The 11th annual MIT Sloan CIO Symposium began with a piece of provocative advice for some of the world’s best CIOs: If you believe you’re the smartest person in the room, you’re setting yourself up for failure, especially in today’s enterprise.
Business peers are tech savvy, customers are plugged into your business like never before and digital disruptors are everywhere. Being a successful CIO in the digital enterprise is not about separating from your peers and customers, conference organizers said — it’s about effectively recognizing and integrating their strengths into your IT strategy.
In fact, as the day went on, it became increasingly clear that believing you know better than anyone else is actually one of the worst mistakes a CIO can make.
“The greatest threat to the CIO is the CIO themselves,” said Douglas Menefee, cloud CIO advisor at Amazon Web Services. CIOs must guard against getting too comfortable. “Human nature is tribal and we surround ourselves by people of like-tribe and we run the risk of being closed-minded,” he said.
Stephanie Woerner, research scientist at the MIT Center for Information Systems Research (CISR), concurred, stressing that it’s crucial CIOs be open to the strengths and ideas of their peers, and also be willing to continuously learn and think outside the box.
A simple example? Take “something that was in technology but turn it into an [IT] service,” she said.
Andrew McAfee, co-director of the MIT Initiative on the Digital Economy, drove home the point in remarks that closed out a day of sessions that included: how to work with the CEO, how to balance innovation and security, how to be an effective IT service broker and how to make sure the CIO role doesn’t become obsolete. But McAfee took the notion of drawing from the human collective a step further. True magic happens when you integrate the strengths of people with the strengths of technology, he said.
And CIOs, with their technology domain expertise, are in a position to bring that magic to their companies — provided, that is, they can assemble teams with the right combination of human and machine smarts.
To illustrate his point, McAfee described to the audience a freestyle chess tournament where participants could form any combination of human and digital labor to compete against each other.
“What we learn is that the rightly composed team will beat any grandmaster,” McAfee said. “It will beat the best chess super computer. It will actually beat the top grandmaster with the best chess super computer, because the way to compose a team is to be very insightful about what people are good at versus what technology is good at and bring both of those strengths together.”
And the day is coming when anyone will be able to program these smart machines, not just software engineers from MIT. McAfee told the audience about Baxter, a robot that anyone can program — not by writing code, but simply by moving its “body” parts to show it what to do. “And you essentially say, ‘You got that?’ and Baxter says, ‘Yeah, no problem,’ “McAfee said.
Though Baxter is mainly used on the manufacturing floor, it shows that technology paired with people is powerful: powerful when used in institutions, powerful when used in education systems, and powerful when used in business models.
“These are not straightforward examples of substitution,” McAfee said. “These are examples of complements, of people coming together with technologies to do things better.”
Let us know what you think about the story; email Kristen Lee, features writer, or find her on Twitter @Kristen_Lee_34
Fasten those DeLorean seatbelts: Activity-tracking chip implants and other forms of wearable tech are coming to a future near you, according to a recent survey of IT insiders. And, even better, without the chaotic, dystopian overtones of the might-have-been future Marty McFly stumbled upon in Back to the Future.
Findings from a Pew Internet Project survey show that users view the rapidly expanding role of Internet-connected things in their environment in a positive light. The report, with data collected from 1,606 IT experts, analysts and other stakeholders, indicates that a majority of the participants agree that, by 2025, the increasingly ubiquitous Internet of Things (IoT) will have “widespread and beneficial effects” in our society — and that it will be so deeply integrated into our daily lives as to become “like electricity.”
Among the places survey respondents expected these sensorized technologies to manifest themselves: our bodies, homes, communities and the environment, as well as the goods and services industry. And expect a lot of them. The study also projects 50 billion devices by 2020 in the shape of “phones, sensors, chips, implants and devices of which we have not conceived,” states Patrick Tucker, expert respondent and author of The Naked Future: What Happens in a World That Anticipates Your Every Move?
So what’s this mean for CIOs and other IT execs? Consider this another business disruptor that, like the connected car for the auto insurance industry, both offers opportunities and creates challenges.
Other tech news causing a buzz this week: FCC approves proposal allowing for the possibility of paid priority on the Net; New York Times ouster of Jill Abramson leaves the challenge of digital strategy to new executive editor Dean Baquet; text providers start rollout of text-to-911 program; and more.
Read all about ’em over at Searchlight!
Hosain Rahman got into the wearable technology business by building noise cancellation technology (AKA headsets) for the military. Today, the CEO and co-founder of Jawbone, is probably better known for Jambox, a set of wireless speakers for the consumer market, and its new-fangled UP bracelet, an activity tracking device.
The road from military to civilian customer base was not easy, according to Rahman, who spoke at the recent TechCrunch Disrupt New York conference. The first release of the UP wristband bombed in 2011. A year later, when the second version launched, it faced new competition from Nike’s FuelBand. Then there was the internal team-building issue. Making wearable devices requires software, hardware and data teams with different cultures to mesh and work together.
“It was really interesting because it was taking people who came from totally different disciplines, who are used to working at different paces of iteration cycles, and putting them together,” Rahman said.
The hardware teams, for example, design for near-perfection. They work deliberately to resolve “parts of the experience” and decide if the product is good enough to ship based on whether “someone would pay you for it,” he said. Software teams, on the other hand, have more flexibility to build, test, iterate and repeat as fast as their coding fingers will let them. They can release products as prototypes and quickly tweak what doesn’t work based on feedback.
Taking advice imparted to him by none other than Steve Jobs, Rahman saw that the tasks for his hardware, software and data teams were all different, but they ultimately fit together — like puzzle pieces — to accomplish the same goal: Building a product customers would love.
“That was the unifying factor,” he said. “Focusing on the customer experience — the user experience — and getting it right.” That focus paved the way for hardware, software and data teams to start learning from each other, instead of butting heads.
The software team took a page from the hardware team and began to appreciate longer cycles and “that level of product resolution … which I think in mobile apps is huge because you really only have one chance to make a first impression,” Rahman said.
On the flip side, “the software guys made our hardware guys think about prototyping faster, changing the way they iterate, how to get things out and tested and hardware hack, if you will,” he said.
The back and forth will, no doubt, come in handy as Jawbone pushes ahead on its new “holy grail”: putting individual data back into the hands of its customers in an effort to change their behavior. Today, the UP wristbands are synched with a mobile app, which can help customers keep track of what they eat, what they drink, how much they move and how much they sleep. And now Jawbone goes a step further, sending push notifications to its customers on their sleep and activity patterns and how they can improve both.
In this week’s Searchlight: More fuel has been added to the net neutrality fire.
Despite a call for delay from a Federal Communications Commissioner and vocal dissent from the public, FCC chairman Tom Wheeler plans to bring his proposed Open Internet guidelines before the commission at its May 15 meeting.
Wheeler’s proposal, which outlines net neutrality rules that would allow companies to pay for high-speed access to their Internet content, has kindled the decades-long net neutrality debate. In response, many individuals, interest groups and companies — including Internet giants Amazon, Google and Facebook — are voicing dissent against paid access that would allow ISPs to prefer some companies’ content over others.
As guest contributor and Wellesley College CIO Ravi Ravishanker notes in a recent CIO Matters column, questions already abound around whether a net neutrality revision will go through, including the effect such a ruling would have on startups with less money in the bank. We’ll see if the FCC decides to take the matter to the public in Thursday’s meeting.
In other news, Target CEO and chairman Gregg Steinhafel resigned only a week after the company hired a new CIO in the wake of last year’s headline-making data breach. One major takeaway from this C-level revamp: CEOs have little choice but to shoulder a fair share of responsibility in the business’ IT security strategy.
Other happenings: Steer clear of strategic planning myths; digital media takes on textiles with color-changing garb; an early look at Amazon’s 3-D smartphone; and more.
Get your fix of this week’s tech headlines at Searchlight!
If this week’s Searchlight demonstrates one thing, it’s that the Interwebz is consumed with all things data.
First, the biggie: Retail goliath Target says it has taken a huge step in addressing last year’s customer data snafu by appointing big-leaguer Bob DeRodes to the CIO post (former CIO Beth Jacob resigned in March). And his responsibilities don’t sound like a walk in the park: On top of the infamous breach that compromised 40 million credit cards, not to mention 70 million other records filled with customers’ personal information, DeRodes also has to tackle the digital innovation that Target CEO Gregg Steinhafel says is part of the company’s long-term strategy.
Piece o’ cake it ain’t — so is DeRodes the man for the job? Considering he was senior IT advisor to the U.S. Department of Homeland Security and the U.S. Secretary of Defense, as well as CIO at Home Depot for six years (where the company says he led a “significant IT transformation”), it sure sounds like he’s equipped to do so. Time will tell.
Onto social and mobile data: Here goes another round in the social platform boxing match! Snapchat announced Thursday that it’s adding text messaging and real-time video chat to its platform. On the same day, Foursquare revealed that it’s splitting its app and launching Swarm, a “social heat map” that will allow users to search for nearby friends and check in to share their location. Eventually, the company will ditch the check-in feature and focus on search and discovery. We’ll see how this divided version of Foursquare competes with Yelp and Facebook.
Other news this week: The White House (finally?) released a report addressing private data dealing and its potential to lead to abuse and discrimination; plus, 3-D glasses on praying mantises can actually help the robotics world!
Read all about that (data) jazz by heading over to Searchlight!
Hey, CIOs, it’s time to take a page from Facebook’s playbook and focus on user content and mobile engagement. Facebook sure has, with mobile making up an impressive 59% of its $2.27 billion in ad sales for Q1. Add to that the 34% rise in the number of users accessing the site through mobile devices, and it’s probably safe to say the social networking site is getting the hang of the whole mobile engagement thing.
Facebook, as we know, has also made some very expensive bets on how users like to communicate, with its $19 billion purchase of WhatsApp, a rejected swipe at Snapchat for $3 billion, and the launch of the Instagram direct-share function and its very own chat app, Messenger.
The social media giant is homing in on its users’ personal conversations – what CEO Mark Zuckerberg calls private content – and it wants more of them. In our latest Searchlight, take a look at how Facebook is playing it smart by enabling users to create and share more private content, further expanding what Zuckerberg says is “an ecosystem that’s [already] growing incredibly quickly.”
And it’s not just personal content you can use to further your business: public content – namely what your customers have told you about their experience with your products and how they prefer to engage you with their feedback – is also a nifty tool, say, for public relations. Panelists at the recent CDO Summit in New York urged for companies to understand their “brand story”: Know what your users are saying and use it to move the conversation.
In other tech matters this week: “Heartbleed” isn’t over yet; environmental sensors on the iPhone horizon?; Obama’s friendly soccer match – with a robot; and more.
Check them out in this week’s Searchlight column!
Ed Amoroso, chief security officer at AT&T, knows how to work up a crowd. Speaking at the recent Landmark CIO Summit in New York, Amoroso told an audience packed with financial sector CIOs to run, not walk, to get their data to the cloud. “If you’re not doing it now, run back to your security team and ask, ‘What’re our plans to move to the cloud?'” This was not some sales pitch from a cloud vendor, Amoroso said, raising his voice in emphasis. “I am here as a CSO and that is what I am doing. I am rushing to move things out to a much better model and a much more flexible model — and one that users love.”
Many people would disagree, said security expert Samuel Visner, the panel’s moderator, referring to cloud security, not to the observation that users love cloud. Visner is the general manager of global cybersecurity at Computer Sciences Corp., the IT services (including cloud) provider.
Agree or not, Amoroso said, the status quo no longer holds. Think about it. “Every person in the room is associated with some organization that created security architecture in the mid-1990s — and hasn’t changed it since,” he said. Ignorance in the name of compliance is partly to blame.
“The only reason the perimeter defense is still there, is that we have compliance requirements and we have regulators and auditors who are about 10 years behind everybody in understanding how bad the perimeter is at stopping attacks,” Amoroso said.
Best practices in cloud security?
Cybercriminals (and high schools hackers) can learn the best practices published by the regulators as easily as enterprise security teams can, he pointed out. “We’re talking sophomore year, midterm exam question: ‘How do you break into such-and-such an organization?'”
The perimeter defense still favored by many companies not only doesn’t work, it invites cyber-attacks — from a class of criminal that is smart, vigilant and unnervingly patient. Modern-day adversaries have been known to set up camp in a company’s network for the long haul — months or more — and can end up knowing more about the enterprise architecture than IT folks do. They look for R&D and the labs where it takes place. They pay attention to acquisitions and study the acquired company’s network as another way in to steal valuable data.
So if the cloud is the answer to the modern-day cybercriminal, what then passes for best security practices in the cloud? Amoroso offered up a handful, from encrypting your data to using containers for mobile data to using run-time virtualization to duplicate the data protections you have on premises in the cloud.
“You’re way better off with these kinds of modern protections,” Amoroso argued, because they are not the kinds of things any kid in a sophomore computer class could easily untangle. We’ll dig into that.
Security as competitive advantage
By the way, Amoroso isn’t the only one arguing that the perimeter defense no longer holds. This week on SearchCIO, we have two pieces saying much the same thing. “Block the cyberhacks, play cyberoffense” by columnist Harvey Koeppel, former CIO at Citigroup’s Global Consumer Group, advises any CIO who still relies on a strong perimeter defense for protecting the enterprise to “awaken from your nap.” Of course, the rub for CIOs and CSOs, is how to drum up the money to pay for investing in new security architectures. One way might be to argue that security is actually a competitive differentiator. Our editorial director, Tina Torode, interviewed IT leaders who are trying to do just that. Read their tips here.
Let us know what you think; email Linda Tucci, executive editor.
Hospital emergency personnel and other first responders were — rightfully — heralded as heroes during last year’s Boston Marathon bombing. Their valiant performance aside, there were still valuable IT lessons learned, detailed in this week’s Searchlight.
This year, Boston’s hospitals have noticeably improved their crisis management processes. Along with a new, centralized single-page disaster tracking system, which all Boston hospitals can access, social media and its by-the-minute updates will play an even bigger role for crisis responders. Hospitals will closely follow social posts, particularly Twitter, and use them as an early warning system to better prepare medical response teams.
Mining social data isn’t a boon just for crisis teams – law enforcement agencies are making interesting finds because of it as well. Turns out, criminal networks and our very own social and business networks look kind of similar. By applying social network theory to mobile phone data, police agents are getting a unique look into what really makes up the social side of crime.
Also this week: Install the Windows 8.1 update or bust!; (soft) robots of the future; bid on Bill Clinton’s ’90s laptop; and more.
Check out the week’s highlights over at our Searchlight column!
Looking for a competitive advantage? Look no further than your own data.
“Every organization has information that’s worth more [by] sharing [it] than keeping it for itself,” Frank Buytendijk, an analyst at Gartner, said at the recent Gartner Enterprise Information and Master Data Management Summit.
An easy-to-point-to example is General Electric and its sensor-driven, money-making industrial Internet. But even for companies that aren’t dealing with industrial-grade jet engines, MRI machines and wind turbines, the concept of data as an asset can open new doors, Buytendijk said.
Take, for example, John West, a U.K. canned-seafood manufacturer. The company tags each tuna it catches with a unique number, which follows the fish from the boat to the grocery-store shelf. Customers can punch that number into the company’s website and learn when and where the fish was caught and the boat that caught it.
Providing visibility into the fishing process adds consumer confidence, according to Buytendijk. “Every company can do something like this within six months,” he said. But every company won’t. By 2016, Gartner predicts only 30% of companies will have figured out ways to exploit their own data, a figure small enough to suggest that businesses that successfully find new roles for company data will have a leg up on the competition.
That’s if the data is used ethically and doesn’t exploit the customer. Amsterdam-based TomTom International, a manufacturer of automated navigation systems, found that out the hard way. A pioneer in geolocation systems, TomTom was the first to introduce bi-directional traffic information, Buytendijk said. For a monthly fee, customers’ traffic information was pushed to the TomTom servers, and consolidated traffic information more reliable than they’d find on the radio was provided to them.
Buytendijk called it a “fantastic business model,” driving revenue and creating customer value. TomTom also disclosed that it would anonymize customer data and sell it. And the company did — to the government. Selling to the agency in charge of roadwork made sense and provided even more value to the customer. But TomTom also sold data to police, who used the information to set up speed traps.
“It’s an efficient use of taxpayer money,” Buytendijk said. “But it got slaughtered in the papers.”
The negative publicity might have been prevented if TomTom had only followed a basic data privacy/ethics rule of thumb. “The more the analytical use of data is removed from your original intention of measurement, the bigger the potential issue,” Buytendijk said.
Show, don’t tell, is a lesson we all learned in high school English class. (The only spell Macbeth is under is his unseemly ambition….Evidence?!!? C-) At the Landmark CIO Summit in New York last week, CTO Abe Cytryn of Time Inc. and CTO Rajiv Pant of The New York Times suggested the schoolroom lesson also applies to communicating the value of IT.
“Show don’t tell. It means getting real visual, taking them through the experience,” said Time’s Cytryn. “Make a little video if that’s what it takes.” He employs his own design team to help with such presentations.
And don’t make it only your idea, he added. “Make it a shared idea.” Give the business side a kernel, let it marinate and check back the next week to “suss them out” on the idea.
Picking up on the “suss” perhaps, moderator Anthony Juliano, CTO of summit organizer Landmark Ventures, raised the issue of office politics. With today’s tight budgets and the perennially large egos generally associated with big companies like Time, persuading the business of the value of IT must call for political savvy.
But Cytryn was not taking the bait. “If you’re persuading it’s not their idea,” he said, sounding a little like my 11th grade English teacher. As for political savvy, “I don’t use the term politics; I use relationships.”
“That’s very political of you,” Juliano said, to laughs.
Rajiv Pant, The New York Times CTO, backed up his Time counterpart. “In particular, people like us who come from engineering background shouldn’t try to persuade, because we tend to persuade with a very mathematical, logical argument,” he said. “And that really drives stakeholders and business people away.”
What Pant has found useful over the years is to think of himself not as the CTO of a venerable institution but as a business owner, and of his colleagues as his customers. “What do I need to do to keep their business?” he said. “The moment I start to think I have a monopoly on IT for the business, I would tend perhaps to act in arrogant ways that turn off my customers.”
The first thing he does in honing his IT strategy is ask himself what he needs to do to make his business side colleagues successful. “And the best way is to ask them,” he said. “Just the act of asking somebody — whether they are the head of marketing or sales or editorial — ‘What are your goals and how can I make you successful?’ really takes people off guard,” he said, and makes them less likely to argue against your idea. (If only Macbeth had remained the good soldier — the great soldier! — he was and continued fighting for the larger cause.)
Let me know what you think about the blog post; email Linda Tucci, Executive Editor.