At last week’s India analyst briefing, IBM outlined urbanization as a key factor driving “Smarter Cities” initiatives in India.
IBM expects India to invest about $1.2 trillion over the next 20 years in areas like transportation, energy, and public security. The second phase of the Jawaharlal Nehru National Urban Renewal Mission (JnNURM), which covers $40 billion in infrastructure-related projects, will play a key role in improving the country’s infrastructure capacity to support urbanization over the next five years. IBM is currently working on approximately 3,000 smart city projects globally; of those, about 30 pilot projects are from India.
About a year ago, I published a report on how cities are undergoing rapid transformation and creating massive opportunities for ICT vendors across Asia Pacific. Although the urbanization rate still stands at about 30% in India, it is growing fast. Also, an increasingly Internet-savvy population is demanding better citizen services. Indian state and city governments will make investments to build infrastructure on a large scale to meet the needs of their surging urban populations, creating opportunities for vendors. —
Despite the promise and opportunities that India provides for Smarter City initiatives, IBM has to deal with key challenges:
I spent a lot of time last week thinking about public safety. What is public safety? How do you achieve it? Well, it seems to me that it could be anything and everything; but that it’s contextual and different for all cities. In fact, three different “public safety” articles jumped out at me as I was reading the International Herald Tribune one morning:
Traffic defies a revolution. According to the article, there are about 2.2 million vehicles in Cairo, where licenses are generally awarded without a road test and drivers “often shrug off stoplights and traffic rules.” Road accidents kill about 1,000 people in greater Cairo each year, with ½ of those pedestrians.
When lions roam the backyard. While North American cities have long dealt with “urban wildlife” such as coyotes, foxes, raccoons and badgers, fast growing cities in Africa increasingly face incidents such as that described in the story – a lioness and her cubs who crawled under a fence into a residential Nairobi neighborhood.
Data security consistently tops the laundry list of security priorities because it must. Organizations are collecting data, creating data, using data, and storing data in some way or another. Mishandle data or disregard privacy, and you’ve got a public relations fiasco on your hands with the potential to disrupt business operations or hurt the bottom line.
So, we know that data security is a priority, but what does that mean? What are organizations actually doing here? How much are they spending, and where are they focusing their efforts? And what are they doing about privacy? I’ve dug into data from Forrester’s Forrsights Security Survey, Q2 2012 and data from the International Association of Privacy Professionals (IAPP) to answer these questions in a newly published benchmarks report for our Data Security and Privacy playbook. Note: This is not a shopping list, nor a check list, nor is it a “spend x% on data security because your peers are doing so!” manifesto. This report is meant to be a starting point for discussion for S&R pros within their organizations to take a closer look at their own data security and privacy strategy.
Today EMC announced the acquisition of Silicium Security. Silicium’s ECAT product is a malware threat detection and response solution. ECAT did not adopt the failed signature based approach to malware detection and instead leveraged whitelisting and anomaly detection. Incident response teams can leverage ECAT to quickly identify and remediate compromised hosts. ECAT joins NetWitness and enVision.
In today’s world of 24x7x365 global operations and competition, downtime results not only in immediate lost revenue and productivity, but also in lasting damage to corporate reputation that erodes customer confidence in your brand. No organization is immune: with ever increasing risks and more dependence on technology, major outages are becoming more common and more costly. We've reached a critical juncture where resiliency is more critical than ever because:
There is less tolerance for downtime — of any kind. BC/DR historically focused on events such as natural disasters, extreme weather, major IT failures, critical infrastructure failures, pandemics/epidemics, and other events that have a low probability of occurring but have a very high impact on the business. However, in today’s world of global, 24x7x365 operations and intense competition, downtime, regardless of whether it’s a natural disaster, a simple hard drive failure, or a security breach, is unacceptable. The business doesn’t care what caused the downtime; instead, it wants service restored as quickly as possible with as little data loss as possible, regardless of which groups are responsible for the execution.
Doing access management with the help of cloud-based services is a pretty comfortable proposition by now. For more than a decade, we've been doing federated single sign-on to and from apps that are themselves in external domains. Looking at the recent Forrester Wave™ on enterprise cloud identity and access management, all three vendors we identified as leaders specialize in various kinds of cloud-app SSO and access control -- the cloud identity 1.0 ur-scenario. (Join us tomorrow, September 20, for a client webinar to review this Wave!)
What about identity management in the cloud? It's been harder to find. Two other vendors we looked at in the Wave provide cloud interfaces to familiar on-premises provisioning solutions such as the IBM and Oracle suites. And all the vendors rely on hooking into an organization's on-premises directory as the single source of truth.
Okay, then, what about putting that single source of truth into a store with a cloud-native interface, as my colleague Andras discussed on our Security & Risk blogs recently? That’s even more rare -- but the writing is on the wall. Microsoft went bold with its Windows Azure Active Directory moves, providing non-LDAP RESTful interfaces. Cool. (I’d like it to support SCIM as well, though, since you ask.)
So, this blog is dedicated to stepping outside the comfort zone once again and into the world of chaos. Not only may you not want to persist in your data quality transformations, but you may not want to cleanse the data.
Current thinking: Purge poor data from your environment. Put the word “risk” in the same sentence as data quality and watch the hackles go up on data quality professionals. It is like using salt in your coffee instead of sugar. However, the biggest challenge I see many data quality professionals face is getting lost in all the data due to the fact that they need to remove risk to the business caused by bad data. In the world of big data, clearly you are not going to be able to cleanse all that data. A best practice is to identify critical data elements that have the most impact on the business and focus efforts there. Problem solved.
Not so fast. Even scoping the data quality effort may not be the right way to go. The time and effort it takes as well as the accessibility of the data may not meet business needs to get information quickly. The business has decided to take the risk, focusing on direction rather than precision.
While you no doubt answered wellness, the reality is that when you look at the typical change programs in a major corporation today, Band-Aids are far more common. But that's hardly surprising given the short-term pressures facing organizations today. Let's reflect on a few examples:
Those in the financial services industry are still struggling to deal with the rash of new regulation post meltdown. Following a spate of high-profile failures, risk management has taken center stage, while in others there is a hurried review of operating procedures in far-flung corners of the corporation.
In virtually all industries, others are trying to respond to hemorrhaging sales statistics. Customers are no longer happy to keep quiet when they get a bad service experience - they tell their friends and followers via Facebook and Twitter. Customer churn is rampant.
Or is it increased competitive pressures? More and more new entrants are turning up to challenge and disrupt the incumbent business models of many established firms. They don't have the baggage of high-cost business models and 12 layers of management.
Today’s top career sites do more than list jobs available. The best ones give a glimpse of what it’s like to work at the company, communicate the company values, and introduce the company brand. These sites use multimedia to communicate messages about the company culture, the people, professional growth opportunities, and more.
Join me on Friday, September 21, 3012 at 11 am Eastern Time for the Forrester webinar, Create An Engaging Career Website To Pique Candidate Interest. In this session I will talk about the essential components to include in a career website, the effective use of video to communicate messages, and the important connections with social media sites. I’ll show many examples of effective websites.
Register now. Bring your best questions. I look forward to talking with you.
I recently had both the privilege and pleasure to do a deep dive into the cold and warm BI waters in Russia and Israel. Cold - because some of my experiences were sobering. Warm - because the reception could not have been more pleasant. My presentations were well attended (sponsored by www.in4media.ru in Russia and www.matrix.co.il in Israel), showing high levels of BI interest, adoption, experience, and expertise. Challenges remain the same, as Russian and Israeli businesses struggle with BI governance, ownership, SDLC and PMO methodologies, data, and app integration just like the rest of the world. I spent long evening hours with a large global company in Israel that grew rapidly by M&A and is struggling with multiple strategic challenges: centralize or localize BI, vendor selection, end user empowerment, etc. Sound familiar?
But it was not all business as usual. A few interesting regional peculiarities did come out. For example, the "BI as a key competitive differentiator" message fell on mostly deaf ears in Russia, as Russian companies don't really compete against each other. Territories, brands, markets, and spheres of influence are handed top down from the government or negotiated in high-level deals behind closed doors. That is not to say, however, that BI in Russia is only used for reporting - multiple businesses are pushing BI to the limits such as advanced customer segmentation for better upsell/cross-sell rates.
I was also pleasantly surprised and impressed a few times (and for those of you who know me well, you know that it's pretty hard to impress the old veteran):