In The Grasp Of A Mobility-, Data-, And Multiplatform-Driven Future

Clement Teo

“The future is already here — it’s just not evenly distributed.” This popular quote hit home at the Global Mobile Internet Conference panel on meeting the challenge of global connectivity that I moderated this week. Internet.org is a global partnership between technology leaders, nonprofits, local communities, and experts who are working together to bring the Internet to the two-thirds of the world’s population that don’t have it. Founding partners include Facebook, Ericsson, Qualcomm, Nokia (now Microsoft Mobile), and Opera.

What it means

  • The age of the customer is everywhere. This point was cemented at the conference. Device makers, network infrastructure providers, and app developers have to work with telecom providers to leverage existing 2G/3G assets to tap unconnected subscribers or miss out on business opportunities. Governments also need to help by, for example, providing consistent electricity to homes. Improving the customer experience can help businesses grow.
Read more

Announcing The Social Risk & Compliance (SRC) Solutions Wave

Nick Hayes

Today we published a new Forrester Wave: Social Risk & Compliance (SRC) Solutions, Q2 2014. This report evaluates 10 vendors emerging to help organizations enable companywide use of social media while providing the necessary controls and oversight to mitigate associated risks and enforce compliance.

 

Why now

Use of social media today is rampant.

It’s no longer just your marketing team that uses social media for business purposes. Employees across the entire organization use social media for personal and professional reasons, leveraging social to drive real business for your company. The opportunities to enhance your brand, deepen customer relationships, and glean new customer insights are all too valuable to ignore -- but the risks are real too.

Moreover, the legal and regulatory landscape is evolving rapidly, complicating the ways in which you can manage social media and the myriad reputational, security, and privacy risks (among others) that expose your organization. To take advantage of these opportunities and still protect your company, you need new tools and technology to do this effectively.

 

What they do

Read more

If You Are CEO Of A Consumer Organization, You Have A New Job Responsibility -- Security

Stephanie Balaouras

On May 5, 2014, Target announced the resignation of its CEO, Gregg Steinhafel, in large part because of the massive and embarrassing customer data breach that occurred just before the 2013 U.S. holiday season kicked into high gear. After a security breach or incident, the CISO (or whoever is in charge of security) or the CIO, or both, are usually axed. Someone’s head has to roll. But the resignation of the CEO is unusual, and I believe this marks an important turning point in the visibility, prioritization, importance, and funding of information security. It’s an indication of just how much:

  • Security directly affects the top and bottom line. Early estimates of the cost of Target's 2013 holiday security breach indicate a potential customer churn of 1% to 5%, representing anywhere from $30 million to $150 million in lost net income. Target's stock fell 11% after it disclosed the breach in mid-December, but investors pushed shares up nearly 7% on the news of recovering sales. In February 2014, the company reported a 46% decline in profits due to the security breach.
     
  • Poor security will tank your reputation. The last thing Target needed was to be a permanent fixture of the 24-hour news cycle during the holiday season. Sure, like other breached companies, Target’s reputation will likely bounce back but it will take a lot of communication, investment, and other efforts to regain customer trust. The company announced last week that it will spend $100 million to adopt chip-and-PIN technology.
     
Read more

Winners Of The 2014 Groundswell Awards (Business-To-Employee Division)

Philipp Karcher
For the past seven years Forrester’s Groundswell Awards have recognized the most innovative social and collaboration programs with a measurable business impact. This year in the business-to-employee (B2E) division we gave out awards in two categories:
 
  • Employee Collaboration. This category recognizes programs that help employees work better together.
  • Employee Empowerment. This category recognizes programs that help employees better serve customers. 
Read more

Is Red Hat Storage The Future Of Software Storage?

Henry Baltazar

With last week's $175M acquisition of storage startup Inktank, the initial developer of the Open Source Ceph storage platform, Red Hat has added another piece to its growing storage portfolio. With large storage players fleshing out their software storage offerings including EMC (ScaleIO, Project Nile), NetApp, HP, and IBM, it's clear that the transition from hardware-centric storage appliances to software storage is underway — and it won't be long before we are at a point where your next array should be an app running on commodity hardware.

Though large storage players have successfully fended off software challengers such as Symantec before, it is telling that nearly all of the major players are developing and marketing their own software storage products, including EMC’s ScaleIO. The drive toward software storage is clearly gaining momentum, and this time around the storage leaders are active participants in addition to startups such as Nexenta Systems and the Open Source projects.

While Red Hat is not a major storage player today, there are a few reasons why this company could become disruptive as the market transitions to software storage:

  • No legacy business to lose. This is probably the most powerful attribute that makes Red Hat dangerous relative to existing storage players. While Red Hat’s market share (in terms of storage revenue and paying customers) is nowhere near the likes of leaders such as NetApp and EMC, its lack of legacy business will allow Red Hat to attack the NAS, object, and block storage market without the sacrifice of losing high-margin storage appliance sales.  
Read more

Tibco Buys Jaspersoft: A Deal With Transformative Potential

Martha Bennett

Since Tibco acquired Jaspersoft on April 28th, 2014, I keep being asked the question: “Will this deal change the BI and analytics landscape?” (If you missed the announcement, here’s the press release.)

The short answer is: it could. The longer answer goes something like this: Jaspersoft and Tibco Spotfire complement each other nicely; Jaspersoft brings ETL and embedded BI to the table, whereas Spotfire has superior data analysis, discovery, and visualization capabilities. Jaspersoft’s open source business model provides Tibco with a different path to market, and Jaspersoft can benefit from Tibco’s corporate relationships and sales infrastructure. And with its utility-based cloud service, Jaspersoft also adds another option to Spotfire’s SaaS BI offering.    

But that’s only the narrow view: once you take into consideration Tibco’s history (the hint’s in the name - “The Information Bus Company”) and the more recent string of acquisitions, a much larger potential story emerges. Starting with Spotfire in 2007, Tibco has assembled a powerful set of capabilities, including (but not limited to) analytics, data management, event processing, and related technologies such as customer loyalty management and mapping. If Tibco manages to leverage all of its assets in a way that provides enterprises with a flexible and agile integrated platform that helps them turn their data into actionable information, it will be a powerful new force that has the potential of changing enterprise BI platforms market.

To get there, Tibco has a number of challenges to address. On a tactical basis, it’s all about making the Jaspersoft acquisition work:

  • Retaining the talent
  • Making it easy for clients and prospects to engage with both companies
Read more

China’s Cloud Collaboration Market Enters A New Age

Frank Liu

Microsoft’s cloud-based productivity suite, Office 365, is now generally available in China through a partnership with 21Vianet, China’s largest carrier-neutral Internet data center service provider. This announcement follows the recent launches of Microsoft Azure and SQL Server 2014.

The public cloud market in China will grow from $297 million in 2011 to $3.8 billion in 2020. The three segments of the virtual private cloud market will grow from $44 million in 2011 to $1.6 billion in 2020. More and more Chinese customers use cloud collaboration SaaS or plan to do so, expecting it to revolutionize their business. What should I&O pros and CIOs in China know about Office 365?

  • Local teams ensure timely responses. 21Vianet has 300 engineers to provide hardware and software service and support for Microsoft Azure and Office 365. For emerging technologies, large Chinese organizations and government agencies like to have local engineers available to quickly solve their problems rather than using a service hotline or remote support.
  • Chinese customers can choose the services they want.Companies and government agencies wishing to purchase Office 365 have a range of tiered pricing options with different functionality, including only buying one Office 365 service — say, SharePoint, Exchange Online, or Lync. As Chinese organizations normally run collaboration applications on-premises, they won’t give up legacy infrastructure, preferring to test public cloud services on a small scale first. For example, TCL uses on-premises email and Office software, so it’s only buying Lync and SharePoint services to improve efficiency instead of completely migrating to a public platform.   
Read more

Sorry, Kids: APIs Have Not And Will Not Kill SOA

Randy Heffner

As I move about the industry talking about APIs (application programming interfaces) and the API economy — which hold important and transformative business opportunities — I’m frequently confronted with disparaging remarks about SOA (service-oriented architecture), as if it’s passé, gone, finito. It’s often in the way of (uninformed) assumptions about SOA. I hear things like, “SOA failed because it was too difficult” or “People do REST APIs now, they don’t do SOA” or other such bunk.

I’ll be the first to extol the importance and benefits of APIs, but the tales of SOA’s failure and demise are simply wrong (I really do like APIs; see this report). I had a powerful reminder of all this while attending IBM’s IMPACT conference this week. First off, I arrived late to one customer’s plain-vanilla “this is our enterprise SOA journey” session only to be refused entry because the room was over capacity. Glancing over the conference program, there were at least eight such sessions representing four continents and at least five vertical industries. I attended five of them and also had lunch with another SOA leader. The stories could all be summarized by the following plot line:

  • We saw the value in SOA. Whether the need was multichannel customer engagement, faster time-to-market, retiring legacy, getting past complex and costly point-to-point integration, dealing with duplicate applications, or some other business-technology problem, a core team recognized that SOA could make things better.
Read more

HP Hooks Up With Foxcon for Volume Servers

Richard Fichera

Yesterday HP announced that it will be entering into a “non-equity joint venture” (think big strategic contract of some kind with a lot of details still in flight) to address the large-scale web services providers. Under the agreement, Foxcon will design and manufacture and HP will be the primary sales channel for new servers targeted at hyper scale web service providers. The new servers will be branded HP but will not be part of the current ProLiant line of enterprise servers, and HP will deliver additional services along with hardware sales.

Why?

The motivation is simple underneath all the rhetoric. HP has been hard-pressed to make decent margins selling high-volume low-cost and no-frills servers to web service providers, and has been increasingly pressured by low-cost providers. Add to that the issue of customization, which these high-volume customers can easily get from smaller and more agile Asian ODMs and you have a strategic problem. Having worked at HP for four years I can testify to the fact that HP, a company maniacal about quality but encumbered with an effective but rigid set of processes around bringing new products to market, has difficulty rapidly turning around a custom design, and has a cost structure that makes it difficult to profitably compete for deals with margins that are probably in the mid-teens.

Enter the Hon Hai Precision Industry Co, more commonly known as Foxcon. A longtime HP partner and widely acknowledged as one of the most efficient and agile manufacturing companies in the world, Foxcon brings to the table the complementary strengths to match HP – agile design, tightly integrated with its manufacturing capabilities.

Who does what?

Read more

Securing Mobile Development: Nontechnical Solutions

Tyler Shields

It takes a lot more than a static analysis tool, a web scanning service, and a few paid hackers to make your mobile development lifecycle, team, and eventually, your applications secure. Finding flaws in an individual mobile application is easy (assuming you have the right technical skill set). What is a lot harder is actually stopping the creation of mobile application security flaws in the first place.

To achieve the lofty goal of a truly secure mobile application development program takes a rethinking of how we have traditionally secured our applications in the past. Mobile development brings many changes to enterprise engineering teams including additional new device sensors, privacy impacting behaviors that cross the security chasm between consumer and enterprise isolation, and even faster release cycles on the order of days instead of months. Smaller teams with little to no experience in security are cranking out mobile applications at a fevered pace. The result is an accumulation of security debt that will eventually be paid by the enterprises and consumers that use these applications.

Read more