October 23, 2015  6:23 PM

Cloud council: Pick PaaS to swiftly develop, deploy apps

Jason Sparapani Jason Sparapani Profile: Jason Sparapani

The need for speedy development and deployment of applications is a real one — which is why organizations shouldn’t pass on PaaS.

That was the gist of a talk on platform as a service by Mike Edwards, who works on cloud computing standards at IBM.

“That’s where PaaS fits,” Edwards said in a webinar Thursday. “It’s about supporting the economic pressure for the need to develop more and better software — because ultimately your business is implemented through software.”

The Cloud Standards Customer Council, an advocacy organization for cloud services customers, aired the webinar to present the paper “Practical Guide to Platform-as-a-Service,” which gives an overview of PaaS plus recommendations on deployment and operation. The paper was written by Edwards, John Meegan, program manager for IBM’s Open Cloud, and other CSCC members.

PaaS sits in a unique spot in the cloud computing horizon, Edwards said. Like infrastructure as a service (IaaS) and software as a service (SaaS), it eliminates the need for the customer to manage things like servers, storage and networking. But while IaaS offers full-on data center capabilities in the cloud, customers still have to deal with applications, data, runtime and operating systems. And SaaS applications, though appealing — the provider handles all the hardware and software on its end — don’t always meet an organization’s specific needs.

PaaS in context

This slide, from the Cloud Standards Customer Council presentation “Practical Guide to Platform as a Service,” compares PaaS with other cloud offerings.

PaaS, though, may be just right: The provider sets up the servers and hardware and configures and operates them. The customer just has to put in application code and data, an easy-to-follow recipe for creating customer software, Edwards said.

“The whole idea here is to simplify the whole task of building custom applications and running them, making it much easier than it would have been on-premises or even with infrastructure as a service,” he said.

There are a number of PaaS products on the market — Microsoft Azure, IBM Bluemix and HP Helion, to name three high-profile examples — but all of them share certain characteristics. Most important is the support for custom applications that are native to the cloud. They also support a number of runtimes — important if you’re developing a number of applications. For example, there is the Java JDK runtime for Java applications and Node.js runtime for Node.js apps. The capability is sometimes called “polyglot.”

“Basically it means PaaS can support the most appropriate technology for your application,” Edwards said.

Characteristics of PaaS

This slide shows the 12 characteristics of PaaS offerings, as detailed in the CSCC paper “Practical Guide to Platform-as-a-Service.”

There are 12 shared characteristics in all, including coming equipped with mechanisms for deploying quickly — PaaS environments can take “minutes or seconds in some cases” — security and middleware capabilities and developer tools.

Organizations that are thinking about PaaS have a lot more to think about. They need to build a cross-functional team involving not just the IT department but also business units, which have all the end users. That way, IT will know what capabilities people need to have. They also need to carefully examine the cloud service agreement with the provider so that the PaaS does what’s needed. And they need to take costs and charges, software licensing, and compliance requirements into account.

And then there’s governance: having a communication channel open to the provider, having the right security controls in place and knowing the physical whereabouts of your data. Edwards brought up the recent scrapping by the European Union of the Safe Harbor pact, which allowed Europeans’ personal data to be hosted on U.S. servers. It’s now illegal.

“It’s all about knowing where your data is and that the appropriate data controls are put in place and for the processes that you’re handling,” Edwards said.

Let us know what you think of this post; email Jason Sparapani, features writer, or find him on Twitter @jmsparapani.

October 19, 2015  11:26 AM

Dell-EMC and the cloud joust

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

Senior IT leaders and analysts called the $67 billion Dell-EMC deal a good thing, for the most part. A combined and stable Dell-EMC should offer CIOs a great source of products for their company data centers, but what about cloud offerings? For some experts, that’s the big question.

Jonathan Reichental, CIO for the City of Palo Alto, and Glenn O’Donnell, vice president and research director at Forrester Research Inc., described the merger as a data center infrastructure play, a still-important global market. “There is still a sizable global market in data centers. Those systems have to be updated and modernized,” Reichental said.

O’Donnell echoed Reichental’s comment about continuing to meet those traditional hardware needs for the enterprise. “The extreme majority of companies are still going to require some in-house data technology,” he said. For those purchases, CIOs are going to want a trusted advisor who won’t gouge them on prices. The Dell/EMC combo could provide that balance, he said.

But how the Dell-EMC deal plays in hotter, less mature technology areas such as cloud services, which give the business added flexibility and agility, is still a little muddy, O’Donnell said. Speculation abounds, but Dell has not publicly stated its plans for the “EMC federation,” a collection of acquired companies that had “significant autonomy” under EMC, including Pivotal, RSA and, most notably, VMware, according to a report titled Quick Take: Dell Buys EMC, Creating a New Legacy Vendor.

“In particular, the combined firm has not committed to merging or otherwise rationalizing EMC Virtustream and VMware vCloud Air into a single service portfolio, which means there’s little impact on the public cloud market,” according to the report, which was written by several Forrester analysts, including O’Donnell. Virtustream (acquired by EMC in May) offers a suite of cloud management services while vCloud is a public cloud platform.

It’s not as though Dell-EMC is out of the cloud game. The merger will enable Dell to provide “converged solutions to power private clouds,” according to the Forrester report. In fact, Forrester recommends the CIOs of companies more than a decade old to “keep Dell on your shortlist for converged infrastructure private cloud.”

But is it enough? The Forrester report (among others) goes on to say that those offerings won’t be able to match the prowess of “hyperscale public cloud leaders Amazon Web Services, Google, IMB and Microsoft,” who are all aiming for the enterprise.

October 16, 2015  1:58 PM

Frito-Lay: ‘Omniculturals’ at the intersection of IT and marketing

Linda Tucci Linda Tucci Profile: Linda Tucci

Ram Krishnan has a big job in IT. He is the chief marketing officer (CMO) at Frito-Lay North America, a $14 billion division of PepsiCo. In addition to Fritos corn chips and Lay’s “Betcha can’t eat just one” potato chips, the company’s products include Doritos, Tostitos, Cheetos, Ruffles and my childhood favorite, Cracker Jack — in other words a pantheon of junk food whose brilliant branding would appear to have little to do with IT.

Not so, not any more, as Krishnan made abundantly clear in his keynote talk on the intersection of marketing and technology at last week’s FutureM conference in Boston. (The “M” stands for marketing.) At Frito-Lay, where the marketing team is replete with marketing technologists, data and technology are central to a brand’s success, Krishnan said.

Krishnan, named one of the “30 Most Creative People in Social Media Marketing” by Business Insider, is the driving force behind Frito-Lay’s “Do us a Flavor” promotion. The online campaign is waged largely on Facebook where millions of users have submitted, shared, voted on and Tweeted about new #DoUsAFlavor combinations for Lay’s potato chips. (The 2015 U.S. finalists are: Greektown Gyro, New York Reuben, Southern Biscuits & Gravy and West Coast Truffle Fries. The winner can opt for $1 million in prize money or a cut of the sales.)

Krishnan also oversees “Crash the Super Bowl,” an online competition now in its 10th year. Frito-Lay asks customers to create their own Doritos commercial for the big event, guaranteeing that at least one ad will be aired during the Super Bowl. (This was last year’s bro-centric winner.) Digital, interactive campaigns of all sorts connect Frito-Lay products with holidays, cult TV shows and social movements. At the FutureM conference, Krishnan let the audience in on how Frito-Lay is digitally deploying Chester Cheetah, the (slightly creepy) official mascot of Cheetos, to get a piece of Halloween.

The omniculturals

The word that came to mind when I read the flavor descriptions from the 2015 #DoUsAFlavor campaign and watched the off-color winning Super Bowl ad was yuck, but people like me don’t matter. My adult children do. The campaigns are aimed mainly at the two youngest of today’s five generations of consumers — the technology pioneers or Millennials, born between 1981 and 1996, and the digital natives or Gen Z-ers, born between 1997 and 2015.

Millennials and Gen Z-ers are not the same, Krishnan explained, but they are united by technology. “Technology has been omnipresent throughout their lives and is a universal language for these two cohorts,” he said. Indeed, when marketing Lay’s potato chips, sold in 76 countries, “it is striking how alike these cohorts are across the globe.”

“We call these consumers omnicultural. Geography does not define who they are. The demographic around the globe has much the same taste in music, in style, video games,” he said.

Of the many attributes shared by the omnicultural cohort are three that are of  particular to interest to CMOs — and should also be of interest to CIOs. They are:

1.  BYOS, or bring your own screen:  The average American has access to four screens, according to Krishnan, and 87% use multiple screens at the same time. When Krishnan’s family gathers in front of the TV — a popular image in advertising since the dawn of television — he’s  on his laptop, his wife is on her iPad, his daughter is on her phone and his son is playing a video game. Marketing campaigns today must not only have “sharability” but be designed to be consumed on multiple screens.

2.  ROI, or return on image:  Millennials and Gen Z-ers care about digital presence, in ways previous generations (with the exception of movie stars and public figures) do not. They curate their digital presence with more care than they curate their living spaces. According to Krishnan “52% of [Millennials and Gen Z-ers] said  that when they get ready in the morning, one of the things they are thinking through is how what they are wearing will look on a social media post.”

 3.  Any reason to #celebrate: Both Millennials and Gen Z-ers have a “self-inflicted pressure to live interesting lives,” Krishnan said.  One of the ways they track and promote interesting lives is on social media. “They use hashtags as a way to connect with peers, as a way to actually navigate this world and to make the days of the week more interesting,” he said.

CIOs, CMOs live in scary times

Finally, conventional marketing doesn’t engage this demographic. “These two cohorts don’t want to be marketed to but they are willing to have a conversation with the brands — and create content,” Krishnan said. In fact, traditional marketing is dead to them.

“This is one of the scariest times to be a marketer. The industry and landscape is changing. I would submit to you that no other function is changing as dramatically as marketing, outside of IT,” he said.

Email Linda Tucci, executive editor, or find her on Twitter @ltucci.

October 8, 2015  2:04 PM

Gartner Symposium: Why does a CIO need a CDO?

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

ORLANDO, Fla. — How can a chief data officer (CDO) help a CIO? Gartner analyst Debra Logan counted the ways at the Gartner Symposium ITxpo.

As businesses go digital, many CIOs will need help, especially at companies struggling with data quality and data governance issues. “What we’re really telling you is that you’re getting a bunch of new responsibilities because of digital business,” said Logan, who has written extensively about the role of the CDO. “Flipping to digital leadership expands the role of the CIO.”

And it adds pressure to an already pressure-filled job, especially if CEOs are expecting to double revenue attributed to digital business in the next five years, as Gartner’s annual CEO survey suggests. A data officer, or a person responsible for building a strong data foundation, reducing risk and exploiting the value of data, can help CIOs push the data envelope for businesses that need to transition from historical to predictive analysis, from passive analysis to active experimentation, from analyzing structured data to analyzing text and multimedia, and from separating analytics to embedding analytics. “That’s going to require a lot of stuff, data quality being the first on the list,” Logan said.

Plus, if data governance is still a struggle, CDOs can help there, too, retooling practices from command and control to something a little more people centric, Logan said. “One of the first programs CDOs often launch or are put in the middle of is [master data management], which is a core information governance project,” she said.

She encouraged CIOs to not only embrace the CDO (or the chief analytics officer) as a colleague — but to help shape — and even champion — the role as well. “When the relationship is good, then things start to happen, and [CIOs and CDOs] have success,” Logan said. And when it isn’t, they often don’t. Plus, she said, if a data officer is inevitable, CIOs will be happier if they have a voice in how the position is developed than if they don’t.

That said, not all companies will develop a CDO role. Gartner predicts only 25% of businesses will have a CDO by 2017. Some companies won’t need one; others may need a CDO, but may not be ready for one. Logan advised that if the CDO position doesn’t have board level support, if the business is overly protective of their data and resistant to change and if data governance isn’t a priority, CIOs should avoid suggesting the company develop the position.

Still other companies may want the CIO to take on CDO responsibilities. If that’s the case, Logan said, the worst thing a CIO can do is assume the role without additional resources and personnel. “Because, guess what, it’s going to take people to do this,” she said.

October 7, 2015  8:11 AM

Gartner Symposium to CIOs: Vigilance, curiosity for better security

Jason Sparapani Jason Sparapani Profile: Jason Sparapani

ORLANDO, Fla. — At an event where predictions of tomorrow’s technology held center stage — algorithms operating cars, smart machines helping call center agents do their jobs better, “robo-bosses” evaluating our performance — it’s telling perhaps that the first speaker was Brian Krebs.

Krebs, the investigative reporter who broke the story of the 2013 Target security breach, told a crowd of CIOs and senior IT executives at this year’s mammoth Gartner Symposium ITxpo that many victims of cyberattacks had the information right there in their event logs — they just didn’t have the curiosity to check them.

Investigative reporter Brian Krebs speaks at the Gartner Symposium ITxpo in Orlando, Fla., on Sunday.

Investigative reporter Brian Krebs speaks at the Gartner Symposium ITxpo in Orlando, Fla., on Sunday.

“I guarantee you the fraudsters don’t suffer from this — they’re infinitely more curious by nature,” said Krebs, a former Washington Post reporter who now dogs cybercriminals on his website Krebs on Security. “And their curiosity really knows no bounds.”

You say you’re secure — are you sure?

The problem organizations have, Krebs said, is a “perception-reality gap.” They think they’re doing what they need to do to secure their systems and their networks — they have virus and firewall protection in place, they regularly install software patches and they secure email. But those conventional approaches are no match for who Krebs calls the bad guys, who have multiplied over the past few years and as a result are innovating at a rapid rate.

To cite two examples, operators of underground marketplaces for stolen identity card information are vying with the competition by giving customers discounts when they buy in bulk and even profiling them using analytics to offer the types of card numbers they prefer — MasterCard over Visa, say.

Organizations aren’t keeping up in their security practices, Krebs said, because they want the benefits of technology but are reluctant to put in the unglamorous work of continuously monitoring their networks and shoring up weaknesses. And they don’t want to spend more than they have to.

“Traditionally, organizations have spent an inordinate amount of their scarce security budgets trying to meet security compliance obligations that they may have,” he said. What they should be doing is looking for ways to attract and keep talented security folks.

For Shirish Patwardhan, co-founder and CTO of Indian software company KPIT Technologies, the issue hits close to home.

“All my company is compliance-based,” he said. And he knows that won’t stop breaches. “It’s very dangerous because this is going to go on and on.”

Patwardhan said the type of preventive approach Krebs prescribed isn’t promoted enough among organizations. People are people, he said, and if security breaches don’t happen to them, they don’t happen, period. “It’s just a human inclination,” he said.

‘Everyone gets hacked’

The clarion call for heightened vigilance echoed in other chambers at the conference. In a keynote speech describing a “post-app” economy of algorithms that do jobs once done only by humans, Gartner analyst Peter Sondergaard spoke ominously about threats facing all organizations today.

“Everyone gets hacked in the new world. It’s only a matter of time,” he said, adding that 71% of organizations have had to switch on disaster-recovery or business-continuity procedures over the past two years. “Minor problems are constants and major incidents are inevitable. Be ready.”

It was a sentiment not lost on Robert Juckiewicz, vice president for IT at Hofstra University.

“We worry about it every day,” he said. Security has become one of his organization’s highest priorities, but there’s an added layer of complexity and difficulty at educational institutions.

“The purpose of education is to create and disseminate information. That goes counter to security,” he said.

While at the conference, he talked to a peer in an accounting firm who said the practice there is to block everything. “At a university, you can’t do that. You should be able to look at anything.”

Let us know what you think of this post; email Jason Sparapani, features writer, or find him on Twitter @jmsparapani.

October 5, 2015  12:42 PM

Breach-proof? Look for security experts with deep functional knowledge

Fran Sales Fran Sales Profile: Fran Sales
Application security, Chief Security Officer, CIO, CISSP, cybersecurity, DevOps, Information security, Security breaches, Security certifications

Security breaches occur so often now that it’s a rare week when one doesn’t make the headlines. Companies that hope to have a chance against these constantly evolving threats need to be hiring a new type of security professional, said a panel of security experts and practitioners at the recent MassTLC Security Conference in Boston.

For instance, at online marketplace, which collects sensitive customer information, the security officer role requires security and business expertise, said panel member Dave Krupinski, the company’s co-founder and CTO. The head of security has deep understanding of technology and security practices and a deep knowledge of the business’ digital and physical assets.

“[The security officer] is aware of our asset landscape, where all these assets are, and also aware of the threat landscape, where threats may be coming in,” said Krupinski.

Gerry Beuchelt, CSO at Demandware, a software technology company, agreed that companies need to hire security experts who have a deep technical understanding of the type of assets they are charged with protecting. “Do you want them to go down the application security path? [Then, they] need to know how to code,” he said.

Companies that are looking for candidates with both broad and deep functional expertise, however, are going to have to be more “creative” in their hiring processes, according to panelist Josh Feinblum, vice president of information security at cybersecurity firm Rapid 7.

“I’d say focus less on the ‘I’ve had four years of experience being a security engineer,’ and more on the ‘I’ve scripted things; I’ve automated things,'” he said, adding that he is probably the exception when it comes to security certifications: “If I see a CISSP on a resume, I almost disqualify the person.”’s Krupinski agreed that someone who has had hands-on experience in the technology, particularly DevOps, a discipline which tends to be “more proactive about security,” is a more attractive candidate.

“You do want people who are very, very hands-on, familiar with the technology stack you’re working in, and also familiar with automation and [developing] tools and technologies that can simulate threats and that are running on a continuous basis against your systems,” he said.

Let us know what you think of this story; email Francesca Sales, site editor, or find her on Twitter: @fran_s_tt.

October 5, 2015  8:34 AM

Are CIOs ready for a hybrid cloud future?

Jason Sparapani Jason Sparapani Profile: Jason Sparapani

The fear of being out-competed by a born-digital upstart is so strong in today’s business climate, it requires a new verb. Businesses will do anything to keep from getting “Ubered” — that is, falling victim to the kind of harm inflicted on the taxi industry by the popular ride-sharing app.

“There is a great fear in companies right now — ‘Who’s the Uber in our space?'” Judith Hurwitz, president of consulting company Hurwitz & Associates and writer of numerous books on IT, told me at the recent Hybrid Cloud Summit in Cambridge, Mass. “It’s the threat that you don’t know is even there that has people worried.”

CIOs who don’t want their organizations blindsided need to help the business be flexible and move swiftly to changes in demand — and unexpected competition. Hybrid cloud computing can help them get there, Hurwitz said. In fact, the mix of public and private cloud deployments not only offers the right blend of cost-savings, instant scalability and security to meet the rising needs of the business, it is the future of computing itself.

Are CIOs ready for such a future?

“It depends on the CIO,” she said. “The most successful CIOs that I have worked with, talked to, they are the ones that they are very fluent in the business, they understand it well, they have a seat at the table. They are able to be the person that isn’t just folding their hands and saying no, but they’re saying, ‘Let’s do this, but let’s do it this way.'”

Hurwitz explained that while CIOs need to ensure that their organizations’ systems and data are protected, they are equally at risk if they don’t talk to the business, know what the business goals are and make the right executive decisions about how to achieve them with IT.

“What decisions are you making? Are you holding on to those decisions for too long?” she said. “Are you afraid to change? Because there’s definitely a lot of fear of change in IT.”

On the flip side, CIOs who speak the business language but don’t closely follow the technology will also find themselves in hot water.

“If they spend all of their time acting as the CEO,” Hurwitz said, “are they really in a place where they can help make the strategic decisions? Or do they then rely on the technologists who are deep into some cool new stuff, but where’s the sense of perspective? So you have to balance those out.”

Let us know what you think of the story; email Jason Sparapani, features writer, or find him on Twitter @jmsparapani.

October 1, 2015  3:34 PM

InfoSec leaders: Be the innovation

Linda Tucci Linda Tucci Profile: Linda Tucci

Emily Mossburg, a principal at Deloitte & Touche LLP, provided information security leaders with some useful insight yesterday into why their jobs are so freaking hard. The occasion was the Mass TLC event on “The Business of Security” in Boston. Mossburg, who specializes in cyber resilience, was a keynote speaker.

“We’ve been focusing on innovation for the last 100 years. We’ve been building up technologies to enable our organizations to do things faster, to do things more efficiently, to enable our organizations to grow in new ways, including new interfaces with third parties, including new platforms that allow us to interact with clients in new ways — all focused on growth and sharing of data,” Mossburg said.

The aim of all these data-sharing innovations was to give companies better information. “And more data is always better,” Mossburg said. But data protection was not part of the innovation equation. IT environments were built to be hacked.

“There was no thought about what are the risks of sharing this data; about what are the risks to individuals, to our enterprises, to our country in sharing this data and making it so interconnected,” she said.

“So right now we are the midst of playing an amazing catch-up game, a catch-up game in which we are taking years of years of legacy technology and infrastructure and trying to make it secure,” she said.

Security by design

To change the rules of the game, information security leaders “need to move to the front of the problem,” Mossburg said, outlining what is now considered best practice in security circles, but is rarely practiced: secure by design.

“We need to move to the front of the problem, to the innovation lifecycle, to the process development lifecycle, to the technology development lifecycle, to the system development lifecycle,” said Mossburg. Cyber risks need to be considered from the beginning — as the innovations are being designed, not after. The process change will also change the  perception of security professionals and change their roles.

“By including the cyber security and risk requirements up front, we start to align ourselves with innovation, we start to be part of the innovation stream, we change the dialogue of what it is all of us do,” she said.

Be the innovation. That seemed like good advice.

Email Linda Tucci, executive editor, or find her on Twitter @ltucci.

September 30, 2015  10:19 PM

Influence better decision making by becoming a ‘choice architect’

Nicole Laskowski Nicole Laskowski Profile: Nicole Laskowski

NEW YORK CITY — Decisions are oftentimes colored by environment. Consider the humble cafeteria.

“When you walk into a cafeteria, something comes first, something comes last,” Katherine L. Milkman, associate professor of operations, information and decisions at The Wharton School at the University of Pennsylvania, said at Strata + Hadoop World. “And the first thing you encounter is more likely to end up on your tray than the last thing you encounter — because [at the beginning], your tray is empty.”

That’s not accidental; it’s the product of “choice architecture,” a concept Milkman said was best described in the 2008 book Nudge: Improving Decisions about Health, Wealth, and Happiness. “The idea is that everywhere we make decisions, we’re being influenced by our environment — by the architecture around us,” she said.

Milkman, who relies on big data to analyze how people avoid making the choices that would seem to be in their best interests  (e.g. exercising more, cutting down on junk food intake), suggested that if environment plays such an important role in making decisions, maybe it’s time to take action. “Why not be a wise choice architect,” she said to attendees. “Why not try to improve decisions and facilitate better choices by, perhaps, putting ‘healthier foods’ first” in the cafeteria line of IT choices?

Based on her extensive work with A/B testing or split testing and her analysis of data both big and small, she provided five tips on how to become a choice architect:

Set helpful defaults. A “default decision” occurs when the decision maker takes no action and, instead, accepts what’s offered. She provided the example of organ donation; in countries where the default decision is to opt-out of an organ donation program, the number of organ donors is significantly lower compared to opt-in programs. That could be an example of laziness, Milkman said, or an example of consumer trust. “We take whatever the default is to be the policy recommendation, and that can be very powerful,” Milkman said. “Remember to design your defaults wisely whenever you’re creating a system, because they change behavior.”

Prompt people to plan whenever you want them to follow through on intended behaviors. In an A/B test for a free on-site flu shot clinics, Milkman sent two types of messages to different employees: Group A received a mailing that simply provided information about the upcoming event; group B received the same information and then asked employees to make note of the date and time for their own benefit. Those in group B took advantage of the free flu clinics more than those in group A. “[Prompting] works because, one, it helps the person think through obstacles,” said Milkman. “And, two, it also embeds plans more firmly in memory.”

The power of leveraging social norms or our tendency to want to follow the herd. Milkman pointed to an A/B test done at a hotel on towel reuse. Group A received messages that mentioned saving the environment as a reason to use fewer towels; group B received messages that encouraged joining fellow guests in the reuse of towels to help save the environment. “The second message was dramatically more successful in increasing towel reuse,” Milkman said. In a similar vein, Opower, a company that creates software for utility companies, sends out mailings that compare a homeowner’s energy usage to that of his neighbors. “A/B tests of this company has shown, year over year, this [messaging] reduces energy consumption by about 3% reliably,” Milkman said.

Create accountability. Holding someone’s feet to the fire works. Milkman pointed to a Michigan primary to prove her point. A decade ago, registered voters were sent different mailings that informed them they were being studied; others were mailed the voting record for the last two elections of everyone in the neighborhood — the record, not who a person voted for, is public record — and they were included on a list sent to their neighbors. “This accountability to neighbors increased voter turnout by eight percentage points, which to my knowledge is the single largest increase in voter turnout from any mailing that has ever been sent,” Milkman said, who also noted it was a “pretty aggressive” tactic.

Capitalize on fresh starts. Statistically, there are moments when people try to put their best foot forward — “at the start of a new week, new month, following celebrations of holidays and following birthdays,” Milkman said. “If you’re thinking when to provide tools to follow through on goals, these fresh start moments might be opportune opportunities to do so,” she said.

September 28, 2015  10:15 PM

Gartner: ‘Widening gulf’ between digital front-runners and everybody else

Linda Tucci Linda Tucci Profile: Linda Tucci

By 2020, more than 7 billion people and businesses — and close to 35 billion devices — will be connected to the Internet. The prediction, from IT consultancy Gartner, helps make that current “It” girl of IT buzzwords — “digital business” — less abstract. In a reality where the digital and physical worlds are intertwined, old business models don’t suffice.

Hence a need for new digital business designs. Look no farther, says Gartner, than Walt Disney World where wearable RFID-enabled MagicBands now function as room key, wallet, admission ticket and line skipper. (See Gartner’s definition of digital business below.)

The creation of  new digital business designs, however, is really underway at only about a third of companies (32%), according to the firm’s recent “2015 Digital Business Survey of IT, Business and Marketing Executives,” and the front-runners, as Gartner calls them, are “breaking from the pack:”

“…a widening gulf is forming between organizations already undertaking digital business initiatives and those only in the planning phase,” analyst Jorge Lopez and his co-authors state.

Gartner’s data is consistent with recent data from McKinsey & Co., which showed that most companies have not yet realized the full value of digital.

Digital business doers vs. planners

The report, published last month, is based on responses from 304 executives at organizations with $250 million or more in 2014 revenue. The survey showed that digital doers don’t think or act like digital planners. Companies that are already doing digital initiatives, for example, don’t make a distinction between digital business strategy and plain old business strategy. Planners, on the other hand, see the two as separate. Digital investments by the doer group are for “piloting and deploying,” while the planner group “is into investigation and experimentation.” Makes sense.

Here’s where the gap is more than just semantic: Digital business front-runners overwhelming list “adopting new technology” as their highest priority, followed by “creating a highly collaborative environment” and “supporting customer-driven technology change.”

Adopting new technology is also the top priority for digital business planners (although by 21 percentage points lower than the doers: 70% vs. 49%), but — and this is the telltale data point — “renovating core IT toward a digital business future” is their No. 2 priority.

In other words, the doers are already busy transforming corporate culture to support customer-driven change, among other initiatives, while the planners are still mired in renovating legacy IT systems. Widening gulf indeed.

Veep of digital business

Here are a few more findings of interest to CIOs:

“Securing business and customer data” was cited as the leading  requirement for digital business design, followed by “digital marketing capabilities to reach new customers” and “system integration of people, business and things.”

When respondents were asked who were the people responsible for leading digital business innovation at their companies, the leading candidate varied depending on who was doing the answering: CIO or IT director was  among the top three roles, according to 57% of IT executives; CMO was among the top three, according to 38% of marketing execs, and business unit manager or managing director was among the top three, according to 35% business executives.

Also, a new role appears to be gaining ground: VP for digital business was cited by 22% of all survey respondents, up from 11% in 2014.

One thing seems clear in the morass of biased opinion: Everybody wants to get in on digital business.

Here is Gartner’s definition of digital business: 

The creation of new business designs that not only connect people and business, but connect people, business and things (physical objects that are active players and contribute to business value) to drive revenue and efficiency. Examples: use of sensors, asset tracking, smart machines, smart grid, 3D printing and robotics, smart cities and drone delivery.

Jeanne Ross  MIT Sloan’s Jeanne Ross  offers more insight into the rough road ahead for companies making the shift to digital business, in this SearchCIO Q & A by Nicole Laskowski

Let me know what you think of this post — email me or find me on Twitter@ltucci.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: