TotalCIO


June 29, 2015  8:37 PM

Will Generation M usher in wearables in the workplace?

Fran Sales Fran Sales Profile: Fran Sales
CIO, Mobile, mobile application management, mobile device management, Wearable devices

In part one of this blog post, Gartner analyst and mobile expert Ken Dulaney discussed why the label Generation Mobile is unnecessary and whether he believes U.S. mobile workers indeed feel guilty for mixing work and personal activities. Read part two to get his opinion on wearables in the workplace and whether the emergence of Gen M calls for new mobility-focused policies.

One of the major findings from a study conducted by mobile security provider MobileIron, which surveyed 3,500 full- and part-time professionals across six countries (including the U.S.), is that there is a new sub-demographic of mobile workers the company is calling Generation Mobile (Gen M) — a group that’s increasingly reliant on mobile for both work and play, and made up of men ages 18 to 24 and parents of children ages 18 and under.

Another interesting finding the report highlighted: A good chunk of Gen M (42%) plan to or already own a wearable device such as an Apple Watch; furthermore, 95% of that group plan to use wearables for work tasks, which include taking phone calls (58%), reading and writing emails (56% and 45%, respectively), and getting alerts such as meeting reminders (44%).

Dulaney thinks that wearables, like mobile devices, have the potential to further expand mobile workers’ connectedness. However, for wearables to gain traction in the workplace, wearable device manufacturers must overcome the current inconvenience of these devices needing to be tethered to smartphones so they can function independently through communications networks.

Source: Wikimedia

“Once we see medical [wearable] devices that communicate directly with medical services, we will see results,” he wrote in an email.

The MobileIron study also found that the rise of the Gen M demographic, many of whom reported feeling guilty when doing personal activities during work hours and vice versa, requires companies to create new policies that support Gen M’s new work style “without guilt and with high standards of quality and fairness.”

The study offered the following principles on which to base Gen M-catered policies:

  • Accept shifting working styles and understand employees’ actions in detail
  • Establish clear goals with employees
  • Set top-down boundaries (e.g., CEO should set an example by not sending work emails at 2 a.m.)
  • Offer reimbursement stipends for personal mobile technology
  • Secure data selectively

While he didn’t exactly disagree with these policies (in part one, he urged companies to embrace BYOA to promote employee satisfaction and innovation), Dulaney warned about the legal problems that could arise from offering stipends for personal devices (although he granted reimbursing for phone services and plans is OK).

“If the phone is owned partially by the employer and the employee gets in trouble on the weekend using that phone, then it’s the employer who gets sued,” he said. He compared the situation to companies paying employees for mileage traveled, but not for the vehicles themselves.

June 29, 2015  8:30 PM

Generation Mobile: A new breed of workers or unnecessary label?

Fran Sales Fran Sales Profile: Fran Sales
CIO, Mobile, mobile application management, Mobile Device Policy

Perhaps more than how seemingly clueless they are toward politics and economics, Millennials are often characterized by how much they live on their smartphones. What’s more, a growing number of Millennials and the general population are increasingly mixing work and play on smartphones and other mobile devices — at a rate that’s, arguably, enough to warrant shining the spotlight on them as a new, emerging demographic, called Generation Mobile, or Generation M.

MobileIron, a mobile device management provider, surveyed 3,400 full- and part-time professionals in six countries, including the U.S., who use a mobile device for work, and discovered that the group it calls Generation M is best represented by men ages 18 to 34 and people with children ages 18 and under in their households. The study found that this demographic is more reliant on mobile technology in general to mix their work and personal activities: For example, 60% of Gen M check or send personal emails at least once a day during work hours, and 51% check or send work emails at least once a day during personal hours.

smartphone, mobile device, mobile

Source: Wikimedia

The study further found that 42% of Gen M plan to either own or buy a wearable device such as the Apple Watch, and the overwhelming majority of that group (95%) plan to use it for work as well as personal tasks.

Why is it so important to home in on Gen M’s mobile habits, and more particularly their attitude toward wearables? Because, said Bob Tinker, MobileIron’s CEO, the new devices “will increase our connectedness and, possibly, our guilt about mixing our work and personal lives.” The MobileIron survey found that 58% of Gen M workers suffer from “mobile guilt” when receiving personal messages during work hours (compared with 46% of non-Gen M workers); moreover, 61% of Gen M workers feel guilty when receiving work communication during personal hours (compared with 47% of non-Gen M workers).

But one mobile expert, Ken Dulaney, begs to differ — first on whether the label Generation M itself is necessary.

Dulaney, an analyst at Gartner, said it’s hard to argue the obvious – Millennials are already a mobile generation. “Sure, they are mobile. … Many of them were given phones at age 7 or so,” he wrote in an email. But, he added, this group also has varying tastes when it comes to art, fashion, music, movies and more — just like any generation before the Millennials. “Aligning them with one aspect of culture doesn’t mean that much to me,” he said. “You could just as easily brand them the ‘Old Navy generation.'”

Second, Dulaney said it’s hardly surprising that a large proportion of Gen M uses their devices for work. “We bring who we are to work,” he said. What is noteworthy about consumerization in the enterprise, he added, is how unprepared the IT department was and how “it took them a number of years” to accommodate both enterprise and consumer needs. “Hopefully, future changes won’t be so cathartic,” he said.

How about the guilt MobileIron measured among mobile workers?

Not a thing, at least not in the U.S., according to Dulaney.

“Maybe it’s a European thing, but I don’t see many guilty employees, and use of personal technology does nothing but increase,” he said.

Instead, he said that what enterprises should focus on is how to embrace the bring your own apps phenomenon so that employees remain satisfied and motivated.

Check out part two of this blog post to get Dulaney’s take on wearables in the workplace.


June 26, 2015  9:05 PM

The value of experimentation and how CIOs could benefit

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

CIOs are, by now, familiar with the phrase “fail fast.” It’s the idea that experimentation and getting new products to market quickly can expose flaws and weaknesses (and sometimes all around duds) without all the heavy lifting — and heavy investing. Rather than having to anticipate and fix every possible flaw –a potentially costly process — you let the customer of the product or service tell you what’s wrong.

While failing fast sounds great in theory, how can CIOs build an IT culture that celebrates experimentation when they’re often tasked with figuring out how to spend less and be more efficient with what they have? Is it even worth it? So I’ve been asking experts like Mary “Missy” Cummings, director at the Humans and Autonomy Lab at Duke University, to provide examples of how experimentation works for them and what they get out of it.

Cummings, who was one of the Navy’s first female fighter pilots, is a researcher and scientist by training, and so the test-and-learn cycle is practically second nature for her. Still, as someone well versed in experimental testing, the results (and the lessons learned based on those results) sometimes surprise even her: expert assumptions are often proved wrong. I spoke with here at the recent MIT Sloan CIO Symposium. Here’s what she told me about the value of experimentation.

Mary “Missy” Cummings: There was a case once where we had single operator control of multiple air and ground unmanned vehicles [also known as drones]. We were watching [the operators] interact with the system and we thought it was a high workload study because we were giving people more and more tasks to do. But it turns out that people are far more capable than we gave them credit for in terms of being able to handle high workloads.

At the same time, we were testing low workloads. We thought that if we slowed things down, people would take a break and they would slow their pace of activity. What we found was that, because of this inherent need for brain stimulation, the lower workload ended up driving people to frenetic activity, and they had substantially worse performance. These were a younger generation of people. They felt they had to get in there and do more work and, thus, caused a lot more problems in the system.

These kinds of results are really important for people to realize that humans have an incredible predictability in unpredictability. It’s important to get that testing in early so that you understand what issues you’re going run up against with your new technology.


May 29, 2015  7:11 PM

Predicting subscriber churn at The New York Times

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

Is Christine Hung, the head of data science and engineering at The New York Times Co., stealing a page from the telecommunications playbook? At the recent CDO Summit in New York City, Hung explained how she’s trying to predict subscriber churn by building predictive models.

Hung, who joined The Times in 2013 after a four-year stint as the global analytics manager of iTunes retail at Apple Inc., is analyzing data The Times has collected, such as a reader’s web browsing history or mobile application usage. “We build a model to predict who is going to cancel their subscription,” she said during a panel discussion.

It’s an example of a predictive analytics application that yields concrete business results. Like any media company, The Times has two revenue streams: advertisements and subscriptions. “If you think about the subscription business,” Hung said, “it’s very hard for us to acquire new customers.” So why not invest more time and energy in keeping the subscribers The Times already has?

The analytics experiment is helping The Times uncover key insights. Hung discovered that readers of general news are much more likely to churn than those who use The Times more extensively. “If you go deeper into the content — if you read a lot of op-eds, if you read a lot of style or travel — you’re more likely to be retained,” Hung said.

That is the kind of insight that helps create more nuanced strategy: Rather than focus on why subscribers leave, The Times can work on how to push general news readers deeper into the product “so that they can really see our value,” Hung said.

Digiart2001|jason.kuffer available under Creative Commons

Digiart2001|jason.kuffer available under Creative Commons


May 28, 2015  12:54 AM

What will the cybersecurity battlefield look like in 10 years? Experts weigh in

Fran Sales Fran Sales Profile: Fran Sales
Chief Security Officer, CIO, cyberdefense, cybersecurity, MIT, Security breaches

At MIT Sloan CIO Symposium, cybersecurity experts painted a grim picture of the state of cybersecurity today. As positive as the speed of technology change is for the next Ubers and Netflixes of the world, cybercriminals are moving even faster to use advanced technology for their own nefarious purposes.

Changes must be made, even in organizations that think they’ve got everything covered from a security perspective, the experts said. I detailed their advice on how to start making those changes in my Searchlight column, “MIT CIO Symposium: Outdated security assumptions put companies at risk.”

The  cybersecurity session ended with a forecast of what these experts thought the security landscape will look like in 10 years. Their reactions covered the spectrum.

“It’s gonna get much much worse before it gets better … now with virtual currency coming online, Bitcoin and so forth, and kidnappings right now are happening virtually,” said George Wrenn, chief security officer (CSO) and vice president of security for Schneider Electric.

Roland Cloutier, CSO and VP of security at ADP, agreed that the attack surface is only going to get bigger, but he believes the benefits of technology will outweigh the threats posed by cyber criminals.

He said the spotlight needs to be on funding startup development and advancing technologies. “Are there enough technologists? … How do we enable that type of compute that will do wonderful things?” he said, urging the audience to start thinking about the possibilities in quantum computing, AI and integrated defense architectures.

“Technology is going to solve so many problems that this will be a drop from the bucket,” he added.

Shuman Ghosmajumder, head of product management at security startup Shape Security, was the out-and-out optimist of the group, pointing out that history suggests that we are up to the threat.

“It’s going to get better. You look at 20 years ago, and all societies were pretty concerned that the world was going to end by the year 2000,” he said. “I think we are going to see these types of moral shifts and innovations that hopefully will make a big dent in the problem.”

Also from MIT Sloan CIO Symposium: See the roadblocks enterprise CIOs have to prepare for as they gear up to adopt IoT.


May 7, 2015  5:10 PM

Three questions with TechTarget’s new chief data officer

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski
CIO

Chief data officers, a relatively recent breed of executives, are often associated with highly regulated and data-heavy industries like insurance, government, health care and financial services. But chief data officers are beginning to make a play outside of those industries as well, most recently in media.

This week, Time Inc. announced its appointment of J.T. Kostman as its first-ever chief data officer (CDO). And last week, TechTarget, SearchCIO.com’s parent company, introduced Charles Alvarez as its first CDO. Neither have served in a CDO position before (although Kostman did serve as the chief data scientist at Keurig), but both have an extensive history with data, analytics and their supporting systems.

AlvarezAlvarez’s experience comes from the financial services sector, where he’s worked for the likes of Credit Suisse, Bear Stearns and JP Morgan. SearchCIO had a chance to catch up with Alvarez to discuss his new role and why the complexity of IT systems is casting a shadow on the integrity of corporate data. This conversation was edited for brevity.

Why does a media company need a CDO?

Charles Alvarez: We’re an information company first and foremost. If I’m going to go out and sell to vendors, to purchasers and to people who buy technology or to people who may use this information to manage a hedge fund, for example, I have fundamental principles that I have to keep on top of: I have to be able to maintain the reputation of my firm, which rests on the quality of its data.

And I’ve got to be able to grow and increase sales where I can. I’ve got to be dynamic and agile so I generate new products and generate new services. And I won’t be able to do that if I’m not capable of understanding the information that I have or managing the information that I have.

You’ve talked about the monetization of data, but the other major function of the CDO is governance, data quality, data management. How does the CDO’s perspective on this topic differ from IT?

Alvarez: As it exists, from a legacy standpoint, for 99.99% of the world today, the data has lived in the technology organization. The technologists have to care about it because it’s inside their apps and their databases. If they screw it up, there’s going to be consequences. So from the standpoint of a historical view, it has been managed by IT and it lives in their database.

But what if I’m reengineering how marketing ops manages surveys? [Marketing ops] wants to create a vocabulary for its teams. Now when I want to create a new survey, I don’t have to start from scratch. I don’t have to wonder if this matches the question I asked two years ago because history is important to me, and I can say I have historical sequencing and semantic integrity with time and it’s valid. That’s data in the large.

Data in the small, the stuff that lives in programs, is the stuff IT is responsible for. Data in the large, you have to be concerned about the integrity of the data, you have to be concerned about the processes that create that data.

Why is a ‘data in the small’ perspective too limiting for organizations today?

Alvarez: IT is responsible for the quality of data under its purview. So IT has to know that the business reports this particular item of data as x.y.whatever. But the IT function is not forward-looking, and that function doesn’t understand business semantics. If you stick a number in the database and the top of that numbers says P&L, if you’re in IT, you say, that’s a valid number. To me, as a data person, I’d ask the question is that net, is that gross, are there sales credits, is it compounded, is it a cash number, what currency is it? Now all of a sudden you have a semantic component. Semantics are now important. In the past they weren’t important because we didn’t maintain large time series of data.

That’s the fundamental change that happens.


April 30, 2015  8:51 PM

Secret searches for chief digital officers

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski
CIO

Is the chief digital officer’s star being eclipsed by the chief data officer’s? Google news alerts and job postings for chief data officers outpace those for chief digital officers by a factor of ten (or just about), according to David Mathison, self-described curator at this week’s CDO Summit in New York City and founder of the CDO Club. “And, yet, we know there are a thousand chief digital officers and only 200 chief data officers,” he said.

One reason chief digital officers appear to be in much lower demand than chief data officers has to do with the recruiting and hiring process for the respective roles, according to Mathison.

Chief digital officer openings aren’t blatantly advertised because they “go out to executive search,” he said. Recruiters are tapped to find the right candidate, keeping the job search confidential. Chief data officers, on the other hand, come at a lower price tag (with the exception of data officers for banking and financial services), “so they generally don’t go out to search,” Mathison said.

The hubbub over chief data officers is based on smoke and mirrors — and fanned by a complicit press. “There’s a lot going on here in the press trying to push this position,” Mathison said. Who could pass up the news that the inimitable Lloyd’s of London has appointed a chief data officer?  Or not make a fuss over the UK-based Experian’s recent study on the emergence of the chief data officer?

That particular report, which came out in February, had this jaw-dropping statistic: 92% of the 250 CIO respondents (all from large organizations) believe the chief data officer position “is the best place to define data strategy and be the guardian of data quality within an organization.” The best place.

With statistics like this and predictions that chief data officer positions are expected to double in 2015, the role of the chief data officer is definitely having a moment. But, if Mathison is to be believed, so is the chief digital officer — a perspective made clear by last month’s news that the White House has appointed its first ever chief digital officer. You heard it here first: Move over, CDO, the CDO has arrived!


April 29, 2015  4:51 PM

Gartner: Chief data officer is IT ally, not antagonist

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski
CIO

Data and technology are intricately linked, so it’s logical to assume the role of the chief data officer (CDO) should be a function of IT. But, according to Gartner analyst Debra Logan, that assumption is not necessarily correct.

“Information and data was really never ours to manage,” Logan said at the recent Gartner Business Intelligence and Analytics Summit. “It really belongs in the business, with the business — as does the CDO.”

CIOs may see the need for a data czar and want to appoint one (a move Logan neither encouraged nor discouraged), but enterprises may be better off plucking a CDO from the business rather than from IT — if only to avoid what could become a vicious cycle. “If a CDO is emerging from the IT organization, we may have the same problems we’ve always had,” Logan said. Namely, the business may struggle to adhere to data policies and frameworks designed by an organization that doesn’t own the data.

That’s probably not music to IT’s ears, but drawing a line between data and systems is a good thing for CIOs, Logan said. Leaders of IT have long been frustrated by the lack of progress on data governance and data quality initiatives, and have had “a tough time getting this done because they don’t have the accountability and the authority to do it,” she said.

The role of the CDO is designed to take on tasks like establishing data and information policies for the enterprise. “And, yeah, sometimes that bears on information systems,” Logan said, but CDOs aren’t responsible for pulling the trigger on new technology investments or implementing an enterprise-wide document management system. “That’s still the CIO’s job,” she said.

Plus, at least from what Logan’s observed, CDOs tend to be subject matter experts capable of identifying important information assets that will enable the business to achieve its goals. That’s not quite in the CIOs’ wheelhouse — nor should it be — because, frankly, CIOs are not responsible for creating business strategy, she said.

And CDOs also tend to report to the business, most often the COO, in Logan’s experience. “The message you send when reporting to the line of business is that the data belongs to the business; the data is the responsibility of the business,” she said.

CIOs may hope the role of the CDO is a momentary trend or they may hope they work for a business that won’t need a data chief (Logan said not all businesses will), but it’s a trend that doesn’t appear to be going out of style anytime soon. In fact, if Gartner’s prediction turns out to be correct, IT leaders should prepare for the number of CDOs to double this year — from 200 to 400.

It won’t be an easy transition and “will require CIOs to adjust their job expectations,” Logan said. “But we think once they adjust their expectations, they’re jobs will get better. Finally someone can help [them] track down all of that stuff.”


April 22, 2015  5:58 PM

Out-of-the-box: Pfizer builds brand recognition among Baby Boomers with #FOGO

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski
CIO

Pfizer Inc. may be known for blockbuster prescription drug products drugs like Viagra and Lipitor, but building out that kind of brand recognition isn’t easy. Consumers can’t buy most Pfizer products directly, and the reputation of the pharmaceutical industry as a whole (which is less trusted than the automotive and telecommunications industries), doesn’t radiate a feel-good vibe, according to research by public relations firm Edelman.

So how does a company build consumer trust? In the case of Pfizer, you channel Mad Men‘s Don Draper and change the conversation. That’s precisely what the pharma company did with its “Get Old” campaign, launched in 2012.

“Get Old” started as an experiment “that ended up teaching us a lot of lessons,” Brenna Robinson, director of digital strategy at Pfizer, said at the recent Digital Strategy Innovation Summit in New York City. Launched in 2012, “Get Old” is a campaign targeted at aging adults, a growing population as the Baby Boomers head into their retirement years. It’s not an advertisement campaign nor is it advertorial. Instead, the Get Old website and the messaging through its social channels is something much more akin to AARP.

Some of the content is original, some of it is aggregated from other news sites, much of it is humorous, and all of it is directed at older adults. But none of it feels like a message from a pharmaceutical company, and that’s precisely the point, according to Robinson. “I want people to look at this campaign and be surprised by the fact that it’s from Pfizer,” she said.

The “Get Old” campaign even includes a unique hashtag FOGO (fear of getting old), a play on the popular Millennial hashtag FOMO (fear of missing out). FOGO is a good example of the tone Robinson wanted the campaign to take: Fresh, witty, edgy, and even young. “To our surprise, [FOGO] kind of caught on,” said Robinson, who admitted her standards for “catching on” are “probably lower than in the consumer space.” (Although, if this New York Magazine article is to be believed, it looks like FOGO might be co-opted by younger generations to mean fear of going out.)

Still, the point of the campaign was to develop relationships with customers in a unique way — as a general information hub and online community directed at a demographic most likely to use Pfizer products. “One of the big things for us is that it changes the perception about Pfizer,” Robinson said. “We know when we increase engagement and reach like we have this year, we’re making people feel better about Pfizer. It’s sort of a one-man-at-a-time kind of mission, but we thought it was enough to say we’re on to something.”

It’s an example of a company not only thinking outside of the box, but engaging in actual experimentation — in Robinson’s case, to build brand awareness. As CIOs know well, injecting that kind of free thinking and freedom of expression (Robinson called it “disruptive testing”) doesn’t come naturally to established businesses — nor did it come naturally to Pfizer.

“The sell around doing things that really might not work — and some didn’t work — was a real cultural shift for us,” Robinson said. “The worst thing that was going to happen, though, is that people weren’t going to like it.” The world, she said, wasn’t going to fall apart, and it was “worth disrupting our normal pattern for something that’s really different.”


April 17, 2015  6:38 PM

IT’s hidden issue: Copy data

Kristen Lee Kristen Lee Profile: Kristen Lee
CIO

Copy data — when used as a term and not meant as an imperative — is a problem that every organization has, said Phil Goodwin, research director of IDC’s Storage Systems and Software research practice. Copy data is when multiple copies of files and documents and other electronic data are made for disaster recovery, business continuity, test, development, and backup reasons. Though helpful in some cases, it can also become an expensive problem when copy data sits in an organizations’ storage and slows down application performance.

IDC estimates that as much as 60% of the IT organization’s storage hardware budget is spent on housing copy data, Goodwin said. IDC also predicts that by 2018 IT will spend $51.37 billion on copy data.

“It’s a problem that probably every IT organization has, either because they copy data over and over and over out of essentially paranoia or they simply copy it and have extra copies as a result of benign neglect,” Goodwin said, adding that the copy data issue within organizations is often a “hidden issue” with the business side left in the dark by IT.

“If you have to deal with it on a manual basis [copy data] is ridiculously time consuming. It’s just not to [IT’s] advantage to bring it up [to the business] unless they have a way to deal with it,” Goodwin said. So many CIOs and IT organizations don’t.

Within the last five years, however, copy data management solutions have emerged that can help mitigate the pain of copy data, Noel Yuhanna, principal analyst at Forrester Research who serves enterprise architecture professionals, said in an email. Solutions from Actifio and Delphix, for example, are based on using a master copy of the data. Then from the master copy, virtual copies are made and changes to the data are tracked and updated.  Another copy data management solution from Catalogic Software creates a catalogue of all the copies of data an organization has and provides them with a dashboard to manage it.

Yuhanna said an alternative copy data management solution is sub-setting where a master copy is made but, instead of creating virtual copies, smaller copies of the master copy are made and only the data that is needed is retrieved.

Managing the copy data problem

So how can IT organizations stay on top of the proliferation of copy data in their organization, save money, and get a leg up with the business?

Yuhanna advises CIOs to first identify how much data is being duplicated and for what purpose. Then, identify how many copies of the same data are being used. If there are multiple copies of certain data, then that would be a good candidate for copy data management or sub-setting solutions, he said.

Addressing and finding a solution to the copy data problem would result in the CIO and IT organization saving money.

A reduction of copy data by 20%, would be a significant savings.

“The CIO can go to senior management contemporaries and say, ‘You know, we did this evaluation and found that we’re going to be able to save… $2 million on hardware savings’. That’s pennies per share for the CEO,” Goodwin said. “So when [CIOs] provide that kind of savings to the organization it really casts IT in a very positive light, that [the CIO and IT are] attending to their organization and delivering value and savings to the company.”

Let us know what you think about the story; email Kristen Lee, features writer, or find her on Twitter @Kristen_Lee_34.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: