Results

My Involuntary Medical Tourism - and a bad Pattern for the U.S.

My Involuntary Medical Tourism - and a bad Pattern for the U.S.

1

I was in Singapore a few weeks ago for a mixture of work (digital innovation) and play (attend a wedding). Good times.

Until the night before the wedding, when with our Australian friends who’d kindly flown up to meet us, we went out to the deservedly famed Indian restaurant in the PanPacific hotel.

You’ll note that the entrance is pretty dark, to prepare you for the quite dramatic lighting inside.  My friend and I, strolling in, approached the image of Ganesha you see in the picture. Unfortunately I overlooked the 5” high platform on which the Remover of Obstacles was displayed, and tripped — as I fell, I caught a finger on the crossbar on the wall resulting in the all but complete evulsion of the nail (you don’t want me to explain.)

I mentioned the hotel by name above because the staff could not have been more solicitous and competent, and after providing me a napkin full of ice suggested I visit Raffles Hospital, a mile away.

Here begins the voyage of discovery. 

My wife and I appeared at the emergency room check-in desk, and before any administrative questions were asked I was seated in an examination room. The doctor appeared within two minutes to take a look.  He offered me two options.  They could remove the nail, basically hanging by a thread, and I would just wait to see if a new one would grow back; or they could remove it, wash it, reinsert it where it belonged, and stitch it onto the finger.  He told me the latter would improve the chance of a normal nail growing in, so that’s what I chose.

Half an hour later we were done, including a precautionary X-ray I requested. I went back to my hotel with a kit of dressing supplies and medications.

The total bill was 465 Singapore Dollars, or $372. (That X-ray I asked for was taken and read for $80.)

When I got back to the US I went to see my doctor, who said that she’d never heard of reinserting a nail back into a finger, and admired how well it was healing.  She also said that at Mass General Hospital the cost would have been in the thousands.

Let's review: Instant service; a treatment with a great outcome that likely wouldn’t have been tried in the U.S.; and a cost an order of magnitude less than the U.S. equivalent.

Travel indeed broadens the mind.

So it was with a changed point of view that I read of the difficulties of the U.S. blood industry, facing sharply declining demand. The trend is “wreaking havoc in the blood bank business, forcing a wave of mergers and job cutbacks unlike anything the industry…has ever seen.” Transfusions are down from 15 million to 11 million units over the last five years, it turns out, despite the aging of the population, costing the industry $1.5 billion in revenue.

Granted, this was in the business section.  But I couldn’t help wondering why the medical advances at the root of this development weren’t the headline — e.g. total hip replacement formerly required 750ml (1.5 pints) of blood and now uses only 200ml.

To return to the difference in cost between Raffles and Mass General – perhaps this has something to do with it: “Nonprofit organizations collect whole blood from unpaid donors, but hospitals may pay $225 to $240 a unit, according to executives in the business, which covers a variety of costs, including testing. If the unit is billed to the patient, the price can be $1,000 or more.” – CAM

New C-Suite Next-Generation Customer Experience Chief Customer Officer Chief Executive Officer

Bye, Bye Buyosphere – A journey of disruption, disrupted

Bye, Bye Buyosphere – A journey of disruption, disrupted

1

Focusing on the customer journey is never easy. After all, customers are fickle, transitory, loyal and contradictory. I am somebody’s customer. You are. We are all somebody’s customer. And being a customer is an emotional experience. We buy on whim, impulse or trigger. We may plan, research and save as long as we like, but decisions can be swayed by friends, connections, a good salesperson. Or even a lingering smell.

But knowing this doesn’t make easy for businesses – even marketers don’t make it easy for marketers. With every click, interaction and purchase, with every review, tweet, blog post or call, connected consumers like us are shaving away the stubble of established brands. We are eroding the protective layers that brands have built up over time to insulate themselves from us.

We know this has been happening for some time. It is a shift of power in the buying process away from brands to consumers. It is digital disruption in its purest form – connected consumers tapping into the opportunities and power of the internet to out flank the efforts of brands. And helping us to chart this disruption – indeed helping us to move from idea to practice, has been Tara Hunt, author of (amongst other things) The Whuffie Factor, coworking pioneer and theorist (in a very accessible way). In many ways, Tara has been a harmonising voice in a technology dominated world – reminding us that its the people that matter most.

Tara’s 2009 presentation on vendor relationship management has influenced the thinking of many (or even found its way into the thinking of many surreptitiously), including myself. But never content to let ideas percolate in isolation, Tara  went beyond the theory into practice, bootstrapping and launching Buyosphere, a fashion suggestion and style matching website. I can remember signing up myself, wondering how it may work out here in Australia. It was an idea ahead of its time.

In late 2012, after growing and struggling to scale, Tara stepped out of Buyosphere, taking a role with Toronto based communications and engagement company, MSLGROUP. As she explained at the time, “If we were going down, let’s go down in a blaze of glory. Or at least with a product we could be proud of.”

Yesterday, in classic style, Tara shared the next stage of the journey – saying goodbye to Buyosphere:

Once upon a time there were three startup founders who had a dream. They were going to build something that solved fashion search. And they spent 3 years of their lives, their entire savings and pretty much all of their energy on it. Fortunately, they built something great and learned a whole bunch. Unfortunately, they ran out of money, time and energy and had to go back to work and once they abandoned the site, it never took off. xoxo Buyosphere. We love you.

Watch this video and you will hear the very personal, emotional and exciting journey that Tara and the team went through. It’s the journey that so many of us take – or wish we had taken. And while I too, feel sad, to see from a distance, that Buyosphere has ended, I also feel great hope. There have been lessons learned and friendships forged. This is a story of disruption, disrupted, not destroyed. And I for one can’t wait to know what’s next – not just from Tara but from all who build on her experiences.

Marketing Transformation Matrix Commerce Next-Generation Customer Experience B2C CX Chief Customer Officer Chief Marketing Officer Chief Digital Officer Chief People Officer Chief Human Resources Officer

The Apple Privacy Watch

The Apple Privacy Watch

Update 22 September 2014

Last week, Apple suddenly went from silent to expansive on privacy, and the thrust of my blog straight after the Apple Watch announcement is now wrong. Apple posted a letter from CEO Tim Cook at www.apple.com/privacy along with a document that sets outs how "We’ve built privacy into the things you use every day"

The paper is very interesting. It's a sophisticated and balanced account of policy, business strategy and technology elements that go to create privacy. Apple highlights that they:

  • forswear the exploitation of customer data
  • do not scan content or messages
  • do not let their small "iAd" business take data from other Apple departments
  • require certain privacy protective practices on the part of their health app developers.

They have also provided quite decent information about how Siri and health data is handled.

Apple's stated privacy posture is all about respect and self-restraint. Setting out these principles and commitments is a very welcome development indeed. I congratulate them.

 

Today Apple launched their much anticipated wrist watch, described by CEO Tim Cook as "the most personal device they have ever developed". He got that right!

Rather more than a watch, it's a sort of guardian angel. The Apple Watch has Siri built-in, along with new haptic sensors and buzzers, a heartbeat monitor, accelerometer, and naturally the GPS and Wi-Fi geolocation capability to track your speed and position throughout the day. So they say "Apple Watch is an all-day fitness tracker and a highly advanced sports watch in a single device".

 

The Apple Watch will be a paragon of digital disruption. To understand and master disruption today requires the coordination of mobility, Big Data, the cloud and user interfaces. These cannot be treated as isolated technologies, so when a company like Apple controls them all, at scale, real transformation follows.

Thus Apple is one of the few businesses that can make promises like this: "Over time, Apple Watch gets to know you the way a good personal trainer would". In this we hear echoes of the smarts that power Siri, and we are reminded that amid the novel intimacy we have with these devices, many serious privacy problems have yet to be resolved.

The Apple Event today was a play in four acts.

  • Act I: the iPhone 6 release
  • Act II: Apple Pay launch
  • Act III: the Apple Watch announcement
  • Act IV: U2 played live and released their new album free on iTunes!

It was fascinating to watch the thematic differences across these stanzas.  Do different Apple business units have different business cultures?  Or, as seems more likely to me, do they experiement with customer responses across various product lines?  Look at this stark contrast: With Apple Pay, they stressed security and privacy; it was a front line selling point.  We were told about the Secure Element, the way card numbers are replaced by random numbers (tokenization), and an architecture where Apple cannot see how much you spend nor where you spend it.  On the other hand, when it came to the Apple Watch and its integrated health sensors, privacy wasn't mentioned, not at all. We are left to deduce that aggregating personal health data at Apple's servers - or letting app developers do what they like with PII - is intrinsic to the health apps business model.  

The cornerstones of data privacy include Collection Limitation, Use Limitation (or "Purpose Specification") and Openness. Custodians of our Personally Identifiable Information (PII) should refrain from collecting and retaining PII they don't really need; they should specify what they do with PII and restrict unrelated secondary usage; and they should tell people what they're doing, generally in a Privacy Policy. With Siri, Apple sadly fails all these tests.

The Apple Privacy Policy is altogether silent on Siri. The document details the sorts of information collected through its overt business processes like registration, sales and support, but it says nothing about the voice recordings and transcripts of Siri communications. Neither does the Siri FAQ mention what is done with all that data. It's quite an omission, seeing that when you dictate an SMS or an email to Siri, Apple retains a copy of communications that are normally out of bounds for your telecomms carrier.

It's been left to journalists to try and find out what Apple does with the information it mines from Siri. Wired magazine discovered eventually that Apple retains masked Siri voice recordings for six months; it then purportedly de-identifies them and keeps them for a further 18 months, for research. Yet even these explanations don't touch on the extracted contents of the communications, nor the metadata, like the trends and correlations that go to Siri's learning. If the purpose of Siri is ostensibly to automate the operation of the iPhone and its apps, then Apple should be refrain from using the by-products of Siri's voice processing for anything else. But we just don't know what they do, and Apple imposes no self-restraint.

We should hope for radically greater transparency with the Apple Watch and its health apps. Most of the watch's data processing and analytics will be carried out in the cloud. So Apple will come to hold detailed records of its users' exercise regimes, their performance figures, trend data and correlations. These are health records. Inevitably, health applications will take in other medical data, like food diaries entered by users, statistics imported from other databases, and detailed measurements from Internet-connected scales, blood pressure monitors and even medical devices. Apple will see what we're doing to improve our health, day by day, year on year. They will come to know more about what's making us healthy and what's not than we do ourselves.

 

Now, the potential benefits from this sort of personal technology to self-managed care and preventative medicine are enormous. But so are the data management and privacy obligations.

Within the US, Apple will doubtless be taking steps to avoid falling under the stringent HIPAA regulations, yet in the rest of the world, a more subtle but far-reaching problem looms. Many broad based data privacy regimes forbid the collection of health information without consent. And the laws of the European Union, Australia, New Zealand and elsewhere are generally technology neutral. This means that data collected directly from patients or doctors, and fresh data collected by way of automated algorithms are treated essentially the same way. So when a sophisticated health management app running in the cloud somewhere mines all that exercise and lifestyle data, and starts to make inferences about health and wellbeing, great care needs to be taken that the indiviuals concerned know what's going on in advance, and have given their informed consent.

One of the deep privacy challenges in Big Data is that data miners don't know what they're going to find. Even with the best will in the world, a company can struggle to say in its Privacy Policy what PII is expects to extract (and thus collect) in future from the raw data it collects today. At Constellation Research we've been fleshing out a new sort of compact between businesses and individuals that seeks to keep users abreast of developments in data analytics, and promises to provide people with proper control of personal Big Data results.

It ought to be possible to expressly opt in to Big Data processes when you can understand the pros and cons and the net benefits, and to later opt out, and opt back in again, as the benefit equation shifts over time. But even visualising the products of Big Data is hard; I believe graphical user interfaces (GUIs) to allow people to comprehend and actively control the process will be one of the great software design problems of our age.

Apple are obviously preeminent in GUI and user experience innovation. You would think if anyone can create the novel yet intuitive interfaces desperately needed to control Big Data PII, Apple can. But first they will have to embrace their responsibilities for the increasingly intimate details they are helping themselves to. If the Apple Watch is "the most personal device they've ever designed" then let's see privacy and data protection commitments to match.

New C-Suite Digital Safety, Privacy & Cybersecurity Security Zero Trust Chief Customer Officer Chief Digital Officer Chief Information Security Officer Chief Privacy Officer

SuperNova Award Polls Now Open

SuperNova Award Polls Now Open

The 2014 SuperNova Award polls are now open! 

Cast your votes for the winners of the 2014 SuperNova Awards by viewing the individual application and clicking "Vote for this Entry" button. Polls close September 30, 3014. 

View applications and vote here: https://www.constellationr.com/events/supernova/2014

Why should you vote? 

At Constellation, we believe that the widespread adoption of disruptive technology cannot be accomplished without enthusiasm from the greater public around new and emerging technologies. Your vote, your enthusiasm, helps spread the promise of disruptive technology to the rest of society. 

“Constellation encourages members of the public to cast their votes for the 2014 SuperNova Awards. This is an important element of the competition because while we value the opinion of our SuperNova Award judges, we want to make sure the deciding power is not concentrated in the hands of a few. Constellation prides itself as model of democratized access to information and outcomes,” commented R “Ray” Wang, Chairman and Founder of Constellation Research, Inc.

One winner will be named in each of the seven categories. Winners will be announced live, on stage at the SuperNova Award Gala Dinner on October 29, 2014. The SuperNova Award Gala Dinner is held the first night of Constellation's Connected Enterprise.  


Data to Decisions Future of Work Marketing Transformation Matrix Commerce New C-Suite Next-Generation Customer Experience Tech Optimization Innovation & Product-led Growth AR Executive Events AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership Chief Customer Officer Chief Digital Officer Chief Executive Officer Chief Financial Officer Chief Information Officer Chief Marketing Officer Chief People Officer Chief Procurement Officer Chief Supply Chain Officer Chief Technology Officer Chief Data Officer Chief Analytics Officer Chief Information Security Officer Chief Operating Officer

Box Hits Puberty and Starts the Journey From Product to Platform

Box Hits Puberty and Starts the Journey From Product to Platform

Remember those awkward teenage years when you were no longer a child but not quite an adult? That is where Box finds itself today, as it matures from a cloud based file storage and sharing company to one that is facing the expectations and challenges of adolescence. Last week at their annual BoxWorks conference, in front of 5000+ customers, partners, press and analysts Box set out to answer the life defining questions, "What do I want to be when I grow up? What do I want to do with my life?"

For Box the answers are starting to take shape, as they work to shed the image of "file sync and shareâ? (which is a very crowded market) by focusing product development and marketing on what they call â??content-centric collaborationâ?.  Below Iâ??ll explain what that means, but if you don't have to time to read any further then here's my main take away:  

"Box is no longer simply a product, but instead a platform for building applications that leverage content at the center of their process or workflow."

What We Did Hear

1) Box + Office365: people will be able to roundtrip edit and store documents between Box and Office365

My Point of View (MyPOV): Box began by promoting themselves as an alternative to Microsoft SharePoint. Back in the old SharePoint on premises days, Box had a very competitive â??cloud-alternativeâ? story.  Fast forward to today, and Microsoft has quite a compelling cloud portfolio in Office 365 and Microsoft One Drive. I'm glad to see that Box has realized they need to integrate with, not compete against Microsoft.

2) Box Notes: usability and feature improvements, including the addition of tables

MyPOV: Box Notes provides a very simple online word processor which enables teams to work on a document at the same time. This is much more effective than having people update a document with their comments or revisions and then upload a new revision. At this time Box Notes is still very simple and not a competitor to Microsoft Word or Google Docs. Still, the addition of tables provides some much needed structure, enabling people to create rows and columns of data which will lead to more advanced uses of Box Notes.

3) Box Preview: The addition of annotations, meaning you can add comments anywhere on the document, picture or slide.

MyPOV: I'??d much rather it be named Box Viewer, but that's not my call! Annotations are going to be a great addition to the collaborative functionality of Box, as in place comments are much more useful than just having a series of discussions along the side of the page with no link to what they are referring to. Note: this is not unique as products like Convo have had this for a long time. I'd love to see Box acquire a company like Convo and improve not just their annotations capabilities, but their enterprise social networking / newsfeed capabilities as well.

4) Box Workflow: This is the bringing together of policies, rules and metadata. The simple explanation is that administrators will have the ability to define rules that perform actions when certain events occur. For example, if a file is placed in a certain folder then assign a task. Or, if a file contains a credit card number then place it in a quarantine directory for approval.

MyPOV: The was originally announced at BoxWorks 2013 and after the event I blogged about how significant this is. In this first release the actions and triggers are pretty simple. Box does plan on providing more advanced features like conditional branching in the future. Metadata, or the addition of custom fields to a form is a very significant step in defining the future of Box as a platform for building applications. I will cover this in more detail below, and in even more detail in an upcoming Constellation Research paper.

5) Box for Industries: Box will be selling solutions tailored for specific industries; starting with Retail, Healthcare and Media and Entertainment.

MyPOV: One of Box's strengths as a company has been hiring people in sales and product design who have deep understanding of specific industries. That means, when Box engages with customers in industries like Healthcare, Finance, or Legal they are able to understand their needs and propose appropriate solutions. The addition of specific product offerings tailored for industries mirrors the go to market strategies of software giants like IBM, SAP, Oracle and Infor.


What We Didn't Hear

I was disappointed that Box did not make any announcements in the following areas:

1) Analytics and Insight: Given last year's acquisition of DLoop, I had hoped to see some features from Box that provide at least the most basic look into the people and content in your network. Currently regular Box users (not admins) can not see things like Most Downloaded files, Most Active Conversations, Most Liked Content, etc.  Box also lacks and recommendation features linking similar type of documents together. For example: If you'??re reading this page about bikes, you may also want to read this page. By comparison, Microsoft has put a great deal of work into their Office Graph and Delve products, which enable people to easily see the most important and relevant people and content.

2) No Improvements In the Activity Stream (social) or a Welcome Page/Dashboard: One of my biggest complaints about the Box User Experience is that it is very hard to see what is happening in your network. For the most part, Box's UI is just a series of folders and files. When I log onto Box (web or mobile) I'd like to be presented with a personal dashboard that shows me what my colleagues are doing, events that have taken place around my content, what new content is available, and a whole lot more. This dashboard should offer a variety of sorting, filtering and notification options. Today Box is essentially just File Manager (Window) or Finder (Mac) in the cloud. I'd like to see it be much more of a destination for getting work done.

3) No Improvement In Task Management: Box enables people to assign to-dos to files, but the task management features pretty much end there.  They do partner with several Task Management tools such as Asana, AtTask, Azendoo, Clarizen, LiquidPlanner, Wrike and others but I'd like to see more native functionality.  At a minimum, show me a view of my tasks, with the ability to sort on date and status.  Ideally, purchase one of these vendors and offer great project management capabilities.


The Road Ahead. Platform, Not Product.

More important than any one product announcement is the larger picture of Box's overall goal. To discuss that, let's start with looking at what Box does:  

In the most simple form Box enables people to store files on the internet so that they are accessible at any time from a variety of devices.  

While simply storing and sharing files on the internet instead of on a local hard-drive has value, the true benefits become more apparent when those files are shared as part of a business process. Some examples includes: Sharing an RFP contract between a customer and a company; doctors discussing an X-ray; Marketing sharing product images; or Finance collaborating on invoicing data.  

But what if instead of Box being a part of a process, Box actually became the platform for building the application that handles the entire process?  That's what Box is hoping to become. In this scenario, instead of an insurance company using an application that simply links to a claims form that is stored in Box, the insurance company would develop an web or mobile application that uses the file storage and display capabilities of Box. Similarly, instead of using medical software and then linking to a file stored in Box, imagine doctors and clinicians collaborating on medical images or videos using a web or mobile applications that leveraged Box'??s security, storage, sharing and collaboration features.

That is precisely what Box Business Partner Novacoast has done with Full Resolution Health, an application that parents and clinicians can use to aid in the diagnosis and treatment of autism. Via a mobile application, parents can upload videos of their children, and then clinicians access and assess those videos on the web. At no time does either party know that they are using Box.

Image:Box Hits Puberty and Starts the Journey From Product to Platform


MyPOV: I'm glad to see Box looking at a much broader market than just storing, sharing and syncing files. Box is building a large ecosystem of business partners and independent developers, which is a good sign of a growing and popular platform, as these folks tend to go with the opportunity (i.e. money) is.

For the time being, competitors like Google Drive and Microsoft One Drive are not focusing their go to market strategies on a similar application development story. However, Box is not alone in this space. Salesforce offers a compelling platform in SalesForce1 and Salesforce Files and Amazon's Web Services a dominant platform for developers has recently announced their own integrated file sharing service named Zocalo. Microsoft has a huge partner ecosystem that could start to take advantage of OneDrive. Box's main startup competitor DropBox also had a large partner ecosystem, and is starting to convert some of their massive consumer following into enterprise (business) customers. Finally, IBM should not be discounted with their BlueMix development platform, SoftLayer cloud infrastructure and Connections collaboration and file sharing capabilities.

In an upcoming Constellation Research Report we'll be taking a deeper look at Box's workflow features including Policies and Automation, and metadata.
 

Future of Work Data to Decisions Innovation & Product-led Growth New C-Suite Marketing Transformation Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity box Chief Information Officer Chief Digital Officer

Event Report: SAP Australian User Group Summit Highlights Systematic Concerns About SAP

Event Report: SAP Australian User Group Summit Highlights Systematic Concerns About SAP

Australian Users Concerns About SAP Similar To Other Global Users

Over 500 Australian SAP users gathered between September 8th and 9th, 2014 at the Sydney Hilton for the annual user conference.  Users came from IT roles, marketing, HR, and finance.  In speaking to over 100 attendees, key concerns include:

@rwang0 #SAUGSummit 2014

  • Lack of clarity in future product road map.   Users wanted to know what was next after their ECC investment.  Most expressed frustration with integrating acquired products, dealing with disparate data models, and inconsistent country level support.  A large government customer stated “It’s taking us much longer to integrate with SAP acquired products than necessary. You’d think they had done their homework during post merger integration”.
  • Investment in industry specific functionality.  While SAP has restarted its focus on industries, most customers sought functionality requests made years ago.  As smaller customers, they felt ignored by SAP in getting their requests prioritized for development with no additional account spend.  A logistics company expressed frustration noting, “We were early customers in 2008.  The requests we made for industry extensions are common requests among our peer group. It’s been six years and our salesrep ignores our requests and we feel SAP does not care to improve functionality”
  • Rash of key management and product development departures.  Attendees expressed concerns about CTO Vishal Sikka’s departure and additional management team departures from Success Factors and other acquisitions.  One mining and natural resources customer stated, “We fear SAP is headed back to ABAP development and abandoning the innovations that Vishal pushed on the Germans”
  • Over emphasis on HANA without showing business value.  While Paul Young from SAP made a case on why one should use HANA to accelerate innovation, most users did not see the business value of HANA.  As a financial services customer pointed out, “SAP HANA licenses are not discounted, the cost structure is too high, the product still unstable, and we don’t have enough trained resources to continue our pilot.  We will probably cancel out this from our contract for 2015?
  • Value for maintenance.  Several customers on MaxAttention and other support considered third party maintenance options including Rimini Street. They did not see the value of their maintenance dollar in the type of support they received for the premium they paid.  As one government client noted, “Our maintenance dollars have been squandered by SAP’s acquisitions (see Figure 1).  Instead of investing in the core product, they went on an acquisitions and development binge.  All we wanted were improvements to the core product, not these wild goose chases in technologies we don’t need”
  • Ability to return unused licenses.  Many clients who are in declining industries, seek ways to park or return licenses.  These customers have had no luck in reaching SAP to have these conversations.  One frustrated manufacturer noted, “The sales reps have ignored my calls, adding to the frustration.  He even told me that I’m ignored because because I’m not growing his account value”.

Figure 1.  Customers Seek Understanding On Where Their Maintenance Dollars Have Been Invested

 

@rwang0 @SAP Landscape

The Bottom Line: SAP Users Concerned With Their Overall Investment

The experiences faced by Australian users, represents similar concerns with SAP customers around the world.  While larger customers paying at over $4M in maintenance receive VIP attention by SAP, most customers express frustration with investment in the current product.  Meanwhile,  sales reps continue to use “why don’t you move to SAP HANA” as the panacea for all ills, but customers no longer buy the line.  Even SAP’s Chairman Hasso Plattner has expressed frustration at customers in a blog on “The benefits of the business suite on SAP HANA“.  Overall, customers want to know if SAP has a direction.  Can they justify their maintenance value.  Will they keep their brand promise of building solid software that’s not only mission critical today, but also moves to where customer’s requirements are for the future?

Recommendations: Stabilize Your SAP Investment And Plan For The Future

While determining where to go in the future, Constellation recommends the following strategies in determining a go forward strategy with not only SAP, but also legacy ERP vendors on the journey to digital business and digital transformation. (see Figure 2).

  • Ask for an order doc and price list
  • Use third party maintenance as a lever
  • Battle indirect licensing
  • Understand your license usage
  • Never, ever, bundle your contracts
  • Focus on designing SOA Principles
  • Stabilize the core, invest in cloud
  • Remember you are the boss of the relationship

Figure 2.  Four Paths Of Modernizing Your Legacy Apps

@rwang0 Four Paths To Legacy Apps Modernization

Your POV

How do you feel about your SAP investment?  Is SAP meeting your needs or are you going elsewhere? Add your comments to the blog or reach me via email: R (at) ConstellationR (dot) com or R (at) SoftwareInsider (dot) com.

Please let us know if you need help with vendor selection or contract negotiation efforts.  Here’s how we can assist:

  • Vendor selection
  • Implementation partner selection
  • Connecting with other pioneers
  • Sharing best practices
  • Designing a next gen apps strategy
  • Providing contract negotiations and software licensing support
  • Demystifying software licensing

Related Research

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions.  However, happy to correct any errors upon email receipt.

Copyright © 2001 – 2014 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience!

 

The post Event Report: SAP Australian User Group Summit Highlights Systematic Concerns About SAP appeared first on A Software Insider's Point of View.

 

Tech Optimization Innovation & Product-led Growth Data to Decisions Future of Work New C-Suite Digital Safety, Privacy & Cybersecurity User Event User Conference Event Report SoftwareInsider SAP Executive Events AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership Data to Decisions eCommerce finance HCM HR B2B B2C CX EX Employee Experience business Marketing Growth Social Customer Service Content Management M&A Chief Customer Officer Chief Information Officer Chief Digital Officer Chief Executive Officer Chief Technology Officer Chief Data Officer Chief Analytics Officer Chief Financial Officer Chief Operating Officer Chief Marketing Officer Chief Revenue Officer Chief Information Security Officer Chief Experience Officer

Salesforce.com Announces New Salesforce1 Fund from Salesforce Ventures to Fuel Mobile Innovation for the Internet of Customers

Salesforce.com Announces New Salesforce1 Fund from Salesforce Ventures to Fuel Mobile Innovation for the Internet of Customers

What’s new in the land of start-ups? Well Salesforce.com just announced Salesforce Ventures which has allocated $100 million to invest in companies building innovative mobile apps and connected products that extend the power of the Salesforce1 Platform. The first wave of Salesforce1 Fund investments include DocuSign, i.am+, InsideSales.com and Skuid. The idea is that with Salesforce Ventures, portfolio companies can leverage the expertise of the Salesforce.com Foundation to make giving back part of their business model from the beginning.

Salesforce Ventures invests in the next generation of enterprise technology to help companies connect with their customers in entirely new ways. Portfolio companies receive funding to accelerate their growth and gain a competitive edge through access to the world’s largest cloud ecosystem and the guidance of salesforce.com’s innovators and executives. With Salesforce Ventures, portfolio companies can also leverage the expertise of the Salesforce.com Foundation to incorporate its 1-1-1 model of integrated philanthropy to make giving back part of their business model.

It makes sense since technology continues to transform the way companies connect with their customers. By 2020, according to Cisco, there will be 50 billion connected things and a trillion connected sensors on the Internet of Things—from smartphones and wearable smart devices to jet engines and cars. But what matters most is that behind every device, every app, and every product is a customer. This is really the Internet of Customers, and the opportunity for companies to revolutionize how they connect with their customers has never been greater.

More on the companies they are funding:

?      DocuSign—DocuSign’s Digital Transaction Management (DTM) platform empowers mobile Salesforce users and their customers to go 100 percent digital so that anyone can transact anything, anytime, anywhere, on any mobile device securely – all from within Salesforce1. 

?      i.am+i.am+ is a fashion and technology brand that makes aspirational garments and accessories with functionality and untethered communications.

?      InsideSales.com—InsideSales.com integrates core telephony features like Click-to-Call™ and Lead Management—powered by a predictive analytics engine—into any Salesforce1 mobile experience to make field reps more productive and accelerate sales.

?      Skuid—Skuid allows customers to quickly create powerful, gorgeous apps for any device without code.

 The Salesforce Ventures portfolio includes innovative cloud companies such as Anaplan, Box, DocuSign, Dropbox, Evernote, FinancialForce, GainSight, Kenandy, Layer, MuleSoft and StayClassy. Salesforce.com has invested in more than 100 enterprise cloud startups since 2009. Looks like Salesforce Ventures is furthering salesforce.com’s commitment to creating the world’s most innovative cloud ecosystem that extends the power of the Salesforce1 Platform to help companies connect with their customers in entirely new ways.

If you want additional information on this new venture, you can find it here:

?      Learn more about Salesforce Ventures: http://www.salesforce.com/ventures

?      Follow @salesforcevc on Twitter: http://twitter.com/salesforcevc

?      Learn more about the Salesforce.com Foundation: http://www.salesforcefoundation.org/

And if you want to start giving back, join Salesforce Ventures and The Salesforce Foundation at Disrupt SF on Tuesday, September 9 to assemble backpacks for SFUSD students.

@drnatalie

VP and Principle Analyst, Constellation Research

See you at Constellation’s 4th Annual Connected Enterprise

The Executive Innovation Conference | October 29th-31st 
Half Moon Bay, CA | Ritz Carlton


Next-Generation Customer Experience Data to Decisions Future of Work Innovation & Product-led Growth New C-Suite Marketing Transformation Digital Safety, Privacy & Cybersecurity Tech Optimization salesforce SaaS PaaS IaaS Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service Chief Customer Officer Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Executive Officer

New Analysis - IBM and Intel partner to increase cloud security

New Analysis - IBM and Intel partner to increase cloud security

Security concerns have long been a detriment to cloud deployment plans. In certain regulated industries not being able to guarantee that certain workloads and data are on a specific machine have been straightforward showstoppers, e.g. in Healthcare and Financial Services. 

IBM’s approach to run bare metal servers in its SoftLayer cloud has always been a step to get the security concerns of enterprises better addressed. But at the end of the day, there was never the ultimate guarantee that e.g. a specific process could only run on a specific machine or data could not be accessed if not on a specific machine. Today’s announcement of IBM and Intel partnering changes that – and with that is quite relevant to increase cloud adoption in the enterprise.

The press release can be found here –so let’s analyze it in usual style:

IBM (NYSE: IBM) today announced that SoftLayer it will be the first cloud platform to offer its customers bare metal servers powered by Intel® Cloud Technology that provides monitoring and security down to the microchip level.

Intel® Trusted Execution Technology (Intel® TXT) provides hardware monitoring and security controls that help assure businesses that a workload from a known location on SoftLayer infrastructure is running on trusted hardware. This assurance provides an essential level of confidence—and even compliance certification—for organizations moving sensitive and mission-critical operations to the cloud.


MyPOV – A hardware based technology like Intel TXT will beat out security provided in other layers of the ISO stack. Compliance certification is going to be a huge benefit for regulated industries.


These new security capabilities put IBM at the forefront of security innovation helping organizations develop solutions around areas such as governance, compliance, audit, application security, privacy, identity and access management and incident response. IBM will also be offering services to help customers implement this new capability into their applications and platforms.


MyPOV – I am usually critical of IBM making the areas between product and service gray, but that’s not the case here and the new customers will need help to setup the new security infrastructure.


“Security perception remains the biggest hurdle for wide-spread enterprise cloud adoption,” said Marc Jones, CTO for SoftLayer. “SoftLayer is the only bare-metal cloud platform offering Intel TXT, leading the industry in enabling customers to build hybrid and cloud environments that can be trusted from end-to-end.”

MyPOV – Others will follow quickly – but IBM certainly has first mover advantage. Coupled with the announced expansion to 40 data centers (we covered the news here) the combination of location and physical machine addresses security and governance concerns very well.


Intel TXT is especially advantageous for large enterprises subject to compliance and audit regulations, such as healthcare, financial services and government organizations. It helps ensure that trusted resources can be integrated, managed and reported on with the relevant compliance frameworks (HIPAA, PCI, FedRAMP, ISO, FISMA, SSAE16). With IBM Cloud and SoftLayer infrastructure, these organizations will be able to certify a cloud computing pool is appropriately secured for workloads with exposures such as governance and enterprise risk, information and life-cycle management, compliance and audit, application security, identity and access management and incident response.
MyPOV – It will be key to address not only compute load but equally data access and residency. With the related operations to secure the machine. What happens if a rogue employee manages to walk out of a data center with a server under the arm or syphon data off via USB stick? The load would not run – but what about the data that maybe on the machine. Encrypted certainly. Today physical security is the only effective protection.


“It is becoming increasingly important to provide cloud environments with the same, if not greater levels of security as your on premise technology environments,” said Rick Echevarria, Vice President of Intel Security Group, General Manager, Intel Security Platform and Solutions Divisions. “By building on IBM’s history of security innovation, with this solution based on Intel TXT, SoftLayer is demonstrating that such levels of cloud security are now possible and available.”
Intel TXT verifies the components of a computing system from its operating system or hypervisor all the way to its boot firmware and hardware. Combined with attestation (root of trust software) this verification is then used to permit or deny a workload from running on that select server system. Hybrid cloud solutions can leverage partner software and Intel TXT, to limit data decryption to specific geo-located servers, in support of local data privacy laws. And because Intel TXT is activated during boot up, this added security does not add any performance overhead to applications.


MyPOV – The advantage of hardware centric security are very small performance de-gradation as exemplified here.


To use Intel TXT, SoftLayer customers need only order bare metal servers available with a Trusted Platform module (TPM) installed. Once activated and deployed with attestation software Intel TXT allows clients to build trusted computing pools of IT resources in the cloud with an added level of visibility and control. Designed to measure the execution environment and protect sensitive information from software-based attacks Intel TXT operates with TPM, an industry-standard device that can securely store the measurement artifacts, to verify the integrity of the hardware, firmware and software. This assurance provides an essential level of confidence—and even certification—for organizations moving sensitive and mission-critical operations to the SoftLayer Infrastructure.
Softlayer is a member of the Intel Cloud Technology program which identifies CSPs using Intel processors for reliable industry-leading performance and quality. Intel TXT is available today on SoftLayer bare metal servers with the following Intel processors:
· Intel® Xeon® E5-2600 v2
· Intel ® Xeon® E3-1200 v3
· Intel ® Xeon® E5-4600


MyPOV – We need to dig a little deeper to understand what load and utilization this covers for existing IBM Cloud customers and if other, potentially more prominent processors can be retrofitted or if these clients need to migrate servers in order to take advantage of TXT.

[…]
Today’s announcement builds on IBM’s security offerings including software and services to help customers strategically and holistically manage information technology and operational risk end-to end across all including:
· information security
· threat and vulnerability management
- identity and access management
· application security
· physical security


MyPOV – Good move by IBM to keep working on the security angle for the IBM Cloud positioning – certainly security has helped IBM’s success and it’s good to see the vendor keeping the focus and investment on this critical area for many customers.

 

Tech Optimization Data to Decisions Digital Safety, Privacy & Cybersecurity Innovation & Product-led Growth Future of Work intel softlayer Google IBM amazon Microsoft SaaS PaaS IaaS Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service Security Zero Trust Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Privacy Officer Chief Executive Officer

Shiny New Toy Season

Shiny New Toy Season

1

We’re a little more than 24 hours away from Applepalooza and the rumors have hit the fan. Shiny new toy syndrome is about to kick in at work and hundreds of devices are accidentally going to fall from pockets or into toilets etc in the next few days in hopes of getting one of these new toys before anyone else. While I am hugely excited to see what Apple has to offer, a few phones I’m sure, a wearable maybe an iPad or a Mac, working in enterprise mobility, I am even more excited by the possibilities that the new season brings us.

shiny object warningTo be sure, it’s not just Apple’s announcements that have me excited, Google  has a big role to play as well. Enterprise mobility is truly entering the phase of secure enablement for all of our users. If we start by looking at Google’s announcements from June about Android L, we will finally see Android devices that can be secured for work. We will get to spend a lot less time worrying about which manufacturer we are looking at (this hurts Samsung) when we allow Android phones into the enterprise and we will get to start concentrating on what we can securely enable people to do with their Android devices now. This will be a huge weapon in our arsenal for moving away from the department of no and becoming the department of know.

Apple has been on this doorstep for awhile but with their announcements from WWDC, also in June, around iOS8 we see them moving even closer to the enterprise. The volume purchasing program is now easy to use (and cost effective). The APIs available for deep linking and extensibility are key to creating awesome business workflows and yet still being able to concentrate on what the users need. The fact that Apple’s ‘widgets’ allow material to be quickly edited and moved between apps means that data becomes information and knowledge must faster moving us closer to true enablement of our users.

Apple has gone further, if rumors are to believed, with both their wearable and their new payments system. If we start with their wearable, it may give organizations the ability to implement two factor authentication (2FA), even while using SSO in a way that is almost transparent. We only need to look at devices like the forthcoming Nymiauthentication wearable that checks your EKG to make sure that you are you and can we begin to see the possibilities for 2FA that truly authenticates you as you. If this type of authentication is available with the Apple wearable it will be a boon to the enterprise. We are also hearing rumors of their new payment system which leads one to believe that NFC might finally become part of the apple device ecosystem. This has uses beyond just payments and can replace things such as company ID cards (I’ve never left my phone in my car or at home, I have left my ID though) and also enable other forms of 2FA for company use.

One also expects that the TouchID capability that was introduced in the iPhone 5S will spread across the Apple ecosystem, to include iPads and maybe even Macs. This will allow more options in the identity and access management arena as the capability will be opened up to third party app use. Imagine pairing that with your business apps and SSO strategy.

One of the bigger issues that many enterprises have is that their folks just cant remember their passwords, even when SSO works well, they may still have 4 or 5 passwords although some people have orders of magnitude more. We only need to look at 1Password’s iOS8 implementation to see that we can make it easier through widgets and API calls to actually reduce the burden on our users and make work almost fun.

So while I am looking forward to tomorrow’s Apple announcements just so I can enjoy the sheer ludicrousness and number of excuses of how people have manage to break, destroy, or otherwise lose their devices so they can get a new toy, I am even more excited by the new possibilities we will see to improve our users’ experiences around their everyday work through mobile.

New C-Suite Chief Information Officer

Do Supply Chain Planning systems generate any value?

Do Supply Chain Planning systems generate any value?

1
I have been in the advanced planning and scheduling (APS) space since 1995 when I joined i2 Technologies in Europe. Before that I was in management consulting doing what would be called supply chain design or reengineering today.

While MRP and S&OP were defined as early as the 1980s, these provided rough cut analysis at the aggregate level, nowhere near the level of detail that is possible today. The diagram below by Oliver Wight, with some enhancements by me, captures the progression of capabilities since the 1970s. My enhancements were to add the underlying technology and company information at the bottom which gives some context.

 Oliver Wright S&OP IBP

The key point is that I have spent a lot of my working life focused on the value generated by more advanced planning solutions.

It has been with some shock, therefore, that over the past few months I have come across a number of prospects, partners, and analysts that question whether any real value has been generated by all the investments in technology over the past 25 years. I have come to the conclusion that this needs some further analysis, which I won’t be able to complete in a single blog.

Let me start with the confusion between planning and execution. I was on a call last week with a large company in the food and beverage space that has spent $100s of millions, and many years, on an ERP deployment. And of course during the deployment their organizational structure has changed and they have gone through some M&A activity in that time. Needless to say they have a continued multi-year deployment of the supply chain planning system provided by the ERP vendor. And they are still a long way from complete from deploying the ERP modules let alone the supply chain planning modules. Now they want to deploy an S&OP process. They have piloted the process in Excel and know that they need an enterprise level solution for a global roll-out of S&OP. The issue is that none of their IT investments in the last 10 years have moved the needle on operational metrics such as inventory levels, case fill rates, and other operational metrics. Their words. As a consequence they are looking for tangible evidence of value before progressing with a global deployment.

paul meyer productivity quoteAbout a week before that I was at dinner with Mo Hajibashi of Accenture. Mo has been around this space about as long as I have and has seen all the changes. We were reminiscing about the trade exchanges that were so much part of the discussion in the late 1990s. Of course these largely went the same way as the rest of the dot com bubble. But Mo went on to say that many companies have struggled to quantify value from their investments in supply chain systems. We were there to discuss other topics so we did not dig too deep into his statement, but it stuck, and came roaring back when I was in discussion with the company I mention above.

In July, Lora Cecere of Supply Chain Insights kicked this all off with a blog on the Forbes web site titled “My Quest to Know …” in which she seemed to question the value of IT in driving value in corporate performance. She states that

As technologies evolved over the course of the last decade, there was a promise that investments in software like Enterprise Resource Planning (ERP), Supply Chain Planning (SCP) or Business Intelligence (BI) would improve corporate performance. I was a research analyst in the throes of this movement, writing article after article on how IT projects will drive corporate performance improvements. I believed it. I was a prolific writer and a committed disciple. I thought it would transform organizational capabilities.

While Lora and my paths are different, our trajectories are the same. I studied Industrial Engineering and Operations Research focusing on Optimization Theory. I lost faith in optimization early when I realized that the uncertainty in our knowledge of true capacity, yield, lead times, and hundreds of other variables drowned out the promise of optimization. And that is assuming that we have a good handle on demand, which we don’t. However, I still believe in the promise of greater productivity through replacement of slow and manual processes with fast and agile digital processes.

In other words, while I didn’t dispute Lora’s findings, I was puzzled by her conclusions of supply chain planning systems. She seemed to be saying that benefits have not been realized from deploying planning systems, which didn’t fit my understanding of her position. When I asked Lora about her blog she replied that:

Supply chain planning, while over-hyped, and under-delivered by many technology vendors and consultants, adds value. The companies that achieve the highest levels of performance, and balance, in corporate performance make the design of their networks and their planning processes a priority. It does not happen overnight, and does require the right fit of technology to drive greater potential. The factors are the right data model, a frequency of planning that reflects the rhythms and cycles of the supply chain, and the right level of granularity of the modeling. The best planning systems are implemented carefully based on conference room pilots and focus on modeling the business. As a result, the best implementations are usually not the fastest.

The market has been scarred by two issues: the bad behavior of the best-of-breed solutions in the first generation of solutions, and the lack of depth of the extended ERP solutions. As a result, there currently a gap between what companies want and what they have. However, excellence in corporate planning matters. The concepts improve the potential of the organization to deliver higher levels of balance sheet performance. The greatest value today usually comes from a best-of-breed solution that is implemented by the same best of breed provider. The over-hyped promises of extended ERP implemented by large system integrators as advertised on signs in airports has not driven the levels of value that the best-of-breed solutions have.

Perhaps we have been looking at the benefits of  supply chain planning systems too narrowly. There have been additional benefits, and Lora points to two of them, namely our ability to absorb supply chain complexity – Lora refers to product complexity – and become a lot more efficient as measured by revenue per employee. I consider these huge gains. How could Apple have grown like it did both in terms of product and market expansion without greater efficiency and the ability to coordinate the flow of materials throughout the world? How could Procter & Gamble have expanded into the emerging markets without forming a number of regional planning hubs?  (Please note that I am using company examples which are not Kinaxis customers deliberately so that I cannot be accused of bias.)

Planning systems do improve supply chain performance when coupled with process and organizational change.  Did anyone see that wonderful spoof in which a daughter gives her elderly father an iPad who then uses it as a cutting board? This is Lora’s point. Lora is running the Supply Chain Insights Global Summit next week in Phoenix, and one of the agenda items is about the Supply Chain Index she has been working on. Unfortunately I cannot be there. I’d really like to be in the session that discusses the supply chain index Lora is developing.

us manufacturing output jobs

As I have stated already, the real question is what would have been the cost of running these massive supply chains without the IT investments? While we might have exhausted the benefits to be gained from large ERP deployments, I am not at all convinced that we have got even close to 50% of the efficiency gains we can achieve with new solutions based more on consensus building and collaboration than on optimization. I am one of those gray-haired men Lora’s refers to in her blog, but I am also a ‘digital native’, something that cannot be said about most of my contemporaries, who are typically ‘digital immigrants’ at best. Yet my contemporaries are the ones making large decisions about organizational structures, processes, and solutions that are rooted in mental models developed and perfected in the 1970s and 1980s. And far too many of the analysts and management consultants continue to position these mental models as best practice. They are not; They are yesterday’s practice.

digital natives versus digital immigrants

But let us step back from my polemic and look at the data. Of course it is impossible to separate out the investment in planning systems from robotics and other technology investments.  But we can look at the ‘digital revolution’ as a whole and make some pretty broad assumptions and correlations with planning systems. First of all this isn’t a recent topic. As early as 1990 Erik Brynjolfsson of MIT published an article titled “The Productivity Paradox of Information Technology: Review and Assessment” in which he cites even earlier analysis of the topic. Erik states that:

The relationship between information technology (IT) and productivity is widely discussed but little understood. Delivered computing-power in the US economy has increased by more than two orders of magnitude since 1970 (figure 1) yet productivity, especially in the service sector, seems to have stagnated (figure 2). Given the enormous promise of IT to usher in “the biggest technological revolution men have known” (Snow, 1966), disillusionment and even frustration with the technology is increasingly evident in statements like “No, computers do not boost productivity, at least not most of the time” (Economist, 1990).

erik brynjolfsson raching with the machine

However, in a subsequent article published in 2003 and titled “Computing Productivity: Firm-Level Evidence” Erik states that

We explore the effect of computerization on productivity and output growth using data from 527 large US firms over 1987-1994. We find that computerization makes a contribution to measured productivity and output growth in the short term (using one year differences) that is consistent with normal returns to computer investments. However, the productivity and output contributions associated with computerization are up to five times greater over long periods (using five to seven year differences). The results suggest that the observed contribution of computerization is accompanied by relatively large and time-consuming investments in complementary inputs, such as organizational capital, that may be omitted in conventional calculations of productivity. The large long-run contribution of computers and their associated complements that we uncover may partially explain the subsequent investment surge in computers in the late 1990s.

In other words:

  • There is a sufficient business case in the short term (12 months) to justify IT investments
  • While there is a significant delay between the investment and the full gains in productivity, the gains too are massive, much greater than first assumed

In the paper “Computers, Obsolescence, and Productivity” published by the Federal Reserve Board in 2000, the author, Karl Whelan, states that:

Real business expenditures on computing equipment grew an average of 44% per year over 1992-98 as plunging computer prices allowed firms to take advantage of ever more powerful hardware and, consequently, the ability to use increasingly sophisticated software. These developments have helped improve the efficiency of many core business functions such as quality control, communications, and inventory management, and, in the case of the Internet, have facilitated new ways of doing business. They have also coincided with an improved productivity performance for the U.S. economy: Private business output per hour grew 2.2 percent per year over the period 1996-98, a rate of advance not seen late into an expansion since the 1960s.

This is enough evidence for me. At the same time I have no doubt there has been extensive over promising and under delivering, and bungled deployments. Do we really want to go back to typing letters and mailing them to customers and suppliers? Do we really want to use a manual planning board to plan the purchase of components and assembly of a tablet that occurs in multiple continents across many organizational boundaries?  I am highlighting where many of the productivity gains have already been realized.

It is going to require a new generation of ‘digital natives’ in senior positions making decisions about organizational structure, processes, and supporting technology before we realize the full potential of IT investments. And the benefits we have realized so far are enough to justify continued investment.

human evolution technology

Matrix Commerce Tech Optimization Data to Decisions Innovation & Product-led Growth Supply Chain Automation Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software IoT Blockchain ERP Leadership Collaboration M&A Chief Information Officer Chief Procurement Officer Chief Supply Chain Officer