More Prognostications for 2010

John Kindervag

Several of my Forrester colleagues have already weighed in with their 5_carsoninsightful 2010 predictions. I recently chatted with Shamus McGillicuddy at TechTarget where I shared my thoughts on the upcoming year. You can read the article here.  

2010 is going to be an interesting year with economic concerns impacting the security business. I suspect that businesses will need to regroup and think about their security spend again next year. Companies will probably remain gun-shy and hold budgets close to their vests. This could set up a shootout between increasing security threats and the desire to continue to control costs. Who will win? Your thoughts?

Happy Holidays y'all and here's wishing you a Secure New Year!

When is enterprise mobility not really ENTERPRISE mobility? (hint - most of the time!)

Tim Sheedy

We often hear about how important enterprise mobility is to businesses. For years ICT events companies have been holding events about "enterprise mobility" and "the future of wireless" etc - and they have filled halls with attendees and sponsors/exhibitors.

But really - is mobility really that important to businesses? Weren't the people with "mobile" in their title the first to go when the global financial crisis hit? And point me to more than a handful of businesses whose business relies on their mobility capabilities.

Read more

Can Social Media Penetrate The Exec Suite?

Nigel Fenwick

Almost every day I hear people suggest that social media is at best only valuable as a marketing tool. There are people who believe that social media has no reach beyond a few "geeks" sitting at their computers all day. What these naysayers focus on is the technology and not the people connections. I believe it is the people connections that drive social media and it is the value of these connections that will continue to change the way we work and communicate.

With your help, I'm looking to measure the potential social media to connect people worldwide, even those senior executives and naysayers who are not already using social media. Here's how:

Three Simple Steps

We've built a very short survey on social media's value in business – nothing new here – but here's the twist: We're using social media as the vehicle, and social media evangelists (you) as the fuel, to get the survey into the hands of as many people as possible who are not yet using social media.

Here are three easy and quick steps to becoming a social media evangelist for this research: (Links removed as survey closed)

When you participate, you can request you own summary of the results when they are published, and by sharing the survey, you can also take a share of the credit in demonstrating the power of social media to connect people.

What Does The Survey Measure?

The survey will provide insight into the following:

  • The reach of social media through social connections;
  • The awareness of social media policies in the workplace
  • The level of usage of social media in the workplace
  • The perception of social media's value in business
Read more

Crafting your technology strategy for business impact

Alex Cullen

That your technology strategy should be driven by business is a truism. We all know this -  architecture, strategy and IT overall should be driven by business needs, strategies and outcomes.

Read more

IBM's CIO study reveals where you should focus your IT leadership efforts

Tim Sheedy

In September this year (2009) I was invited to New York City by IBM to preview their soon to be released CIO study. Very soon after my return home I wrote up an insightful, relevant, and actionable blog post on what I learned at the event. Of course you are going to have to take my word on this, as for some reason I can't find it... It has disappeared into the ether (perhaps I didn't hit the "Save" button at the bottom of the page?). So, despite that fact that the study was released three months ago, I am going to redo my analysis of the study - although now that some local (Australian & Indian - sorry rest of Asia Pacific!) results have been released there is some more relevant information available.

Read more

The Story of the Risk Manager’s Increasing Value Continues...

Chris McClean

A few months ago I wrote about the rising visibility and responsibility of risk management professionals, linking to articles about the growing demand for risk training and talent. Along that train of thought, I was just able to get to this month’s edition of Risk Management, which along with a great photographic review of the last year in risk management, has an article outlining the progress the profession has made over the last decade. It’s interesting to think that 10 years ago risk management was a much smaller discipline focused on relatively narrow problems like the Y2K software flaw. Things have changed a lot.

Case in point, the SEC announced this week the approval of new rules that will, among other things, require companies to disclose the relationship between their compensation policies and risk management, as well as describe the board of directors’ role in risk oversight.

Understanding what compensation policies have a material impact on an organization’s risk and developing policies for board-level oversight of risk will require guidance from internal and/or external risk experts... good news for any risk experts who appreciate gainful employment. And of course, many additional regulations and SEC rules expected to come together early next year are also likely to continue this trend.

Read more

Hacking the In-Human Drone

John Kindervag

A while back, I blogged on how researchers have developed tools to intercept streaming video from video conferencing systems and IP surveillance cameras. Today I feel so prescient with the Wall Street Journal's article on how Iraqi insurgents are using similar software to intercept the video feed of Predator Drones.

030813-F-8888W-006

The article has the catchy subtitle "$26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected." It discusses how the insurgents are using the software to intercept the Drone's unencrypted video stream, "potentially providing them with information they need to evade or monitor U.S. military operations."

According to the article, the military has been aware that this type of attack was posssible for some time: "The potential drone vulnerability lies in an unencrypted downlink between the unmanned craft and ground control. The U.S. government has known about the flaw since the U.S. campaign in Bosnia in the 1990s, current and former officials said. But the Pentagon assumed local adversaries wouldn't know how to exploit it, the officials said."

Let's hope that the Pentagon has learned what happens when you ass-u-me things...

Categories:

Did IBM Buy Lombardi To Raise Their Profile With The Business?

Clay Richardson

 

New_photo by Clay Richardson

For many, IBM's announcement to acquire Lombardi came as a little pre-Christmas surprise. Over the past 24 hours, I've heard several arguments for and against this deal being a game changer.  Ultimately, if you look at this deal strictly as a software acquisition, then it presents many potential problems and hurdles for both IBM and Lombardi:

  • IBM's BPM portfolio is already confusing to customers, with customers and prospects struggling to reconcile whether they should buy Websphere Process Server or FileNet P8 (not to mention the peripheral workflow capabilities provided by Lotus).  From a software perspective, this acquisition makes IBM's BPM maze even more intimidating to navigate.

Read more

Categories:

When is enterprise mobility not really ENTERPRISE mobility? (hint - most of the time!)

Tim Sheedy

We often hear about how important enterprise mobility is to businesses. For years ICT events companies have been holding events about "enterprise mobility" and "the future of wireless" etc - and they have filled halls with attendees and sponsors/exhibitors.
 

Read more

Podcast: Social Media Transforms Customer Service

Our latest featured podcast is Natalie Petouhoff's "Social Media Transforms Customer Service".

In this podcast, BP&A Senior Analyst Natalie Petouhoff reveals why it is important for customer service professionals to incorporate social media into the customer experience, and the impact of social media on customer service.a greater SOA focus.

 

 

 

 

 

We look forward to your questions and comments.

 

---

Subscribe to Business Process & Applications podcasts through iTunes.

Subscribe through RSS.