Office 2002, it is time to upgrade! In addition to these newly announced vulnerabilities, Microsoft is ceasing support to Office 2002 next month. All the more reason to upgrade!
An important item to note: In addition to Office 2002, Microsoft will cease support for Windows XP service pack 2 and Windows 2000. Users should upgrade to a later version of Windows XP service pack 3.
A recent email got my attention. It highlighted a blog post on the MIT Technology Review website about a video from RSA Animate (copied below) illustrating a lecture by Dan Pink (@danielpink on Twitter): "The Surprising Truth About What Motivates Us," based on his book of the same name.
What got my attention? We need to stop rewarding with a carrot and threatening with a stick. The video highlights multiple research findings that suggest knowledge workers are more motivated by autonomy, mastery and purpose than by financial reward. Pink suggests that financial incentives may actually have a detrimental impact on performance under certain circumstances. (The research suggests money is a motivator for purely mechanical tasks but as soon as some level of cognitive processing is required to complete the task, money is secondary to other factors.)
I have to say this was a little hard to swallow at first. But then I almost missed a key point: this is only true when minimum financial rewards are met, i.e. when employees are paid a large enough base salary, financial incentives to deliver high performance may be detrimental when compared to other motivators such as the desire for: autonomy, mastery of skills, and a sense of purpose.
Forrester's IT Forum EMEA 2010 in Lisbon, Portugal, is finally here! We're expecting about 500 people on-site and I can tell you that the content we've developed with Forrester analysts and our great roster of invited speakers is even better than years past. We've been talking about Business Technology (BT) transformation for a while now, but this year you made it clear that the time for theory is over and you want to know how to make it real.
Today, you'll hear from George Colony, our CEO, followed by keynotes from Peter Hambling, CIO at Lloyds of London, who will tell us why BT is essential to Lloyds in the fast-moving world of risk management and insurance. Alex Cullen, Research Director serving Enterprise Architecture professionals, will help bridge the gap between business and IT using business capability maps, and Ted Schadler, Vice President and Principal Analyst serving Information & Knowledge Management professionals, will talk about leveraging empowered customers and employees to drive business success. He will be joined by two special guests, Michiel Boreel, CTO at Sogeti, and Fernando Summers Gil, Head of Knowledge Management Innovation at BPVA.
If you can't attend, be sure to check out the highlights of the speeches and the Twitter stream below.
It's time for IT to get out of the business of running everything itself and move into the role of delivering technology value to the business. This is a core theme that runs through a large majority of Forrester's research and our advice to clients. But exactly how do you make this transition? Well, a good example can be found in Amylin Pharmaceuticals.
When designing application infrastructure strategy, planning for the renewal of their application landscape, or assessing their overall strategic position, banks and other types of firms in financial services typically like to know the answer to the question: “What are the others doing?” In the past, surveys similar to our newest financial services survey helped application delivery professionals as well as enterprise architects assess their position, for example, regarding application infrastructure strategy as well as broader application renewal initiatives and position their individual initiative in the regional or global IT and business environment.
To the surprise of no one, today Apple unveiled the fourth version of its iconic device: iPhone 4. While some features such as the higher resolution camera, LED flash, and front facing camera qualify more as upgrades that put Apple back on par with leading competitors, others such as the "retina" display and the gorgeous industrial design will maintain Apple's mindshare and market share growth rates.
Apple is going to sell a lot of iPhone 4s. They'll sell them to those who simply have to have the new new thing (many of whom are iPhone owners already), and to iPhone owners who were off contract and waiting for the new version. They'll also sell a lot of iPhone 3GSs, especially to iPhone 3G owners who can't stomach going without iOS 4's multitasking, and also to those for whom $15/month is a manageable addition but $30/month is not. That's a whole lot of good news for AT&T and Apple's other carrier partners, though that good news is more in the form of loyalty than in net additions to their networks.
This is the third time in four years that I’ve attended PTC’s User Conference in Orlando, Florida, and it’s somewhat remarkable how in each of these years, the company has used this event to introduce a new, extended PLM process offering to its stable of Windchill products: in 2007, PTC introduced MPMLink for manufacturing process management (per the company’s earlier acquisition of PolyPlan); in 2009, it was RequirementsLink for requirements management; and this year, PTC announced another two new Windchill products built on Microsoft SharePoint: PPMLink for program portfolio management and SocialLink for Social Product Development.
The Windchill PPMLink announcement is of particular interest given the recent stream of client inquiries and interest I’ve been receiving from product development teams on PPM tools. In fact, respondents to Forrester's Global State Of Product Life-Cycle Management Online Survey ranked PPM as one of the top PLM investment priorities:
Regardless of whether you label the PPM process as project portfolio management, product portfolio management, or program portfolio management, few product life-cycle management processes have as much impact on a company's product innovation efforts and financial performance as managing the R&D project pipeline and resulting new products. Beyond just being a hot area of extended PLM investment, PTC’s move to build out the SharePoint-based Windchill PPMLink offering is significant for a couple of other reasons as well:
I have been getting several inquiries asking if speech analytics is a replacement for quality monitoring software in contact centers. Speech analytics is a valuable tool for monitoring your customer’s experience when dialing into your contact centers or using the IVR, as it provides the ability to mine, analyze, and understand customer conversations. It is a valuable tool for companies to quickly identify and understand what is on their customer’s mind. However, it serves a different purpose than quality monitoring that records customer conversations and is used for coaching agents or for compliance and recording of customer calls. Quality monitoring is best used for improving the agent’s performance, and speech analytics is optimized for understanding customer concerns and attitudes. They are complementary applications, and one does not replace the need for the other.