Results

Digital Transformation Digest: Australia's Planned Decryption Law, New Twist in Oracle-Rimini Case, IBM Watson Under the Microscope

Constellation Insights

Here comes the 'Five Eyes' fallout: Last month, the so-called Five Eyes nations of the US, UK, Canada, New Zealand and Australia held their latest meeting on intelligence-sharing and cybersecurity matters. While the subject of law enforcement's ability to access encrypted messages was expected to be a focal point of the meeting, an official post-mortem said very little about it.

Some weeks later, the encryption debate is about to ramp up, with Australia's government proposing a new law that would compel companies such as Google to decrypt messages from alleged terrorists and other types of criminals, as the AP reports:

The new law would be modeled on Britain’s Investigatory Powers Act, which was passed by the British Parliament in November and gave intelligence agencies some of the most extensive surveillance powers in the Western world, the government said.

Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. Law enforcement agencies would need warrants to access the communications.

“We’ve got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists and drug traffickers and pedophile rings are up to because of the very high levels of encryption,” Turnbull told reporters.

“Where we can compel it, we will, but we will need the cooperation from the tech companies,” he added.

POV: "I am sympathetic to government and law enforcement's interest—on the surface—to access the telecommunications of wrongdoers and suspects, just as they do conventionally," says Constellation VP and principal analyst Steve Wilson. "But the reality is that cloud service providers have been under more and more pressure to remove themselves from the business affairs of their tenants. And the upshot has been encryption protocols where the keys are under control of the tenants. Several providers have moved to the same posture: We couldn't decode your data even if we wanted to."

That of course means that law enforcement would have to serve a warrant on clients, not cloud providers, Wilson notes: "It's important to see that this is not about encryption protocols but key management protocols. The cloud providers don't have the keys. So when governments say they insist that conventional rule of law applies to tech providers, do they appreciate how the technology works?"

It's easy to see a scenario where law enforcement demands data concerning a certain client, and then cloud providers simply hand them encrypted files, which officials would then have to crack on their own. Alternatively, is the government's intent to make cloud providers change their business models in order to retain clients' keys? "That's the only way to access suspects' data without a crypto backdoor," Wilson says.

Rimini Street makes tactical shift in Oracle suit appeal: Independent software support provider Rimini Street has taken a new legal tack in its appeal of a copyright judgment Oracle won against it in 2015, with its lawyer telling an appeals court that the dispute really is about contractual rights, as the Register reports:

The case hinges on Rimini Street's 2010 decision to host Oracle software on its own servers, as well as "cloning" that software and making it available to multiple customers.

The smaller company accepted some of the charges against it, saying it will pay $35.6m for "innocently infringing the software", but appealed against the rest following the October 2016 judgment.

Oral arguments in the case were heard by three judges in the Ninth Circuit yesterday, where Rimini's lawyer Mark Perry argued that the case should come under contractural – not copyright – laws.

Perry said that a "single fundamental error infected and pervaded the entire copyright case", arguing that Rimini should have been allowed to copy the software for its clients, as they had paid licence fees.

POV: The Oracle-Rimini Street case is complicated, and it's fairly easy to go deep into a rabbit hole in the course of understanding all of the issues and arguments. But it's also an important case to follow, given Rimini's status as the face of the third-party maintenance market. 

IBM Watson's performance under Wall Street's microscope: IBM has generated plenty of hype around its Watson cognitive computing technology, but questions remain about how much Watson is delivering in terms of revenue, equity analyst firm Jefferies argues in a new, in-depth report.

While IBM has issued 200 press releases with Watson in the headline since 2013, and spent $15 billion on cognitive computing development between 2010 and 2015, "the company has been very circumspect about sharing financial information about Watson," analyst James Kisner writes.

Moreover, while Watson is one of the most complete off-the-shelf platforms in the market, it requires quite a bit of consulting services, and IBM is also being outgunned in the competition for AI talent by the likes of Amazon, Microsoft and Google, he argues.

Azure gets nested virtualization: Microsoft added support for nested virtualization in Windows Server 2016, but it's only now that the capability is available on the Azure cloud platform. 

Nested virtualization is just what it sounds like: You can use it to run a hypervisor and VMs inside a VM. Why would you want to do that? There are multiple reasons, as Microsoft notes in a blog post announcing the new feature:

Such nested environment provides great flexibility in supporting your needs in various areas such as development, testing, customer training, demo, etc. For example, suppose you have a testing team using Hyper-V hosts on-prem today. They can now easily move their workloads to Azure by using nested VMs as virtualized test machines.

You could also use nested virtualization to run pre-production code on a server used by multiple users without impacting them, Microsoft adds.

POV: The public cloud war is being waged on multiple fronts: Cost, global availability and performance, and feature richness. Nested virtualization might be a bit in-the-weeds on its face, but its something that Microsoft shops large and small will find an appealing addition to Azure. Given the feature's sweet spots, it will also help customers build an on-ramp to using Azure more widely.

 

Data to Decisions Tech Optimization Digital Safety, Privacy & Cybersecurity Chief Customer Officer Chief Financial Officer Chief Information Officer

Blockchain or Distributed Ledger? Defining the requirement, not the technology

Currently Blockchain is firmly established on the hype curve, and as with all technologies at this stage it seems this is the answer to, well just about everything. At this early stage of the hype curve the exciting possibilities always exceed the tested deployed solutions. Reality arrives with early adopter experiences showing the real technology capabilities that match genuine business case requirements, with corresponding deployable product sets.

You don’t have too read too many articles to sense the lack of cohesion in technology views as to what the various pluses and minuses of Blockchain technology may be. Nor to realize the generality of the concepts as to the business value it brings. However these arguments can be better understood and rationalized by examining the two basic Business requirements, which are fundamentally different from each other.

Instead of launching into the usual definition and description of Blockchain, (inevitable in some way linked to Bitcoin), lets start with the basic capability requirements for the business solutions. It is for a shared Asset Register of transactions, but transformed from existing Asset Registers by Digital Business/Markets requirement for no single centralized controller to support its ‘any to any’ operating model. Event driven and optimized interactions rely on finding the right partners for any deal unconstrained by the need for pre-established relationships.

It sounds simple, but full-scale market places operating in a fully decentralized manner using, on demand any to any interactions business and technology model is a new phenomenon. However not all Digital markets have the same characteristics so the simple common requirement definition splits into two major, different requirements introducing the split between the two major technology approaches; Blockchain and Distributed Ledger Technology, known as DLT.

Two major Business requirements;

  1. Fully Secure and Authenticated Transactions; usually associated with FinTech, (financial technology) and the commercial settlement of financial transactions. Here the basic mechanisms of Blockchain are a key aspect of the attraction, and the challenge is to overcome the associated limitations.
  2. Mass Updates of Asset Registers; usually associated with IoT endpoints data transfers and associated micropayments. In this role there are questions as to the basic suitability of Blockchain architecture leading to the development of other techniques, including ‘Blockless’ Blockchain.

Though the differences between the two are substantial the basic task of managing and updating an Asset Base with transactions is common; as is the challenge of its distributed across a network of participants. The question is the tradeoffs between the two requirements concerning what is transacted and the manner in which every participant’s copy is maintained to be identical. The numbers of participants, the size of updates, their timing and manner of updating, the secure approach used, together with the form of cryptography are all variables to be ‘adjusted’ according to the exact business requirement.

There is one fundamental difference between Blockchain supporting FinTech and Distributed Ledger Technology supporting IoT. Participants in the former are permanently connected to the network to maintain their registers and authentication, whereas IoT devices are often only periodically connected to conserve battery and bandwidth usage. The basic Blockchain architecture requires the participants to maintain connectivity and abilities to update as a key part of its security authentication, IoT focused Distributed Ledger Technology solutions seek to overcome this.

Bitcoin illustrates some of the challenges in deploying Blockchain Technology based solutions. Bitcoin requirements suit its role as a specialized crypto currency, but with increasing popularity the limitations of transaction updates, and network/processor demands becoming obvious. The tendency for many articles to use Bitcoin’s success as the basis for Blockchain’s suitability other requirements frustrates those with detailed expertise, creating further confusion around ‘Blockchain’.

Bitcoin proves that it is possible to implement and deploy a global decentralized Asset Register and Transaction Recording solution that is automatic, autonomous, auditable, and securely authenticate by allowing all participants to understand the integrity of the process. This established starting point has created huge interest in the potential of using the mathematical principles of ‘Blocks’ as the basis of developing solutions for Business requirements.

Whatever the requirement; FinTech, or Asset Register; Blockchain or Distributed Ledger there are four common basic capabilities required in a commercially acceptable solution, and the challenge is to achieve this whilst enabling the other specialized requirements.

  1. Permanent unbreakable relationship between the Asset and the mathematic Authentication; a substantial and unacceptable risk lies in the two being separate entities that can be exploited and combined separately.
  2. Sophisticated Identity Management; able to support full identity authentication to the direct participant’s in individual transactions, whilst ensuring the individual transactions updating the distributed Asset Registers are totally anonymous.
  3. Complex Transaction Management; capable to ensuring the form of transaction is standardized, transparent, and distributed to all Ledgers within the determined time frame.
  4. Consensus based Trust model; to ensure that all participants collectively are able to verify all transactions through common comparison of their Asset Ledgers.

Examining just the most simple basic requirements for FinTech Transactions versus Mass Update Asset Registers illustrates just how different the Business solutions and resulting the technology development are;

Core Requirement

FinTech

Mass Update Asset Mgmt

Principle use

Auditable financial payment transactions

IoT Device updates with micro payments

Volumes/ Transaction sizes

Low volumes with relatively large transaction data

Massive volumes with exceeding small transaction data

Security/Reliability

Absolute, both transaction and end devices must not be accessible to hackers

Functional, acceptable as individual transactions low value, & dumb end devices

Cost

Transactions are each of high importance/value and higher cost is acceptable.

Transactions are individually of low value and cost must match

As a generality the development of Blockchain with its secure use of ‘Block’ technology suits the primary requirements of FinTech, whilst the inherent limitations that Blockchain imposes make it less suitable for the development of Mass Update of Asset Registers solutions. (HyperLedger, one of the most popular Blockchain consortiums, has now started ‘Performance and Scalability Working Group’, PSWG, to address this topic).

 

Whilst a great deal has been published about the development of Blockchain based solutions, (see appendix for Constellation Research reports and blogs), very little has been said about alternatives. Whilst there are a number of existing traditional centralized approaches for Asset Register management even if they could be modified in some way they would fail at least some of the four basic principles outlined earlier.

The Trusted Internet of Things Alliance, aims to rectify the lack of attention to the need for Mass Update Registers solutions for IoT market places by building on the work of one of its founding partners IoTA. Founded by David Sonstebe, with a group of mathematicians who had worked on Blockchain, the focus is on the IoT challenge. The initial Whitepaper on its approach can be found here, but the following quotes by its founder provide a simple explanation as to the goals of the IoTA’s Tangle Ledger approach;

At heart Hyperledger is a permissioned ledger, and that’s the antithesis of IoT, which has to be open to realize its potential. IoT cannot be a closed ecosystem because that is literally the opposite of interoperability. IoTA Tangle Ledger is a Directed Acyclic Graph, as opposed to the linear Blockchain design, allowing the systems to settle transactions with zero fees and allow trading in specified resources on demand.

The recent IoTA announcement entitled ‘IoTA’s Tangle meets IOT requirements better than any Blockchain’, sums up the issues to be addressed and compares Blockchain technology with the IoTA Distributed Ledger Technology. The detail makes clear the deep differences that have to be addressed and is a must read for anyone contemplating involvement in IoT solutions. There are more issues than just the often remarked through put and scaling difficulties including the need to support periodic connect and disconnection of participating devices that appear to render current Blockchain architecture unsuitable.

Blockchain has the headlines, and in Bitcoin has convincingly demonstrated that it can meet the difficult requirements for an any to any decentralized business transaction solution. When applied to Business requirements that require the rigors of secure authenticated decentralized transaction management between known Ledger participants then Blockchain has compelling features.

But there are other types of requirements for decentralized transaction solutions which require high volume, low cost, good enough secure Transaction management, often with periodic connection. Here alternatives to Blockchain based on Distributed Ledger Technologies are emerging

Reversing the approach by defining the basic business requirements helps rationalize the frequently confusing statements being made. As an example anyone involved in the design and deployment of IoT solutions should investigate alternative developments such as IoTA Tangle.

 

Additional Material; Constellation Reports and Blogs

Update on HyperLedger with release of Fabric 1.0 for the use of solution developers

Report; Blockchain explained in plain English

Video; Blockchain myths and realities

Blog; Distributed Business Service Models

New C-Suite Innovation & Product-led Growth Data to Decisions Future of Work Tech Optimization AI Blockchain ML Machine Learning LLMs Agentic AI Generative AI Analytics Automation B2B B2C CX EX Employee Experience HR HCM business Marketing SaaS PaaS IaaS Supply Chain Growth Cloud Digital Transformation Disruptive Technology eCommerce Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT CRM ERP Leadership finance Customer Service Content Management Collaboration M&A Enterprise Service Chief Information Officer Chief Digital Officer Chief Executive Officer Chief Technology Officer Chief AI Officer Chief Data Officer Chief Analytics Officer Chief Information Security Officer Chief Product Officer Chief Operating Officer

CEN Member Chat: AI Ethics & Privacy

Constellation Research VP & Principal Analyst, Steve Wilson, covers his observations on the implications of AI ethics and privacy exclusively for our executive community. Join our Constellation Executive Network to exchange ideas and solve business problems in real time. 

Digital Safety, Privacy & Cybersecurity Chief Executive Officer Chief People Officer Chief Information Officer Chief Digital Officer On <iframe src="https://player.vimeo.com/video/225137509" width="640" height="360" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>
Media Name: CEN member chat AI ethics & privacy thumbnail.png

Digital Transformation Digest: Coleman Is Infor's AI Play, Workday to Open Up Its Platform, and More

Constellation Insights

Infor has an AI platform, and its name is Coleman: The big news at Infor's Inforum conference this week in New York is Coleman, its entry into AI (artificial intelligence) for business applications. Here are the key details from its announcement:

A pervasive platform that operates below an application's surface, Coleman mines data and uses powerful machine learning to improve processes such as inventory management, transportation routing, and predictive maintenance; Coleman also provides AI-driven recommendations and advice to enable users to make smarter business decisions more quickly.

In addition, Coleman acts as a smart AI partner, augmenting the user's work.  Coleman uses natural language processing and image recognition to chat, hear, talk, and recognize images to help people use technology more efficiently. 

Coleman is named after Katherine Coleman Johnson, an African-American physicist and mathemetican at NASA who made key contributions to the success of the moon landing.

Infor executives provided more details of Coleman in a question-and-answer session with press and analysts.

While the announcement came seemingly out of the blue, Infor has actually been working on Coleman for quite a while, executives said. Its elements include Amazon Web Services' Lex chatbot platform and machine learning frameworks such as TensorFlow as well as one Infor acquired 18 months ago with the purchase of Predictix, which has a focus on retail scenarios.

Coleman is industry-specific by design, said Infor president Duncan Angove: "We're not in the business of building a horizontal machine learning platform." It also wants to use Coleman as a means to encourage customers to upgrade. Infor has more than 8400 cloud customers, but 90,000 overall. Migrating the rest to its Cloudsuite lineup is a top priority.

In most cases, Coleman will be included as part of Cloudsuite, not sold separately in discrete applications. "It's one reason our customers should seek to upgrade, so they can turn on Coleman," Angove said.

POV: Coleman was an announcement Infor clearly had to make now if only for the sake of perception, given that every enterprise apps vendor needs to tell an AI story in the current market. While insisting a number of Coleman elements are available today and with customers, this week's announcement marks a step in a longer journey for Infor—one that could indeed have resonance with customers. 

Workday pulls the trigger on PaaS—finally: While Workday has long provided a configuration layer for its cloud HCM apps, the underlying platform remained closed off. At last year's Workday Rising conference, executives confirmed that a PaaS offering was in the works, but didn't provide concrete details.

The time has now come for Workday to launch its PaaS, CEO Aneel Bhusri said in a blog post:

Today, we are ready to take a big step forward on our extensibility journey by announcing our intent to open our platform to customers and a broader ecosystem of partners, independent software vendors (ISVs), and developers.

And like everything we do, we based our decision on customer input. Simply put, a growing number of customers have been asking for a more open Workday platform. They want to use Workday as a cloud backbone that supports cohesive, digital workflows across multiple business applications—reflective of how their people work and how their businesses operate in today’s hyper-connected, real-time world.

By opening up the Workday Cloud Platform and entering the Platform-as-a-Service (PaaS) market, Workday intends to enable customers and our broader ecosystem to use our platform services to build custom extensions and applications that can significantly enhance what organizations are able to accomplish with Workday.

While Workday's software is written in Java, the company's developers work in an abstraction layer built on a proprietary language called XpressO. It's a similar approach to that taken by Salesforce.com and its APEX language for the widely used Force.com platform.

Workday's PaaS will give customers the ability to create new business processes and integrate third-party applications, among other things, Bhusri wrote. More details will be forthcoming at Workday Rising later this year.

POV: Workday has been talking about PaaS for a few years now, so in that sense this announcement is a long time coming. As Constellation VP and principal analyst Holger Mueller notes, Workday has had one of the most proprietary and closed-off platforms in the SaaS business. Those qualities don't fly so well in today's environment, and therefore Workday has made a smart move. Now it's about the execution.

SAP user group eyes line-of-business for member recruiting: One result of digital transformation is the evolution of IT departments' relationship and partnership with business users. That view is backed up by Paul Cooper, chairman of the UK and Ireland SAP User Group, who tells the Register:

"One theme for the next couple of years will be around driving our line-of-business membership," Cooper said.

"What we're seeing is, as the cloud becomes more important to people, as well as Software-as-a-Service, the IT department's role is changing, while the business user is becoming more important.

"They can go and put a [project] together and roll it out almost without the IT department's involvement, so for us it's important that we start to attract the people using those solutions, to help them share their knowledge and learning."

POV: The concept of "shadow IT" is nothing new. But if digital transformation efforts are to take hold most effectively, all parties need to be at the table and in communication. The rise of easily purchased, richly functional SaaS apps also ups the shadow IT stakes significantly, althought it's not as if line-of-business users are going to roll out a new SAP ERP system without plenty of IT involvement.

Legacy Watch: Mainframe woes at the Graybar Hotel: A potentially "long-term" mainframe system outage at the Milwaukee, Wisconsin County jail system is making conditions inside a bit more arduous than usual.

It's meant that bookings and releases are being held up since they must be processed manually, Milwaukee Patch reports. It has also impacted lawyer visits, phone communications between inmates and family members, and inmate commissary accounts. The problems continued after IT staffers ordered replacement parts that didn't work, according to the Patch report. 

24/7 Access to Constellation Insights
Subscribe today for unrestricted access to expert analyst views on breaking news.

Examples of Google AdWords Done Right (and Wrong) for Keyword “Subscription Billing Software”

1

We are a Certified Google Partner, and love seeing what brands are up to with their Google AdWords budget.

This is the 14th instalment of a series we call “Critiquing Your Google AdWords Campaigns”.

We Google a search term and evaluate the top 3 Google Ads as well as their landing pages for their ability to “Attract” and “Convert” visitors into leads.

We grade each campaign out of 10:

  • 5 Points ATTRACT: the actual Google Ad
  • 5 Points for CONVERT: the Landing Page experience
Let’s get started!

This week we Googled â€œSubscription Billing Software”.

Google Ad #1
Company: Aradial

Google AdWords Ad:
The Good…
  • I like how they identify the audience (ISPs, Wifi, etc.)
The Not so Good…
  • I’m searching for “subscription billing software”, not sure what “converged billing” is
  • If your solution is only for certain industries/verticals such as ISPs, you need to include that in the main headline (don’t always count on people to read anything past the headline)
  • No sitelinks
  • No offer or Call to Action
Ad Score: 1/5
Google AdWords Landing Page:
The Good…
  • Identification of audience (ISPs)
The Not so Good…
  • Not using a landing page but driving users to website, where they can click navigation links, read about news, or visit your Facebook page (in other words, taking them off the conversion path)
  • Far too much text
  • Very poor design
  • No visible phone number, form, or Call-to-Action.
Google Landing Page Score: 1/5
TOTAL ADWORDS SCORE: 2/10

Google Ad #2
Company: Vindicia

Google AdWords Ad:
The Good…
  • My keyword (Subscription Billing) right in the headline and display url
  • “Free Trial” CTA right in the headline
  • Helps reduce customer churn 25% (that’s a good thing)
  • Nice use of sitelinks
The Not so Good…
  • Nice use of sitelinks, but I don’t know what “better serve millennials” means
  • Doesn’t indicate who product is for (e.g. SMB, Enterprise, or both)
  • Should add a sitelink for reviews
  • No mention of pricing, but that would be something worth testing
AdWords Score: 3/5
Google AdWords Landing Page:

The Good…
  • Nice key messaging about how the solution isn’t just another cost, but helps your business grow revenue
  • A contact form
The Not so Good…
  • Need to remove links and use a dedicated landing page (e.g. don’t send users to website)
  • Too much text, shorten it down and make use of bullet points
  • The form doesn’t tell you what you’re getting – if I’m getting to “try” the software, am I getting a free trial? What happens when I click “submit”?
  • The form is too long, try removing unnecessary fields such as industry, job title, and annual company revenue (you can get that information later).
Google Landing Page Score: 2/5
TOTAL ADWORDS SCORE: 5/10

Google Ad #3
Company: Quickbooks/Intuit

Google AdWords Ad:
The Good…
  • Online Billing Software in headline – good
  • Start my free trial CTA – good
The Not so Good…
  • I’m specifically searching for “subscription billing software”, so not sure if this is a match
  • Need to identify the audience better – is it for SMB, larger businesses, or both?
  • Use keyword in display url
  • Sitelinks to reviews and/or ratings would be helpful
Google AdWords Score: 2.5/5
Google AdWords Landing Page:

The Good…
  • Well designed, great visuals
  • Video on landing page is very key
  • Nice clear CTAs above the fold
  • Does well to highlight credibility (#1 online accounting solution, 1.5+ subscribers, etc.)
  • No navigation links except to sign in or sign up – nice
The Not so Good…
  • I’m not so sure about having two CTA buttons, are people going to buy the software before they take it for a free trial test drive?
  • No mention of whether it will help me with “subscription billing software”
Landing Page Score: 3.5/5
TOTAL ADWORDS SCORE: 6/10
Who’s Getting My Business for “Subscription Billing Software”?

This is a tough one, as although Quickbooks had an overall higher score (6/10), neither the ad or landing page specifically mention “subscription billing software”.

Thus, even though Vindicia had a lower ad and landing page score, their emphasis on “subscription billing” and growing my revenue may give them the slight edge.

73% Are Using Internet Of Things Data To Improve Their Business

1

afafdea

  • According to the Cisco Visual Networking Index, M2M connections will represent 46% of connected devices by 2020.
  • 95% of execs surveyed plan to launch an IoT business within three years.

These and many other insights are from the recently published Cisco Internet of Things (IoT) study, The Journey to IoT Value: Challenges, Breakthroughs, and Best Practices published on SlideShare last month. The study is based on a survey of 1,845 IT and business decision-makers in the United States, UK, and India. Industries included in the analysis include manufacturing, local government, retail/hospitality/sports, energy (utilities/oil & gas/mining), transportation, and health care. All respondents worked for organizations that are implementing or have completed IoT initiatives. 56% of all respondents are from enterprises.

Key takeaways from the study include the following:

  • 73% Are Using Internet Of Things Data To Improve Their Business. The data and insights gained from IoT are most often used for improving product quality or performance (47%), improving decision-making (46%) and lowering operational costs (45%). Improving or creating new customer relationships (44%) and reducing maintenance or downtime (42%) are also strategic areas where IoT is making a contribution today according to the Cisco study.

gghhiui8

  • IT executives often see IoT initiatives as more successful (35%) than their line-of-business counterparts (15%). With IT concentrating on technologies and line-of-business users focused on strategy and business cases, the potential exists for differences of opinion regarding IoT initiatives’ value. The following graphic provides an overview of how stark these differences are.

asasddef

  • Engaging with the IoT partner ecosystem in every phase of a project or initiative improves the probability of success. The most valuable phases to engage with ecosystem partners include strategic planning (60%), implementation and deployment (58%) and technical consulting or support (58%). The following graphic provides an overview of most and less successful organizations by their level of involvement in the IoT partner ecosystem.

dfdsfdsfds

  • Only 26% of all companies are successful with their IoT initiatives. The three best practices that lead to a successful IoT implementations include collaboration between IT and business, the availability of internal and external partnerships to gain IoT expertise; and a strong technology-focused culture.
  • 60% of companies believe IoT projects look good on paper but prove more complex that expected. This finding underscores how critical it is for IT and line-of-business executives to have the same goals and objectives going into an IoT project. Being selective about which integration, technology, and professional services partners are chosen needs to be a shared priority between both IT and line-of-business executives.

Digital Transformation Digest: Microsoft's Transformative Moves, Inforum Kicks Off, and More

Constellation Insights

Transformative times for Microsoft: There are plenty of changes ongoing at Microsoft these days. Last week, the company announced layoffs—reportedly up to several thousand—as part of a plan to reshape its sales force around cloud computing. Now news has emerged of top executives leaving Microsoft, including CIO Jim DuBois.

He held the post since 2013. DuBois' will be succeeded by Kurt DelBene, Microsoft's current head of corporate strategy, but in an interesting and telling move, DelBene won't take the CIO title. Rather, in his new role DelBene will become Microsoft's chief digital officer.

POV: As with DuBois, DelBene's duties are internal-facing. He'll be tasked with overhauling Microsoft's IT practices, which could be a considerable challenge. Meanwhile, the sales reorganization should be a hot topic at this week's Inspire conference, Microsoft's annual event for its large partner channel.

Inspiring growth: Keeping partners happy is a crucial job for Microsoft, since it derives 95 percent of its revenue from the channel. Some 17,000 partners are expected to attend Inspire in Washington, D.C. this week, but that's just a fraction of the total pool. Microsoft has 64,000 cloud partners, which is more than Amazon Web Services, Google and Salesforce combined, EVP Judson Althoff said in a blog post.

Digital transformation represents a potential $4.5 trillion market opportunity, Althoff wrote. It wants to work with partners to grab as much of that pie as possible.

To that end, Microsoft announced a number of new partner programs at Inspire, as well as what it terms a simplified partner relationship model.

First up, Microsoft is expanding its investment in the Azure co-sell program it announced last year. The program provides sales and marketing support for partners working with Azure, including incentives for internal Microsoft sales reps to co-sell Azure with partners. Microsoft is increasing its investment in the program to about $250 million, according to Althoff's blog.

Second, Microsoft is rolling out ISV Cloud Embed. Under the plan, partners can buy Dynamics 365, Power BI, Power Apps and Flow for up to 50 percent off list, and then embed them in their own applications.

Meanwhile, Microsoft is reorganizing the way it works with partners around three scenarios: "build-with," "go-to-market" and "sell-with." This blog post goes in-depth on what the changes mean.

POV: There is yet more news coming out of Inspire, including the availability of Azure Stack, which brings the cloud platform inside customers' data centers; and a new product bundle called Microsoft 365. Constellation analysts will be following the conference closely this week.

Inforum 2017: Infor kicks off its Inforum user conference in New York this week, with digital transformation expected to be a key topic of discussion. In recent years, the business applications vendor has overhauled its flagship software from front to back, placing an emphasis on improved user experience as well as a drive into micro-verticals. Myself, as well as Constellation Research VP and principal analysts Doug Henschen and Holger Mueller will be in attendance. Look for our coverage on Twitter and Constellation's website.

Legacy Watch: ERP disaster recovery: Enterprise resource planning software has slowly but steadily begun moving to the cloud, and with it, ERP's longtime bogeymen—cost and time overruns, dissatisfied users, difficult upgrades and outright project failures—could become mostly a thing of the past.

But those days have yet to arrive. In the meantime, CIO has put together an extensive roundup of ERP disasters and controversies. It's well worth a read.

24/7 Access to Constellation Insights
Subscribe today for unrestricted access to expert analyst views on breaking news.
Data to Decisions Future of Work Matrix Commerce Next-Generation Customer Experience Tech Optimization Chief Customer Officer Chief People Officer Chief Information Officer Chief Marketing Officer Chief Digital Officer

Call for Applications - SuperNova Awards

Deadline for applications August 4, 2017

The SuperNova Awards honor leaders that demonstrate excellence in the application and adoption of new and emerging technologies. 

In its seventh year, the Constellation SuperNova Awards will recognize early adopters who demonstrate true leadership in digital business through their application of new and emerging technologies. We’re searching for leaders and teams who used disruptive technologies to transform their organizations. 

We’re searching for the boldest, most transformative technology projects out there. If you or someone you know transformed their organization with disruptive technology apply for a SuperNova Award. Fill out the application here: 

APPLY NOW

Timeline

  • August 4, 2017 last day for submissions.
  • September 7, 2017 finalists announced and invited to Connected Enterprise.
  • September 12, 2017 voting opens to the public
  • September 21, 2017 polls close
  • October 27, 2017 Winners announced, SuperNova Awards Gala Dinner at Connected Enterprise

Rewards

  • One ticket to Constellation's Connected Enterprise 2017

  • Three month subscription to Constellation's research library

Judges

Technology thought leaders, analysts, and journalists selected for their futurist mindset and ability to separate substance from hype. The SuperNova Award Judges carefully evaluate each SuperNova Award application against a rigorous set of criteria. Judges will identify individuals who demonstrate true leadership in the application and adoption of new and emerging technologies. Want to catch a judge's eye? Judges look for projects whose elements can be replicated in other enterprises.

Categories

  • Artificial Intelligence and Augmented Humanity
  • Data to Decisions - Using data to make informed business decisions. (examples: big data, predictive analytics)
  • Digital Marketing Transformation - Personalized, data-driven digital marketing.
  • Future of Work: Productivity and Collaboration - The technologies enabling teams to work together efficiently. (examples: enterprise social networks, collaboration)
  • Future of Work: Human Capital Management - Enabling your organization to utilize your workforce as an asset. (examples: talent management)
  • Internet of Things - A network of smart objects enables smart services. (examples: sensors, smart ‘things’, device to purchase)
  • Matrix Commerce - Commerce responds to changing realities from the supply chain to the storefront. (examples: digital retail, supply chain, payments, omni-channel retail)
  • Next Generation Customer Experience - Customers in the digital age demand seamless service throughout all lifecycle stages and across all channels. (examples: crm, customer experience)
  • Safety and Privacy - Strategies to secure sensitive data (examples: digital identity, information security, authentication)
  • Technology Optimization - Innovative methods to balance innovation and IT budgets. (examples: innovation in the cloud, ENSW cost savings, cloud ERP, efficient app production)
Data to Decisions Digital Safety, Privacy & Cybersecurity Future of Work Marketing Transformation Matrix Commerce New C-Suite Next-Generation Customer Experience Tech Optimization Innovation & Product-led Growth AR Executive Events Chief Customer Officer Chief Digital Officer Chief Executive Officer Chief Financial Officer Chief Information Officer Chief Marketing Officer Chief People Officer Chief Procurement Officer Chief Revenue Officer Chief Supply Chain Officer

Digital Transformation Digest: Amazon Prime's Explosive Growth, Next-Gen Chips Go 3-D, and More

Constellation Insights

Amazon Prime's explosive growth: Amazon's recent move to acquire upscale grocer Whole Foods has turned plenty of heads. One likely reason Amazon bought the chain is to add more physical locations to its supply chain, thereby improving its ability to deliver not only fresh foods but other products, and also take in returns.

A big part of Amazon's business is driven by its Prime membership program. While the company doesn't reveal the number of Prime members, new data from Consumer Intelligence Research Partners says growth is soaring. There are now 85 million Prime members in the U.S., a 35 percent increase from a year ago, and double that of two years ago, as Geekwire reports.

Prime memberships have an annual fee but in return members get two-day shipping on many items as well as access to Amazon's video content service.

POV: To put CIRP's numbers in perspective, about 325 million people live in the U.S., meaning Amazon has more than one-fourth of the country signed up for Prime. Amazon has been an major force in supply chain management and logistics best practices, and as it manages Prime's growth its influence will only continue to rise.

New 3-D chip design advances Moore's law: Researchers at MIT and Stanford have come up with a radical new chip design geared for the next generation of massive-scale data processing, which doesn't even use silicon. Here are the key details from MIT's news service:

Instead of relying on silicon-based devices, the chip uses carbon nanotubes, which are sheets of 2-D graphene formed into nanocylinders, and resistive random-access memory (RRAM) cells, a type of nonvolatile memory that operates by changing the resistance of a solid dielectric material. The researchers integrated over 1 million RRAM cells and 2 million carbon nanotube field-effect transistors, making the most complex nanoelectronic system ever made with emerging nanotechnologies.

The RRAM and carbon nanotubes are built vertically over one another, making a new, dense 3-D computer architecture with interleaving layers of logic and memory. By inserting ultradense wires between these layers, this 3-D architecture promises to address the communication bottleneck.

Researcher Max Shulaker explains that silicon-based chips are two-dimensional by necessity, given the high temperatures involved in manufacturing them. If companies were to layer additional sets of circuits on top of each other, the heat would damage the chip. In contrast, nanotubes and RRAM chips can be made at lower temperatures, he said.

POV: The work was funded by a combination of academic, government and private organizations and it's not clear when commercial versions of the chips will be available. But on the face of it, this is the type of innovation that will be needed to advance next-gen applications, IoT and cloud computing.

Illinois' dramatic digital transformation: The U.S. state of Illinois once had 38 different IT departments. Now it has one, after an ambitious effort led by state CIO Hardik Bhatt. He spoke to the Enterprisers Project about the process:

This brought 1,500 employees together. We organized this new department into seven horizontals, which include cybersecurity, project management, application development, and infrastructure, for example, and seven verticals, like health and human services, public safety, tourism, etc. Each of those seven clusters has a CIO who provides leadership for all of the agencies, and they all report up to me.

Bhatt also talks about Illinois' digital government and "smart state" initiatives in the interview, which is well worth a read.

Legacy Watch: The U.K.'s IT project failure maelstrom: Now for a contrasting item to Illinois. Nearly 40 percent of current IT projects in the U.K. are set to fail unless changes are made, according to data from Axelos, a joint venture between the U.K. government and Capita, as the Register reports:

Asked why IT projects fail, responded blamed: significant changes to the project brief (45 per cent); unrealistic timeframes (41 per cent); an incomplete understanding of the risks (48 per cent); projects not resourced with the right people (42 per cent); lack of a clearly defined goals (49 per cent), and overrun budgets (32 per cent).

Axelos surveyed 182 project managers for its study. The organization was formed in 2014 and its remit is to improve IT project best practices

24/7 Access to Constellation Insights
Subscribe today for unrestricted access to expert analyst views on breaking news.

 

Future of Work Matrix Commerce Next-Generation Customer Experience Tech Optimization

Digital Transformation Digest: ARM Invests In IoT, Privacy Advocates Press 'Five Eyes,' and More

Constellation Insights

Welcome to Digital Transformation Digest, Constellation's daily compendium of news and analysis covering forward-thinking enterprises, mega-vendors, startups and developers.

ARM's Interesting IoT Move: Sometimes the price tag of a technology industry acquisition belies its symbolic significance. Such is the case with chipmaker ARM's £11.7 million purchase of Simulity Labs, which makes eSIMs (embedded subscriber identity modules), as V3 reports:

eSIMs are a new version of a standard SIM card which are not replaceable, often soldered directly to a circuit board. They are used in M2M/IoT applications, where there is no need to change the SIM card, and can also be used in remote SIM provisioning (switching a SIM between providers through software).

POV: "The difference between the design and specification of chips for use in IT-oriented devices such as servers and PCs, and chips for the millions of endpoint devices that are part of IoT is seen clearly in this acquisition," says Constellation Research VP and principal analyst Andy Mulholland. "Adding discrete SIM functionality to ARM's expertise in mobile technology is a powerful move that suggests ARM has a clear competitive vision for the high-growth IoT market."

Eyes on Five Eyes: The Five Eyes Alliance, comprised of the U.S., U.K., Australia, Canada and New Zealand, dates to 1946 and is based on intelligence sharing, counterterrorism and other national security issues. The problem, says the UK nonprofit group Privacy International, is that it has operated essentially in secret for far too long. PI wants a U.S. court to shed some light on the Alliance:

The most recent publicly available version of the Five Eyes surveillance agreement dates from 1955. Our complaint was filed before the U.S. District Court for the District of Columbia.

For years, PI has tried to obtain information about the agreement and the rules governing the Five Eyes alliance via freedom of information requests and other methods.

In the US, PI has made freedom of information requests to the National Security Agency, the Office of the Director of National Intelligence, the State Department, and the National Archives and Records Administration. All four agencies are subject to the Freedom of Information Act and all agencies have withheld the records PI seeks.

Our complaint seeks to compel disclosure of the current version of the agreement and records relating to the rules governing the government’s exchange of intelligence with the other members of the Five Eyes alliance.

PI "is seeking the agreement’s legal standards and limitations, not operational details," the statement adds.

POV: It's not clear whether PI's effort will be successful, but the Five Eyes Alliance does play a crucial role in privacy policy. Go here to read Constellation Research VP and principal analyst Steve Wilson's take on how the group can best set guidelines around cryptography.

Integrating data integrators: Private equity firms have made aggressive investments in enterprise software companies over the past 12 to 18 months. The trend is continuing with a $1.26 billion deal between Clearlake Capital and Centerbridge Partners that will merge data-integration vendors Syncosrt and Vision Solutions.

The company will go forward under the Syncsort name. Syncsort started out with a focus on data-sorting for mainframes but has since broadened its focus toward other types of data transformation. It positions itself as a "Big Iron to Big Data" specialist. Vision Solutions, meanwhile, focuses on data protection and backup for IBM Power Systems.

POV: Go here for a look at Constellation VP and principal analyst Doug Henschen's in-depth profile of Syncsort. As for this week's announcement, it makes a good deal of sense, Henschen says.

"Where Syncsort has long specialized in data-integration and processing options for the mainframe, Vision adds cloud migration, cloud backup and cloud disaster-recovery-as a-service for IBM Power, including IBM i and AIX deployments," he says. "It's a one-stop-shop that offers a broader and more cloud-centric focus than Syncsort could previously support."

Legacy Watch: The VAs half-billion dollar boondoggle: Cost and timeline overruns are sadly nothing new when it comes to U.S. government IT projects, but a particularly troubled effort at the Veterans Administration stands apart from the pack.

Hewlett-Packard Enterprise Services was awarded a $543 million contract four years ago to create a real-time tracking system for medical devices. A major reason for the project was a desire to ensure equipment is regularly sanitized in order to prevent disease and death, the Austin American-Statesman reports:

But the contract has been beset by a host of problems, including failed operational tests, questions over the reliability of equipment tags and fundamental concerns over whether the department’s WiFi can support the system, according to thousands of pages of emails, reports and documents obtained by the American-Statesman using the Freedom of Information Act.

The issues come as the VA prepares to replace its pioneering but ancient medical records system, VistA, at a cost of up to $16 billion. While VistA is 40 years old, its lack of viability going forward isn't due to core structural reasons, but rather neglect on the part of government officials, as an in-depth Politico report compellingly argues.

24/7 Access to Constellation Insights
Subscribe today for unrestricted access to expert analyst views on breaking news.
Data to Decisions Tech Optimization Digital Safety, Privacy & Cybersecurity Chief Customer Officer Chief Information Officer Chief Digital Officer