A Different Kind Of Complexity Holds Business-IT Alignment Hostage

Alex Cullen

Business-IT alignment is one of those persistent "Top 3" CIO issues. It has been this way just about as long as I’ve been in IT. You would think this would have been solved by now. After all, you put in business-driven IT governance, relationship managers, and some really nice dashboard, and you’ve covered about 90% of the advice out there. I’m going to suggest that business-IT alignment is being held hostage by complexity. Not technology complexity, since business leaders seem to be coming to terms with that. And not the mind-numbing spaghetti charts that show how complex our application and infrastructure landscapes are. They don’t understand these charts, but since we don’t understand them either, we can hardly expect business execs to. The complexity I’m referring to lies between their goals and the "stuff" IT delivers. They don’t see the connection. And since we see business execs having lots of goals, which shift over time, and strategies that also shift, we can’t show the connection. Instead, we say, "This is what you asked for, and this is what we delivered."

Read more

Key Takeaways From Interop Las Vegas 2010 For I&O Professionals

Doug Washburn

This week is Interop Las Vegas 2010, arguably the largest industry conference in North America targeting IT professionals. While the event has its roots in networking, today’s Interop has 13 tracks ranging from cloud computing and virtualization, to mobility and video conferencing, to governance, risk, and compliance. I’ve had the pleasure of chairing the data center and green IT tracks at the last three Interop Las Vegas and New York events.

Don’t have the opportunity to be at Interop in person? Forrester has you covered…

Fellow Forrester analyst, Rachel Dines, and I are onsite at Interop and we will be posting the key takeaways for IT Infrastructure & Operations (I&O) professionals here on Forrester’s I&O blog. We encourage you to check the blog over the next few days for Forrester’s insights on the following data center and green IT sessions:

Read more

Philly Is Underated - The AIIM Show May Be As Well

Craig Le Clair

I'll admit to spending only 3 hours on the show floor.  Most was spent in the cavernous and gloomy AIIM sessions area where I gave an "Analyst Take" session on SharePoint 2010, a talk on Dynamic Case Management, and reviewed suppliers for Document output for Customer Communications. My impression  of the floor activity was an improvement over the last two years. Perhaps contraction of sponsorships had hit the right balance with demand, or perhaps the great spring weather and improving economy were at work, but the mood was upbeat and the crowds were steady. Vendors were grumbling less.  Cloud talk and SaaS were under-represented. E-discovery and records management were in line. And the usual interesting collection of arcane conversion, migration, capture, and other providers - usually in the lower rent districts - continued the tradition. SharePoint was again pervasive. Those that say "that ship has come in" may not be aware of other ports and forms of transportation. One wonders what the future of the show is if the SharePoint sessions are the biggest draw and Microsoft and key partners have the biggest booths.  Philly is a city that has lost its major corporate headquarters and no longer has growth industries - but it does not deserve its reputation.  The AIIM show - with roots in microfilm and paper - is similar - and likewise - is still pretty good.   

Why Will Consumers Pay More (For A Mac)?

JP Gownder

Product strategists struggle with the issue of value all the time: What constitutes a revenue-maximizing price for my product, given the audience I’m targeting, the competition I’m trying to beat, the channel for purchase, and the product’s overall value proposition?

There are tools like conjoint analysis that can help product strategists test price directly via consumer research. However, there’s a bigger strategic question in the background: How can companies create and sustain consistently higher prices than their key competitors over the long term?

The Mac represents a good case study for this business problem. Macs have long earned a premium over comparable Windows PCs. Though prices for Macs have come down over time, they remain relatively more expensive, on average, than Windows-based PCs. In fact, they’ve successfully cornered the market on higher-end PCs: According to companies that track the supply side, perhaps 90% of PCs that sold for over $1,000 in Q4, 2009 were Macs.

Macs share common characteristics with Windows PCs on the hardware front – ever since Apple switched to Intel processors about four years ago, they’ve had comparable physical elements. But the relative pricing for Macs has remained advantageous to Apple. At the same time, the Mac has gained market share and is bringing new consumers into the Mac family – for example, about half of consumers who bought their Mac in an Apple Store in Q1, 2010 were new to the Mac platform. So Apple is doing something right here – providing value to consumers to make them willing to pay more.

Read more

Not all BI self service capabilities are created equal

Boris Evelson

By Boris Evelson

There’s a lot of hype out there by many vendors who claim that they have tools and technologies to enable BI end user self service. Do they? When you analyze whether your BI vendor can support end user self service, consider the following types of “self service” and related BI tool requirements:

#1. Self service for average, casual users.

  • What do these users need to do?
    • Run and lightly customize canned reports and dashboards
    • Run ad hoc queries
    • Add calculated measures
    • Collaborate
    • Fulfill their BI requirements with little or no training (typically one needs search-like, not point-and-click UI for this)
  • What capabilities do they need for this?
    • Report and dashboard templates
    • Customizable prompts, sorts, filters, and ranks
    • Report, query, dashboard building wizards
    • Portal
    • Semantic layer (not all BI vendor have a rich semantic layer)
    • Prompting for columns (not all BI vendors let you do that)
    • Drill anywhere  (only BI vendors with ROLAP and multisourcing / data federation provide this capability)

#2. Self service for advanced, power users

  • What do these users need to do?
    • Perform what-if scenarios (this often requires write back, which very few BI vendors allow)
    • Add metrics, measures, and hierarchies not supported by the underlying data model (typically one needs some kind of in-memory analytics capability for this)
    • Explore based on new (not previously defined) entity relationships (typically one needs some kind of in-memory analytics capability for this)
    • Not knowing exactly what one is looking for (typically one needs search-like UI for this)
Read more

How Are Leading Technology Service Providers Bringing Innovation To Clients?

Christopher Andrews

Over the past few months, I had the opportunity to interview representatives from 10 leading technology service providers about how they help their clients innovate.  My recent research summarizing those interviews is available to Forrester clients on our website. For those interested in the high level points I raised, here are a few of the key findings:

Read more

Categories:

Dialoging About Tokenization And Transaction Encryption

John Kindervag

Last week I published two research reports on the hottest topic in PCI: Tokenization and Transaction Encryption. Part 1 was an introduction into the topic and Part 2 provided some action items for companies to consider during their evolution of these technologies. Respected security blogger, Martin McKeay, commented on Part 1. Serendipitously, Martin was also in Dallas (where I live) last week and we got an opportunity to chat in person about the report and other security topics.

Martin’s post highlighted several issues that deserve some response. He felt that I, “glossed over several important points people who are considering either technology need to be aware of.” Let me review those items:

Comment: “This is one form of tokenization, but it completely ignores another form of tokenization that’s been on the rise for several years; internal tokenization by the merchant with a (hopefully) highly secure database that acts as a central repository for the merchant’s cardholder data, while the remainder of the card flow stays the same as it is now.”

Read more

Categories:

Where in the world?

Jennifer Belissent, Ph.D.

Calling all tech industry marketing and strategy professionals!  We need some help with our current research on market opportunity assessement. 

"Where in the world are you?  And, how'd you get there?"

Strategists in the tech industry face a continuous stream of critical decisions in today’s complex global market. One of those is “where in the world?”  One the one hand, globalization expands the options available, making it “easier” to enter new markets.  However, those decisions aren’t always themselves easy.  To better understand how strategists are undertaking the tasks of identifying, evaluating and prioritizing technology market opportunities in new geographies, we have launched a short survey.  The survey questions include background on market presence and intended entry, data sources and factors that influence these decisions, stakeholders' involvement, and the process itself. This is where we need your help. If you are part of a team or team leader for strategic planning in global markets, we’re interested in your input.  The data gathered will be used for an upcoming report – Where in the World? Tech vendor strategists weigh opportunities (and risks) of expansion (working title). The report will also use public data and research interviews (where we'd also like your help).

Click here to take the survey

The survey should take no more than 15 minutes and participants who complete the survey will receive a complimentary copy of the completed report. Terms and conditions (the fine print): As always, we keep your individual responses confidential. 

Read more

IT Is Industrializing – What Does That Mean To Me?

Glenn O'Donnell

 

Like many movements before it, IT is rapidly evolving to an industrial model. A process or profession becomes industrialized when it matures from an art form to a widespread, repeatable function with predictable result and accelerated by technology to achieve far higher levels of productivity. Results must be deterministic (trustworthy) and execution must be fast and nimble, two related but different qualities. Customer satisfaction need not be addressed directly because reliability and speed result in lower costs and higher satisfaction.

IT should learn from agriculture and manufacturing, which have perfected industrialization. In agriculture, productivity is orders of magnitude better. Genetic engineering made crops resistant to pests and environmental extremes such as droughts while simultaneously improving consistency. The industrialized evolution of farming means we can feed an expanding population with fewer farmers. It has benefits in nearly every facet of agricultural production.

Manufacturing process improvements like the assembly line and just-in-time manufacturing combined with automation and statistical quality control to ensure that we can make products faster and more consistently, at a lower cost. Most of the products we use could not exist without an industrialized model.

Read more

2010: The Year That Security Finally Gets One Step Ahead?

Stephanie Balaouras

This is my first post as the new Research Director for the Security and Risk team here at Forrester. During my first quarter as RD, I spent a lot of time listening to our clients and working with the analysts and researchers on my team to create a research agenda for the rest of the year that will help our clients tackle their toughest challenges. It was a busy Q1 for the team. We hosted our Security Forum in London, fielded more than 443 end client inquiries, completed more than 18 research reports, and delivered numerous custom consulting engagements.

In the first quarter of 2010, clients were still struggling with the security ramifications of increased outsourcing, cloud computing, consumer devices and social networking. Trends have created a shift in data and device ownership that is usurping traditional IT control and eroding traditional security controls and protections.

We’re still dealing with this shift in 2010 — there’s no easy fix. This year there is a realization that the only way that the Security Organization can stay one step ahead of whatever business or technology shift happens next is to transform itself from a silo of technical expertise that is reactive and operationally focused to one that is focused on proactive information risk management. This requires a reexamination of the security program itself (strategy, policy, roles, skills, success metrics, etc.), its security processes, and its security architecture. In short, taking a step back and looking at the big picture before evaluating and deploying the next point protection product. Not surprisingly, our five most read docs since January 1, 2010 to today are having less to do with specific security technologies:

Read more