Las Vegas – Hello from the Consumer Electronics Show (CES) 2014, an industry gathering point for technology vendors, retailers, partners, media, and industry analysts. Like many, I’m here to meet with the innovators, witness demonstrations, and assess the state of the technology industry in 2014 (and beyond).
As they were at last year’s conference, wearables will be a very hot topic at CES 2014. But in the fast-moving world of technology, a year is a long time. In 2014, wearables will graduate to their 2.0 state. To understand this 2.0 iteration, Forrester released two new reports that clients can read and download. The first is an overarching view of the enterprise aspect of wearable technology, The Enterprise Wearables Journey. The second focuses on wearable health, Building A Fitter Business With Wearable Technology. Let me offer a sneak peak into why Wearables 2.0 is a critical topic.
With 2013 coming to an end, it’s time to bring out the crystal ball and make some predictions about 2014. Those who follow Forrester’s research will know that we’re living in the age of the customer, a period in which customer obsession will be the key to winning in all markets. Computing is a critical technology element in the age of the customer: The use of tablets by sales professionals creates richer experiences for prospects and customers, even as the use of wearable technologies by health professionals helps phlebotomists find the vein in a patient’s arm more quickly. Computing is a front-line, customer facing experience that helps companies win and serve customers more effectively.
With that context in mind, I present six meta-trends that will be critical for computing in 2014:
AirWatch held its EMEA AirWatch Connect customer event in London recently. The event underlined that AirWatch, at the tender age of 10, has become one of the leading global providers of enterprise mobility services. My key takeaways from the event are that:
Secure collaboration forms the center of the connected business. Business productivity and innovation benefit significantly from a workforce that is empowered by mobility. AirWatch has one of the most comprehensive enterprise mobility portfolios in the market to support this drive. AirWatch can play a central role for any organization that is transforming into a connected business.
An integrated platform approach to enterprise mobility has a clear advantage. AirWatch pursues a Lego-block approach, bringing together solutions for email, browser, containerization, content locker, and, of course, device and app management. By building its solution as one platform, customers gain the flexibility of a Lego-style deployment — they can pick only those blocks that they require while ensuring the integration and flexibility of the overall solution.
Building a business case for enterprise mobility must include soft factors. Managers who build ROIs for enterprise mobility solutions usually focus on hard KPIs that support existing ways of doing business. However, this “hard ROI” approach really only compares the present with the past. In reality, it is often the soft KPIs, like new ways of doing business, that matter more. Ultimately, mobility is crucial for greater operational flexibility and business transformation. Both are at the heart of long-term business success.
Many CIOs, technical architects as infrastructure and operations (I&O) professionals in Chinese companies are struggling with the pressures of all kinds of business and IT initiatives as well as daily maintenance of system applications. At the same time they are trying to figure out what should be right approach for the company to adapt technology waves like cloud, enterprise mobility, etc., to survive in highly competitive market landscape. Among all the puzzles for the solution of strategic growth, Operating System (OS) migration might seem to have the lowest priority: business application enhancements deliver explicit business value, but it’s hard to justify changing operating systems when they work today. OS is the most fundamental infrastructure software that all other systems depend on, so the complexity and uncertainty of migrations is daunting. As a result, IT organizations in China usually tend to live with the existing OS as much as possible.
Take Microsoft Windows for example. Windows XP and Windows Server 2003 have been widely used on client side and server side. Very few companies have put Windows migration on its IT evolution roadmap. However, I believe the time is now for IT professionals in Chinese companies to seriously consider putting Windows upgrade into IT road map for the next 6 months for a couple of key reasons.
Windows XP and pirated OS won’t be viable much longer to support your business.
Ending support. Extended support, which includes security patches, ends April 8, 2014. Beyond that point, we could expect that more malwares or security attacks toward Windows XP would occur.
We recently met with Huawei executives during the launch of its latest product in China, the S12700 switch. The product, which ships in limited quantity in Q1 2014 is designed for managing campus networks, and acts as a core and aggregation switch in the heart of campus networks. While wired/wireless convergence, policy control and management come as standard features, the draw is the Ethernet Network Processor (ENP). The ENP competes against merchant silicon in competitive switch products, and Huawei claims to be able to deliver new programmable services in six months, compared to one to three years for competitive application-specific integrated circuit (ASIC) chips. This helps IT managers respond quicker to the needs of campus network users, especially in the age of BYOD, Big Data, and cloud computing.
While it is a commendable product in its own right, Huawei will need to position its value more strategically against IT managers that have technology inertia, especially in ‘Cisco-heavy’ networks:
Tying the value of the switch to existing and future enterprise campus needs. In the age of cloud computing, big data, mobility, and social networking, IT managers need to solve network challenges like insufficient service processing capability and slow service responses. Huawei says the new switch is able to provide agile services and respond flexibly to changes in service requirements, on demand. For example, the switch has access control built in for wired/wireless access management. This is a good start. Enterprises will need to understand how the switch plays a central role in a campus network, and Huawei should continue to reinforce its agile network architecture’s storyline.
Voice-controlled intelligent assistants offer a tantalizingly productive vision of end user computing. Using voice commands, users can extend the computing experience to not just mobile scenarios, but to hyper-mobile, on-the-go situations (such as while driving). With wearables like Google Glass, voice command promises even deeper integration into hyper-mobile experiences, as this video demonstrates. And voice controlled intelligent assistants can also enable next-generation collaboration tools like MindMeld.
In spite of this promise, there remains a lurking sense that voice control is more of a gimmick than a productivity enhancer. (As of the time I posted this blog, a Google search for Siri+gimmick yielded… “about 2,430,000 results”). To see where voice control really stands, we surveyed information workers in North American and Europe about their use of voice commands.
Information workers’ use of voice control today:
In reality, many information workers with smartphones are already using voice commands – at least occasionally. Our survey revealed that:
Results from Forrester's Q2 2012 Forrsights Workforce Employee Survey show that more than two-thirds of North American and European information workers who use a computer for work an hour or more per day personally choose the smartphones or tablets they use for work, and 46% of information workers personally choose work laptops that are not on the company-approved device list. To address the increasingly complex mobile device landscape, many companies are deploying bring-your-own-device (BYOD) programs to support devices including smartphones, tablets, laptops or desktops. Successfully planning and implementing a BYOD program requires infrastructure and operations (I&O) executives to address the following four key issues.
1. Build Relationships Outside IT
Implementing a successful BYOD program requires cross-functional collaboration across many IT and business groups in the organization. The I&O team should take the lead in BYOD program development. However, I&O executives must collaborate with security and governance, sourcing and vendor management, application development, and enterprise architecture professionals to determine the correct strategy and tool set. It is also critical to include line-of-business executives, as well as legal and finance professionals, to develop corporate BYOD program policies and procedures.
2. Create A Shared, Multi-Year Vision
Proactively working with decision-makers to identify the potential ROI and impacts on corporate business processes enables the I&O team to create a consistent, shared vision of the overall goals and desired outcomes of implementing a BYOD program. This shared vision of the cross-organizational effects of the BYOD program ensures that line-of-business decision-makers and stakeholders understand what investments they must make to support the program.
Is it me or my expectations? My mobile travel applications have only improved over the past 12 months (and I mean this sincerely), but my disappointment has never been so acute. Why? My expectations have never been higher. I access information more frequently (see Ted Schadler's and John McCarthy's Engagement report -- they quantify this), and I expect more accuracy. In the absence of tethering my computer or tablet to to my mobile-phone-turned-hotspot (difficult on the move), I turn to my mobile phone for services. "Immediacy" is what makes mobile so valuable. If I can't get real-time, accurate information on the go, then how useful are the mobile services?
11. (an extra) When I use the mobile app to add the boarding pass to Passbook, why does only one of two boarding passes go there when I have a connecting flight?
10. I uploaded an update to the loyalty program from the hotel chain. It deleted all of my account information. Awesome. Really guys?
9. I searched the mobile app, mobile web, and full web for a way to recover my account number - not possible in my 10 minutes of searching. Only possible to get password.
8. I called customer service (hotel brand) while sitting on the plane to get my account number. They asked me to state my password out loud (while on the crowded plane). I gave them the password, and they told me it was incorrect. They proceeded to ask for all of my additional security information (e.g., mother's maiden name). "We have these rules in place to protect your privacy and ensure the security of your account." I'm thinking, "My hotel frequent stay account??? It's easier to get my user name and password from my bank!!" Terrible user experience.
The Forrester team of Asia Pacific (AP) analysts has just published its 2013 IT industry predictions. Below is a sneak peek at some key regional trends I wanted to highlight.
2013 will be a transformative year for IT adoption in AP, as multiple IT trends converge to drive industry disruptions and help spur renewed growth in IT spending. Forrester expects IT spending in AP to rebound in 2013, with regionwide growth of 4% — rising to 8% when the large but slow-growing Japan market is excluded. While India IT spending growth will remain sluggish, the 2012 economic slowdown in China will be short-lived as government stimulus policies take effect in 2013. The Australia, New Zealand, and ASEAN markets will all remain resilient, with Vietnam, Indonesia, and the Philippines leading the way in IT spending growth.
Below are some other key predictions shaping the Asia Pacific IT industry in 2013:
End user computing strategies will be limited to mobile device management (MDM). AP organizations are feeling the pressure to deliver applications and services across multiple devices, including traditional desktops/laptops, smartphones, and tablets. But lack of skills will hinder bring-your-own-technology (BYOT) policies, which will remain limited to MDM, including basic device control and security/identity management.