Consumer mobility in India and China is flowing into enterprises. Recent Forrester survey data shows that nearly three in five IT execs and technology decision-makers in these countries — 58% in India and 57% in China — plan to increase their spending on mobile software (including applications and middleware) in 2014.
India has leapfrogged Australia/New Zealand and now leads the Asia Pacific region in terms of expected mobile software spending growth. China has made the biggest move over the past year, jumping from eighth place to second.
We believe that the high growth in mobile software spending in India and China is primarily due to:
From June to August 2013, Forrester invited large and medium-size organizations in India to share details about their live enterprise mobility applications. Our objective was to understand how Indian organizations are leveraging mobile applications to better connect with customers, partners, and employees. In total, we received details of 59 mobile application projects from 41 organizations with more than 500 employees in India. These organizations are spread across verticals like manufacturing, financial services, automotive, media, healthcare, professional services, telecommunications, and utilities. Our research provided some interesting findings:
Mobile application development is skewed toward internal, employee-facing projects. Among the projects reviewed, 59% of the enterprise mobility applications have been developed for internal employees, 23% target customers, and the remaining 18% are for business partners. Most organizations in India are first developing applications for employees, because calculating the ROI is easier and more tangible for employee-centric applications as compared with customer- or business partner -centric applications. For instance, sales force/field force automation is currently the most commonly developed mobile application by Indian organizations.
The majority of projects are co-owned by IT and business. 71% of the enterprise mobility application projects we covered are jointly owned by the IT team and the relevant business stakeholders. Business inputs, especially on user interface and experience, are key to ensuring adoption of mobile application post-launch.
AirWatch held its EMEA AirWatch Connect customer event in London recently. The event underlined that AirWatch, at the tender age of 10, has become one of the leading global providers of enterprise mobility services. My key takeaways from the event are that:
Secure collaboration forms the center of the connected business. Business productivity and innovation benefit significantly from a workforce that is empowered by mobility. AirWatch has one of the most comprehensive enterprise mobility portfolios in the market to support this drive. AirWatch can play a central role for any organization that is transforming into a connected business.
An integrated platform approach to enterprise mobility has a clear advantage. AirWatch pursues a Lego-block approach, bringing together solutions for email, browser, containerization, content locker, and, of course, device and app management. By building its solution as one platform, customers gain the flexibility of a Lego-style deployment — they can pick only those blocks that they require while ensuring the integration and flexibility of the overall solution.
Building a business case for enterprise mobility must include soft factors. Managers who build ROIs for enterprise mobility solutions usually focus on hard KPIs that support existing ways of doing business. However, this “hard ROI” approach really only compares the present with the past. In reality, it is often the soft KPIs, like new ways of doing business, that matter more. Ultimately, mobility is crucial for greater operational flexibility and business transformation. Both are at the heart of long-term business success.
Information workers in India are increasingly using their personal devices, applications, and web services to accomplish both personal and work-related activities. Results from Forrester’s Forrsights Workforce Employee Survey, Q4 2012 indicate that at least 85% of employees use phone/tablet applications and web-based services for both purposes which is putting corporate information security under serious threat.
My interactions with numerous infrastructure and operations (I&O) professionals from large enterprises in India over the past six months have revealed that there is a high degree of awareness of the need to develop a bring-your-own-technology (BYOT) policy. However, actual implementations aren’t yet common, as I&O professionals are unable to address management’s three key concerns. These are, in order of priority:
How can we ensure that information on employee-owned hardware and software is secure?
Many CIOs, technical architects as infrastructure and operations (I&O) professionals in Chinese companies are struggling with the pressures of all kinds of business and IT initiatives as well as daily maintenance of system applications. At the same time they are trying to figure out what should be right approach for the company to adapt technology waves like cloud, enterprise mobility, etc., to survive in highly competitive market landscape. Among all the puzzles for the solution of strategic growth, Operating System (OS) migration might seem to have the lowest priority: business application enhancements deliver explicit business value, but it’s hard to justify changing operating systems when they work today. OS is the most fundamental infrastructure software that all other systems depend on, so the complexity and uncertainty of migrations is daunting. As a result, IT organizations in China usually tend to live with the existing OS as much as possible.
Take Microsoft Windows for example. Windows XP and Windows Server 2003 have been widely used on client side and server side. Very few companies have put Windows migration on its IT evolution roadmap. However, I believe the time is now for IT professionals in Chinese companies to seriously consider putting Windows upgrade into IT road map for the next 6 months for a couple of key reasons.
Windows XP and pirated OS won’t be viable much longer to support your business.
Ending support. Extended support, which includes security patches, ends April 8, 2014. Beyond that point, we could expect that more malwares or security attacks toward Windows XP would occur.
We recently met with Huawei executives during the launch of its latest product in China, the S12700 switch. The product, which ships in limited quantity in Q1 2014 is designed for managing campus networks, and acts as a core and aggregation switch in the heart of campus networks. While wired/wireless convergence, policy control and management come as standard features, the draw is the Ethernet Network Processor (ENP). The ENP competes against merchant silicon in competitive switch products, and Huawei claims to be able to deliver new programmable services in six months, compared to one to three years for competitive application-specific integrated circuit (ASIC) chips. This helps IT managers respond quicker to the needs of campus network users, especially in the age of BYOD, Big Data, and cloud computing.
While it is a commendable product in its own right, Huawei will need to position its value more strategically against IT managers that have technology inertia, especially in ‘Cisco-heavy’ networks:
Tying the value of the switch to existing and future enterprise campus needs. In the age of cloud computing, big data, mobility, and social networking, IT managers need to solve network challenges like insufficient service processing capability and slow service responses. Huawei says the new switch is able to provide agile services and respond flexibly to changes in service requirements, on demand. For example, the switch has access control built in for wired/wireless access management. This is a good start. Enterprises will need to understand how the switch plays a central role in a campus network, and Huawei should continue to reinforce its agile network architecture’s storyline.
Voice-controlled intelligent assistants offer a tantalizingly productive vision of end user computing. Using voice commands, users can extend the computing experience to not just mobile scenarios, but to hyper-mobile, on-the-go situations (such as while driving). With wearables like Google Glass, voice command promises even deeper integration into hyper-mobile experiences, as this video demonstrates. And voice controlled intelligent assistants can also enable next-generation collaboration tools like MindMeld.
In spite of this promise, there remains a lurking sense that voice control is more of a gimmick than a productivity enhancer. (As of the time I posted this blog, a Google search for Siri+gimmick yielded… “about 2,430,000 results”). To see where voice control really stands, we surveyed information workers in North American and Europe about their use of voice commands.
Information workers’ use of voice control today:
In reality, many information workers with smartphones are already using voice commands – at least occasionally. Our survey revealed that:
Results from Forrester's Q2 2012 Forrsights Workforce Employee Survey show that more than two-thirds of North American and European information workers who use a computer for work an hour or more per day personally choose the smartphones or tablets they use for work, and 46% of information workers personally choose work laptops that are not on the company-approved device list. To address the increasingly complex mobile device landscape, many companies are deploying bring-your-own-device (BYOD) programs to support devices including smartphones, tablets, laptops or desktops. Successfully planning and implementing a BYOD program requires infrastructure and operations (I&O) executives to address the following four key issues.
1. Build Relationships Outside IT
Implementing a successful BYOD program requires cross-functional collaboration across many IT and business groups in the organization. The I&O team should take the lead in BYOD program development. However, I&O executives must collaborate with security and governance, sourcing and vendor management, application development, and enterprise architecture professionals to determine the correct strategy and tool set. It is also critical to include line-of-business executives, as well as legal and finance professionals, to develop corporate BYOD program policies and procedures.
2. Create A Shared, Multi-Year Vision
Proactively working with decision-makers to identify the potential ROI and impacts on corporate business processes enables the I&O team to create a consistent, shared vision of the overall goals and desired outcomes of implementing a BYOD program. This shared vision of the cross-organizational effects of the BYOD program ensures that line-of-business decision-makers and stakeholders understand what investments they must make to support the program.
Information workers in organizations across Asia Pacific (AP) are increasingly using personal mobile devices, applications, and public cloud services for work. Forrester defines this as the bring-your-own-technology (BYOT) trend. This behavior is more prevalent among employees above the director-level (C-level executives, presidents, and vice presidents) than those below that level (individual worker, contractor or consultant and manager/supervisor). Data from Forrester’s Forrsight Workforce survey, Q4 2012 corroborates this trend in AP.
We believe that the BYOT trend will strengthen over the next two years in AP, primarily fueled by employees below the director level. Increasing options, quality and affordability of devices, apps, and wireless connectivity, coverage, and capacity will contribute to this expansion. In order to secure corporate data, organizations will need to:
Develop Corporate Mobile Policies: Organizations must build cross-functional teams to plan their mobile strategies. This should include representatives from different LOBs like finance, HR, legal and sourcing. Moreover, the policy must clearly define guardrails to provide flexibility to employees but within boundaries and in compliance with local regulations.
Identify Technologies To Secure Corporate Data: 29% of business-decision makers in AP report that the rising expectations of younger workers require businesses to push enterprise IT to keep technology current. This is why it is critical to identify both back-end and front-end technologies and suppliers that can optimize mobile device and application management in a secure manner. Focus should be on networking layer security and mobile device management solutions.