February 13, 2012  10:55 PM

No honor-student bumper stickers for Steve Jobs

Karen Goulart Karen Goulart Profile: Karen Goulart

Top o’ the week to you. We’re as laden with interesting Web tidbits as Adele is with Grammy awards today. Without further fanfare, here are six stories from around the Internet, the leadoff one a reminder that rising to the top doesn’t always have to start with being at the head of the class.

• From the “don’t tell your teenager” file, sometimes a GPA ain’t nothin’ but a number. There’s book smart, there’s street smart and there’s Steve Jobs smart.

• How well do you know your colleagues in marketing? If you haven’t taken the time to get to know them, you’re going to want to, because, well, it just makes good business sense for everyone. (And Gartner predicts that in five years, your CMO will be spending more on IT than you do.)

• In Forbes, Erica Dhawan, writer, speaker, leadership consultant and Wharton grad, asserts that business schools don’t prepare women for leadership roles. Do you think the same is true in IT?

• Up in the sky, it’s a bird! It’s a plane! It’s — Oracle CEO Larry Ellison trying to buy the cloud?

• Is there room for one more in the C-suite? Pondering the creation of the Chief Collaboration Officer role.

• The storm clouds are gathering. According to Michael Chertoff, former secretary of homeland security, Europe and the U.S. are on the verge of a global-scale clash on privacy laws.

February 9, 2012  10:07 PM

No more time for hesitation on Windows 7 migration

Karen Goulart Karen Goulart Profile: Karen Goulart

Forget about that 12/21/12 Mayan calendar thing. If you’re planning to make the move to Windows 7 but haven’t made any actual moves, the scariest date in your future is 4/8/14. OK, maybe it’s a bit much to compare the speculated end of days to the date Microsoft will cease to support your current operating system. But being ill-prepared for either date is bound to cause some chaos.

The unhyperbolized truth is this: If you haven’t started a Windows 7 migration, you’re already late. This was the message imparted by Gartner Inc. analyst Michael A. Silver during a recent live webinar. Early on in his talk, he pointed out that your problem isn’t just Microsoft being a big, bad stickler for deadlines. Other vendors will make your life difficult too. Last year — that is, three years before the dreaded deadline — Silver started getting phone calls from clients bemoaning that new apps couldn’t run on XP.

And it’s only going to get worse. Silver said it’s expected that 60% of important independent software vendors will have a new release that isn’t supported on Windows XP. In other words, there’s a good chance that your business is going to request an application and you’re not going to have the infrastructure to run it.

Another thing to bear in mind is cost. If you miss the Windows 7 deadline, there’s always custom support, right? Sure, but at $200,000 to $500,000 the first year and $500,000 to $1 million the second, it’s anything but budget-friendly.

If you’re wondering where you stand among your peers, a quick straw poll of 100 participants in the webinar showed that 16% hadn’t started, 49% had completed inventory and were about to start or had started testing, 6% were finished with application testing, 7% were in pilot phase, and 22% were in production deployment. Broader polling shows that 55% of companies are finished or nearly finished, 25% are just getting started, and less than 10% have yet to begin.

So, if you like system support, viable applications and a happy business, you’d best get cracking. Silver suggests allowing three to nine months for app testing and remediation, and at least three months for piloting. And while the atmosphere may be rushed, don’t go in without a solid plan. It’s also crucial that you utilize your human resources wisely — and humanely. Marathon Windows 7 migration sessions on nights and weekends will only lead to IT staff fatigue and possible mistakes, so be sure to give your team breaks. On the same note, break up responsibility: The project manager and the technical lead should not be one and the same. Also know that there could come a point where you need to bring in third-party help, so budget for it and don’t wait until the last second to use it.

So, where are you? What has your experience been? Any advice for the 10% still on the bench? Let me know in the comments.

February 7, 2012  7:41 PM

Big data is dead (maybe)! Long live analytics apps!

Linda Tucci Linda Tucci Profile: Linda Tucci

Is big data dead already? I guess that depends on how you define it. If you’re analyst Mark McDonald, a VP and fellow at Gartner Inc., and you equate big data with the kind of business intelligence (BI) technology that functions as an enterprise-wide system, then the answer is — maybe. We were talking by phone this morning about the challenges facing CIOs in developing a BI strategy.

“If you think of big data as a belief that there is going to be a single giant data warehouse just as there is a single instance of ERP, and that this is going to be the source of intelligence and the driver of business decisions, then that attitude is on the wane,” McDonald said. “What we found in this year’s surveys is a shift to a much more operational or tactical application of analytics apps.”

“I’m not quite ready to say big data is dead,” he added. “But the interest we’re seeing is in disaggregated BI, as opposed to a unified, over-mined version of the truth.”

Cost is one of the reasons big data is disaggregating, McDonald said. Like the economics of ERP, the economics of big data BI — where the data is unified and clean –is prohibitive, especially as data increases.

The way his clients describe analytics is in combination with other business functions: analytics apps and social media, analytics apps and supply chain, analytics and mobile, for example. That’s in distinction, McDonald said, to the traditional view of analytics as a “corporate shared services capability.”

In this worldview of BI, the job of CIOs is to think about analytics apps just as they would about other applications, with an emphasis on providing practical business value. “A CIO who can demonstrate the use of data in formulating business cases, in sizing up business opportunities and in making fact-based decisions is providing business value,” McDonald said.

Sounds good, but that’s kind of the problem. I’m left wondering — as with so much in IT — whether the shift away from traditional “big data” BI to analytics apps for specific business functions is more semantics than “qualitative change.” And I can’t wait to hear the hue and cry from big data experts about how big data cannot by any definition be equated with traditional BI — not to mention emails from all those big-name BI vendors selling something called big data analytics.

February 2, 2012  7:47 PM

Is SaaS BI in your ‘best interest’?

Karen Goulart Karen Goulart Profile: Karen Goulart

In writing for the Web, as in movies, sometimes there are choice bits that don’t make the final cut. (That’s why DVDs include extras, and blogs are, well, blogs.) Here is some food for thought from Gartner analyst James Richardson that didn’t make it into a recent story about the growing interest in Software as a Service (SaaS) business intelligence (BI) tools.

When asked if SaaS BI is now mature enough for the enterprise, Richardson said it was. Adoption, while still “patchy,” is definitely under way. He pointed to data from a Gartner survey of approximately 1,300 IT executives: About 30% said they used or planned to use some form of cloud-based BI or analytics tools in the next 12 months. And while much of the action on the SaaS BI scene looks to be coming from pure-play startups, the growing acceptance of cloud computing architectures in IT has nudged established BI vendors like Microsoft, SAP and IBM to offer this model, he said. IT leaders want options, and they’re not necessarily looking for all-or-nothing propositions. To that end, SaaS offerings are not yet replacing on-premises BI entirely. 

“In the main, they’re being used to augment what’s already there, often for urgent tactical needs where this delivery model offers value,” Richardson said.

In fact, of those companies already using SaaS BI solutions, 37% said “implementation cost and effort” was a key reason for their adoption. Cloud-based BI tools do offer faster, typically lower-cost and easier-to-deploy alternatives. But these solutions are not without their areas of concern that need to be scrutinized — security and privacy topping the list.

“Especially in an age of compliance, security and privacy must be considered carefully when evaluating whether to store data off-premises,” Richardson said. “Business purchases of SaaS BI and analytics systems can disrupt long-term data management, governance and stewardship processes recently put in place.”

Another risk to watch for? The unintended creation of off-premises BI silos.

“If data is now spread across multiple SaaS analytic applications, there’s a danger of firms heading back to the days when analysis was done in silos with limited connection across the enterprise,” Richardson said. “Firms must consider how, when and what data to bring back on-premises to ensure SaaS BI systems and the insights they contain are reused fully.”

Are you part of the wave looking at the cloud as a home for some of your BI tools? Maybe you’re already there. I’d be interested to hear your thoughts on whether this is a trend that’s here to stay.

February 1, 2012  12:24 AM

A security campaign against insider threats — but who’s the insider?

Linda Tucci Linda Tucci Profile: Linda Tucci

During World War II, when it was discovered that U.S. soldiers were being targeted by the enemy through unconventional means — alcohol, prostitutes — to give up critical information, the military launched an all-out security campaign. “Loose lips sink ships” was one of the campaign’s slogans. There were scores of other materials advising the troops to keep mum, including a document handed to every soldier entering the battle area that listed 10 things never to write home about. The idea, said Jeff Schmidt, was to make soldiers aware of the gravity of the threat and remind them that they — the rank and file — were critical partners in American security.

“We have a lot to learn there,” said Schmidt, founder and CEO at security consulting firm JAS Global Advisors LLC. “Employees need to be trained to feel like they have a stake in maintaining the security of their organizations. They can’t act like they are protected by what can seem like a gigantic security apparatus.”

Schmidt was talking to me about what security experts saw in 2011 that was new or different, and about the threats most likely to plague CIOs this year. He works with a lot of government agencies and Fortune 100 companies in risk-prone industries like defense and energy. While intentional insider threats are “as old as the hills,” in his view it’s the unintentional security threats — those regular old phishing attacks coupled with human error — that pose the clear and present danger. Attacks like the single email attachment, for example, that was crafted to trick the HR department at RSA — a security firm! — and that in a flash compromised millions of the world’s most trusted identification tokens.

His message to CIOs: Educate, educate, educate employees, and make them part of the security team — or ships will sink.

Of course, there’s a problem there with that team mentality, as anyone knows who is witness to, say, the current state of politics or to the economic pain heaped on many Americans in recent years or — and here we’re going out on a limb — who has embraced social networking heart and soul. For employees threatened by layoffs, what motive is there to pitch in to prevent the ship from sinking if their part of the ship has already sunk? (In fact, companies have seen insider theft rise, said Schmidt, even among longtime, trusted employees. “Desperation is a powerful driver,” he notes.) Then there is the generation reared on free digital file-sharing, free encyclopedias and the habit of sharing — with everybody. How can CIOs drive home the notion that company data is precious when information has been so devalued and a company’s insiders feel like outsiders?

January 26, 2012  10:06 PM

Interest growing in cloud-based business intelligence tools

Karen Goulart Karen Goulart Profile: Karen Goulart

Coincidence? Or a truly topically in-tune editor? I’ll go with the latter. On the same day I was assigned a story on the place of cloud-based business intelligence (BI) in the enterprise, Gartner Inc. released a telling study on the subject — and I learned that cloud consulting firm ThinkStrategies Inc. has a conference specifically dedicated to Software as a Service (SaaS) BI coming up in April. Cloud-based BI was literally the hot IT topic du jour.

It certainly makes sense. Back in the waning days of 2011, CIO Executive Board Executive Director Shvetank Shah told us that BI projects were going to be where IT leaders focused their time, attention and money in 2012. In fact, he noted that this is what we’ll be looking at for the next two or three years. The focus on BI is part of a “megatrend” of projects shifting away from big ERP to big information.

A brief about Gartner’s study suggests this shift seems to be playing out right now. But what role will the cloud play? According to the consultancy, nearly one-third of 1,364 IT manager and business users surveyed in Q4 2011 already use or plan to use cloud-based BI tools to augment their BI functions within the next 12 months. A total of 17% said they have replaced or plan to replace parts of their core BI functions with a SaaS offering. What’s behind this? The key drivers Gartner cites are time to value, cost concerns and lack of available expertise.

So, as for the aforementioned assignment: I’ll be digging a little deeper, talking to folks who’ve already taken their BI to the cloud and if or when experts suggest you should too. One user of cloud-based business intelligence tools I spoke with today can’t imagine his company without them. Very pleased with what he and his end users are able to accomplish, he hooked me into an impromptu online demonstration. It certainly looks to be an exceptional tool for this food distribution company that does $3.5 billion in sales. But is cloud based BI right — and ready — to take the enterprise by storm? I’ll bring you some answers on next week.

January 23, 2012  8:08 PM

The CIO and the extended enterprise

Christina Torode Christina Torode Profile: Christina Torode

It’s a given that the days of worrying about only what is within your four walls are long gone. Outsourcing took care of that a long time ago. The reach of the CIO domain is going beyond even that relationship, however, and into the “extended enterprise,” as some are calling it.

External customers, internal employees and partners are dragging data further and further away from the confines of a given data center or desktop PC and into the realm of mobile apps, social forums and the cloud. In a tip running on this week on securing the extended enterprise, Forrester Research Inc. security expert Chenxi Wang explains the extended enterprise as follows:

“Today’s businesses must constantly create new products and services, expand their geographic presence, streamline operations, and deliver topnotch customer services. To do this, your business will increasingly use third-party and cloud services to reduce cost and increase speed to market. Your business will unleash the creativity of your employees and customers with mobile, social and rich media technologies. More and more, devices — meaning cameras, cars, home electronics and even musical instruments — come equipped with microprocessors and will become conduits for businesses to deliver services and engage customers. To stay relevant, your enterprise must extend itself continuously to include new peripherals and meet new business scenarios. Forrester Research defines this vision of business as the extended enterprise, one for which a business function is rarely, if ever, a self-contained workflow within the infrastructure confines of the company.”

The term “extended enterprise” nicely ties together many of the topics we’ve writing about for the past year, the most prominent one being the consumerization of IT or, as our Senior News Writer Linda Tucci likes to call it, the “democratization of IT.” Regardless of what it is called, it is yet another opportunity (some might call it a can of worms) that CIOs are in charge of securing and navigating for the business.

January 19, 2012  8:38 PM

CIOs: Should your next IT hire be a consumer advocate?

Linda Tucci Linda Tucci Profile: Linda Tucci

Should IT organizations hire consumer advocates? The idea came up at our company’s annual editorial meeting during a panel discussion involving our own CIO, his senior director of IT operations and the chief information security officer (CISO) of the largest protected health information data warehouse in the U.S.

The panel’s topic, “A day in the life of an IT pro,” was intended to give reporters fresh insights into how IT pros spend their days, and it didn’t disappoint, covering many of the issues we at strive to understand better from the CIO’s point of view. Topics ranged from how technology investment decisions get made (methodically) to managing vendors (oy!), to which of the many buzzwords tech reporters bandy about are actually things IT pros need to pay attention to (“consumerization of IT“).

(A few tidbits before I get to the takeaway here: Telco vendors should be ashamed of the way they treat their IT customers. It’s a good idea to Google the phrase “[insert product name] sucks” before pulling the trigger on a technology purchase. EBay is attacked an average 100,000 times per day.)

Hiring a consumer advocate who belongs to the IT organization was a suggestion that came up in answer to a question about how IT roles are changing — must change! — to keep up with business demands. Standardizing processes has helped. Methods like Scrum, and waterfall too, have taken some of the hit-or-miss quality out of software development. But the standard practice of a business analyst or a business relationship manager collecting business requirements and translating them to IT? That was insufficient, the CISO on the panel said. The inventors of smartphones and tablets and social networking sites aren’t going to business relationship managers with their ideas. They are dealing directly with consumers. IT shops need a consumer advocate among their ranks, if they hope to keep up with what business users expect from technology, he said. What do you think?

January 16, 2012  6:21 PM

Let end-user freedom reign, but at the cost of rogue technology?

Christina Torode Christina Torode Profile: Christina Torode

One of my favorite movies is Poltergeist, with its never-ending quotable lines. “What’s happening?” probably is the most famous; but my favorite is when actress Zelda Rubinstein, who plays the spiritualist Tangina, claims, “This house is clean.” Not so, if you follow the movie, the premise of which is, don’t build a new housing development on top of a graveyard.

In many ways this movie reminds me of an IT department (bear with me here). CIOs inherit all the decisions, good and bad, that their predecessors made. As a result, they often are being asked to “clean house” — to simplify, to automate, to gain efficiencies and to cut down on rogue technology.

Looking over this year’s CIO Innovators profiles, you’ll find that CIOs clearly have cleaned house — without the help of spiritual guides. Among them is Steven Johns, the subject of our first CIO Innovator profile in 2011. He rolled up his sleeves when he inherited an “infrastructure overhaul” on joining H.B. Fuller Co. in 2007. His plan of attack was to take back the core functions of IT from a third-party outsourcing giant, update legacy systems and move non-core functions to the cloud. This “turnaround guy” met the needs of users through the adoption of cloud solutions; those in turn reduced rogue technology. He also cleaned up some big messes that had been left behind: systems in place since the 1980s and no standard collaboration system across the global company, to name just two.

But as CIOs begin to build the next foundations in an age of cloud computing, shared IT services and the consumerization of IT, I wonder whether they are potentially adding a weak foundational layer, at least in terms of controlling rogue technology. Are they adding to the problem as they accommodate the age of people-centric computing?

Self-service provisioning, for example, often is talked about as a must-have for shared services to succeed. Self-service provisioning portals also are a tenet of cloud computing. Some CIOs believe that “self-services” — putting the power of technology choice into the hands of users — is the future of any good IT services organization. Left to their own devices, however, will users really make the right decisions?

Will rogue technology, which leads to silos of information — something CIOs are trying to undo in this Information Age — only get worse?

Sure, making it easier for users to get their hands on the technology they need is not only smart but inevitable. On the other hand, what precautions should CIOs be taking to lay a solid self-service foundation?

January 12, 2012  4:26 PM

CIOs proactively tracking technology investments back to business

Karen Goulart Karen Goulart Profile: Karen Goulart

It’s a question as old as information technology itself: “How do I prove the value of my technology investments to the business?” What makes the question so vexing is that there’s never been an easy answer — or any answer, period. There is no one-size-fits-all solution; and if someone were to come up with one, well, it probably would become obsolete in a matter of months. And then there’s the real kicker: This question has been plaguing CIOs for years, but it’s never been more important to answer it than it is right now, in the slippery era of all things global and mobile.

So, although I wish this paragraph contained some crazy, silver-bullet solution of the big “…until now!” kind, that’s sadly not the case. What I do have is some encouragement from CIOs who believe that proving the value of technology investments can reasonably be accomplished. One CIO is being practical in his approach, the other is scoring points with the business through creative thinking. Neither is trying to reinvent the wheel; they’re just looking at what they have to work with and running with it. And perhaps most importantly, both are being proactive: They didn’t wait for the business to come to them with demands for financial answers.

I’ll delve into more details in an upcoming story for about monetizing IT, but one CIO taking the practical approach is Raul Cruz, CIO at AECOM Technology Corp., an engineering and architectural design firm with more than 45,000 employees around the world. Two years ago, he implemented a financial management framework that gets truly detailed in its tracking of costs associated with services, activities and projects. He’s applying that information to a SaaS solution that will make all those figures accessible to his team and, of course, the business.

Then there is Larry Bonfante, CIO of the United States Tennis Association. What he’s done over the last few years might be considered a kind of “creative IT recycling.” This phrase, which I just made up, isn’t meant to cheapen his efforts by any means — in fact, they have made the USTA quite a bit of money. Here’s just one example: The USTA runs the widely attended US Open. The 700,000 or so attendees gotta eat; and when they do, they can visit the food village in the center of the event campus or an outlying kiosk. Choices are nice, but until recently, the outlying kiosks could accept only cash because they were too far away from the central village to connect to the system. Enter IT with a Wi-Fi solution, and those kiosks now can take credit and debit cards — and the USTA can take in an additional $200,000 in revenue. You know the business had to, ahem, love that.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: