Recently, I published a report about a small software-as-a-service (SaaS) vendor, Dimdim, which is having success in the crowded Web conferencing market. Like many small vendors, Dimdim provides a free service tier, generously allowing up to 20 participants into the free meeting, to help drum up business. The report, though, did not simply highlight the number of users that Dimdim has captured in four short years of existence -- over 5 million -- but also its success in attracting partners like Intuit, Novell and Nortel CVAS. Why? For new vendors entering crowded markets, attracting partners is vital for two reasons:
Partners open doors to new markets. In crowded markets, incumbent vendors and new entrants jostle to serve customer needs. For the new entrants, the customers that can be wrangled through media hype and analyst buzz is minimal. Mass appeal comes from firms with strong working relationships with a range of buyers in a number of markets -- e.g., oil & gas, healthcare, government -- embracing a small vendor's offering and introducing it to their clients.
Yesterday, I participated in one of the regular content planning sessions for us analysts on Forrester’s IT Infrastructure & Operation’s Research team. Similar to investment managers and their portfolio of stocks or bonds, we spent time making buy/hold/sell decisions on what we will research more, continue to research, or stop researching. Among the many criteria we use to make these decisions, like client readership, inquiries, or consulting, the strategic relevancy to IT is an important factor to consider. And there was some heated debate around research themes we may phase out down the road…
Enter the discussion on IT asset disposition – or the process of reselling, donating, or recycling end-of-life IT equipment. While every organization eventually has to dispose of its end-of-life IT equipment, it’s long been an afterthought. And the data backs this up. Forrester finds that 80% of organizations globally use their OEM, third parties or a combination of the two for IT asset disposition. But when asked how important IT asset disposition is relative to other IT asset management processes, it’s far and away the least important. As an indicator of this, I recently surveyed over 300 European IT professionals where 77% of respondents ranked IT asset disposition “less important” or “least important.”
This begs the question, is disposing of end-of-life IT equipment really strategic?
Historically, the positioning of Dell versus its two major competitors for high-value enterprise business, particularly where it involved complex services and the ability to deliver deeply integrated infrastructure and management stacks, has been as sort of an also ran. Competitors looked at Dell as a price spoiler and a channel for standard storage and networking offerings from its partners, not as a potential threat to the high-ground of being able to deliver complex integrated infrastructure solutions.
This comforting image of Dell as being a glorified box pusher appears to be coming to an end. When my colleague Andrew Reichman recently wrote about Dell’s attempted acquisition of 3Par, it made me take another look at Dell’s recent pattern of investments and the series of announcements they have made around delivering integrated infrastructure with a message and solution offering that looks like it is aimed squarely at HP and IBM's Virtual Fabric.
The Washington Post is reporting a new wrinkle in cyberwarfare. In the article Defense official discloses cyberattack, the Post reports that “malicious code placed on the [flash] drive by a foreign intelligence agency uploaded itself onto a network run by the U.S. military's Central Command.” Perhaps SkyNet has become self-aware, as this malware appears to be able to “upload” itself onto a military network. We ARE nearing August 29th…
According to Deputy Defense Secretary William J. Lynn III, "It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary." This must be one awesome piece of code – sentient, silent, and “poised.”
One of my favorite things to do here at Forrester is judge the Groundswell Awards. Started by Josh Bernoff as a way to drive increasingly practical discussion regarding the real benefits that derive from exploiting social media, judging these Awards is among the most collaborative things we do within Forrester's research community. Moreover, as we compare submissions across years, the Awards give us a chance to ask, "How is the state of the art changing in the world of social media?" Finally, each and every submission becomes a case that we can use over and over as we help clients navigate the turbulent waters of the social sphere. Very cool stuff.
Imagine the Forrester analysts that help role clients with social media -- Josh et al. -- sitting around a virtual table discussing the details of each individual submission. We consider all the POST attributes -- people, objective, strategy, and tools/tactics -- highlighting what's innovative, what's working, and what's generating returns. It reminds me a bit of being a kid and getting the Sears Catalog in the mail at the beginning of the holiday season. For those that weren't around before Lindsay Lohan was born, the Sears Catalog was the compendium of every toy, sporting good item, musical instrument, etc., that could possibly emerge from that big box from Grandma. Like me with my siblings, we analysts metaphorically sit on the sofa with the Groundswell Award submissions in our laps, pointing at the examples that we think are most cool and worthy. I say "like," of course, because I haven't yet found myself bouncing off the walls, screaming gibberish, like I did when I first saw the red bicycle I got when I was nine years old.
I’m in the process of buying a new car, and I’m trying to apply everything I’ve learned from my research into software negotiation towards getting a good deal. I’m noticing many of the irritating behaviors from the dealers’ sales staff that Forrester’s sourcing and vendor management clients encounter regularly from their software reps. Here is my list of the worst ones, but I’d love to hear other people’s suggestions:
Having temporarily relocated to Eastern France – far from Paris and closer to Switzerland and Italy – I recently had the pleasure of experiencing my closest Cisco TelePresence site in Rolle, Switzerland, on the north shore of Lake Geneva for a discussion with Paul Mountford, President of Cisco’s Emerging Markets Theatre. Cisco’s Emerging Market’s strategy has focused on what they call “country transformation,” which revolves primarily around increasing the penetration of broadband. For FY11, Cisco will shift the message from country-wide transformation to something that rings closer to home (literally and figurative) with talk of “life-changing” stories through “life-changing” networks. While still a little lofty, the message resonates deeper than country transformation, which speaks primarily, if not exclusively, to high-level government officials. More a topic for Davos than for a boardroom or a living room.
Despite the lack of a sustained full-on recovery in the global economy, one gets the feeling that we're at the beginning of a period of tech expansion and growth, doesn't one? For many, 2011 budgeting planning is happening now, so it remains to be seen what yourexpansion and growth will be in the near term, but there's certainly no shortage of interesting new developments from technology vendors to whet your appetite.
While it's fun to look at emerging tech and imagine what impact it might have several years from now, it's a bit more pragmatic to focus on the technology trends that will be hitting the mainstream and making significant waves in the corporate world and in the public sector in the next few years.
In Q4 of last year Forrester published The Top 15 Technology Trends EA Should Watch. The author, analyst Alex Cullen, spoke with a few dozen analysts for input and then applied strict criteria for inclusion of a particular tech trend in the doc: 1) significant business or IT impact in the next 3 years; 2) newness, with implications not only for new business capabilities but also for the organization's understanding of the technology and how to manage it; and 3) complexity, especially regarding cross-functional impact to the organization.
Events are, and have been for quite some time, the fundamental elements of IT infrastructure real-time monitoring. Any status changed, threshold crossed in device usage, or step performed in a process generates an event that needs to be reported, analyzed, and acted upon by IT operations.
Historically, the lower layers of IT infrastructure (i.e., network components and hardware platforms) have been regarded as the most prone to hardware and software failures and have therefore been the object of all attention and of most management software investments. In reality, today’s failures are much more likely to be coming from the application and the management of platform and application updates than from the hardware platforms. The increased infrastructure complexity has resulted in a multiplication of events reported on IT management consoles.
Over the years, several solutions have been developed to extract the truth from the clutter of event messages. Network management pioneered solutions such as rule engines and codebook. The idea was to determine, among a group of related events, the original straw that broke the camel’s back. We then moved on to more sophisticated statistical and pattern analysis: Using historical data we could determine what was normal at any given time for a group of parameters. This not only reduces the number of events, it eliminates false alerts and provides a predictive analysis based on parameters’ value evolution in time.
The next step, which has been used in industrial process control and in business activities and is now finding its way into IT management solutions, is complex event processing (CEP).
Over the past decade, BPM suites promised to put the business in the driver’s seat for delivering process improvement to the enterprise. However, most of these promises fell flat, relegating the business to participate as backseat drivers directing IT on how best to steer process improvement.
In the latest update to our BPM suites Forrester Wave report, Forrester evaluated 11 leading vendors against 148 product feature, platform, and market presence criteria. The Forrester Wave provided a head-to-head comparison of which BPM suites best support the needs of comprehensive process improvement programs that demand tight collaboration and coordination across business and IT stakeholders. Here's a sneak peek at the findings from our new report, "The Forrester Wave: Business Process Management Suites, Q3 2010".
Time-to-value and fit-to-purpose are top priorities. Process professionals are searching for ways to trim the fat from bloated BPM initiatives and constantly ask about tools and best practices for making BPM leaner and meaner. Leading vendors — like Pega and Appian — are responding to the need for leaner and more fit-to-purpose BPM suites by providing targeted solution frameworks, embedding agile project management features, and delivering highly customizable end user work environments.