Results

Digital Clarity Group and Constellation Research, Inc. Announce Strategic Alliance

Digital Clarity Group and Constellation Research, Inc. Announce Strategic Alliance

Two award-winning advisory firms to address the needs of brands and organizations for strategic advice and analysis on effective response to digital disruption.

March 10th, 2015, NEW YORK AND SAN FRANCISCO - In a world undergoing rapid change due to digital disruption and business transformation, leading brands and organizations seek comprehensive expertise as they make investments in experience management and address the entire creative-to-commerce life cycle.  To date, no single player in the research and advisory market brings the capacity to deliver an end-to-end perspective on digital transformation for both buy-side and sell-side clients. 

Effective immediately, Digital Clarity Group (DCG) and Constellation Research, Inc. (Constellation) have announced a strategic alliance that will address this market demand. Initially the firms plan to collaborate on:

-buy-side research on operationalizing experience management and facilitating the creative-to-commerce life cycle

-participation and hosting of buy-side client-facing events

Both firms were recognized as leaders by the Institute of Industry Analyst Relations in 2014. Constellation was named Independent Analyst Firm of the Year, and DCG was named New Analyst Firm of the Year.

DCG and Constellation offer top-quality research and advisory with an aligned focus on helping clients navigate the new world emerging from digital disruption, yet from different perspectives and minimally overlapping coverage areas. Constellation is strong in the enterprise, providing leading coverage on topics such as CRM, big data, security, cloud, and collaboration, while DCG is strong on the brand side, emphasizing customer experience management (CEM), content management, ecommerce, and business process management. Also, Constellation has deep knowledge of large offshore systems integrators, whereas DCG has built up a unique expertise with and about (digital) agencies. Existing and new clients of both firms will benefit from this unique cross-disciplinary perspective.

“We're excited to collaborate with the Digital Clarity Group team. They have been a disruptive force in the analyst business and a peer for thought leadership," noted R "Ray" Wang, Founder and Principal Analyst, Constellation Research, Inc. "Our clients welcome innovative partnerships with other firms who have emerged as market makers and specialists in their coverage areas.  We personally look forward to the joint research and other activities planned over the next 18 to 24 months."

“There are very few research firms that have impacted the market as much as Constellation Research has done in such a short timespan,” said Scott Liewehr, CEO and Co-Founder of Digital Clarity Group. “Both our firms provide top-quality research, thought leadership and consulting focused on helping clients transform their businesses in response to digital disruption, yet we approach the problem from different yet complementary perspectives. Our clients trust us to help them make better decisions, and we are excited to collaborate with Constellation to provide them with an even broader point of view on the challenges and opportunities that lie ahead."

This collaboration aims to serve the needs of buy-side clients often left unsatisfied by the shifting of legacy analyst firms to a publishing model that emphasizes the provision of “insurance” for risk-averse decision-makers over thoughtful insights and pragmatic advice. DCG and Constellation are acknowledged leaders of the new breed of firms up-ending the research industry by getting back to basics. Both are laser-focused on supplying high-quality research and thought leadership on complex topics, as well as establishing trust with each client uniquely as they learn their business and pragmatically navigate them through the complexities of digital transformation.

Digital Clarity Group and Constellation Research, Inc. will remain separate entities.  The alliance is focused on the buy-side market. 

 

About Constellation Research

Constellation Research (constellationr.com | constellationrg.com) is an award winning, Silicon Valley based business research and advisory firm that helps clients transform business models with disruptive technologies and progressive strategies. Constellation caters to clients who possess talent, influence, and vision. This community of successful senior business leaders excels and continues to advance in their careers. 

About Digital Clarity Group

Digital Clarity Group (digitalclaritygroup.com) is an analyst and consulting firm that helps organizations navigate the new world emerging from digital disruption. DCG works with business leaders who aim to transform the experience they deliver to customers, prospects, and employees. The firm delivers insight, research, and services focused on the content, technologies, and practices that enable world-class experiences. Founded in 2012, the firm is based in New York City. The DCG blog, team bios, reports, videos, and events are accessible on the company’s website.

 

Media Contacts

For Constellation Research:  Courtney Sato, Director of Research Development, [email protected]

For Digital Clarity Group:  Mary Laplante, VP Client Services, [email protected]

Data to Decisions Digital Safety, Privacy & Cybersecurity Future of Work Marketing Transformation Matrix Commerce New C-Suite Next-Generation Customer Experience Tech Optimization Sales Marketing Innovation & Product-led Growth Chief Customer Officer Chief Digital Officer Chief Executive Officer Chief Financial Officer Chief Information Officer Chief Marketing Officer Chief People Officer Chief Procurement Officer Chief Supply Chain Officer

The Triumphs and Failings of "The Creepy Test"

The Triumphs and Failings of "The Creepy Test"

I'm going to assume readers know what's meant by the "Creepy Test" in privacy. Here's a short appeal to use the Creepy Test sparingly and carefully.

The obvious problem with the Creepy Test is its subjectivity. One person's "creepy" can be another person's "COOL!!". For example, a friend of mine thought it was cool when he used Google Maps to check out a hotel he was going to, and the software usefully reminded him of his check-in time (evidently, Google had scanned his gmail and mashed up the registration details next time he searched for the property). I actually thought this was way beyond creepy; imagine if it wasn't a hotel but a mental health facility, and Google was watching your psychiatric appointments.

In fact, for some people, creepy might actually be cool, in the same way as horror movies or chilli peppers are cool. There's already an implicit dare in the "Nothing To Hide" argument. Some brave souls seem to brag that they haven't done anything they don't mind being made public.

Our sense of what's creepy changes over time. We can get used to intrusive technologies, and that suits the agendas of infomoplists who make fortunes from personal data they collect hoping that we won't notice. On the other hand, objective and technology neutral data privacy principles have been with us for over thirty years and by and large work well to address contemporary problems like facial recognition, the cloud, and augmented reality glasses.  It turns out that the use of facial recognition by Facebook to automatically identify people without their consent is more than creepy - it's been found unlawful in Europe. 

Using folksy terms in privacy might make the topic more accessible to lay people, but it tends to distract from the technicalities of data privacy regulations. These are not difficult matters in the scheme of things; data privacy is technically about objective and reasonable controls on the collection, use and disclosure of personally identifiable information. I encourage anyone with an interest in privacy to spend time familiarising themselves with common Privacy Principles and the definition of Personal Information.

Finally and most insideously, when emotive terms like creepy are used in debating public policy, it actually disempowers the critical voices. If "creepy" is the worst thing you can say about a given privacy concern, then you're marginalised.

We should avoid being subjective about privacy. By all means, let's use the Creepy Test to help spot potential privacy problems, and kick off a conversation. But as quickly as possible, we need to reduce privacy problems to objective criteria and, with cool heads, debate the appropriate responses.

See also A Theory of Creepy: Technology, Privacy and Shifting Social Norms by Omer Tene and Jules Polonetsky. "Alas, intuitions and perceptions of 'creepiness' are highly subjective and difficult to generalize as social norms are being strained by new technologies and capabilities".

Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity Data to Decisions Security Zero Trust AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership B2C CX Chief Customer Officer Chief Information Officer Chief Information Security Officer Chief Privacy Officer Chief Technology Officer Chief Data Officer Chief People Officer Chief Human Resources Officer

The Year of the Customer: Research Points to the New Focus Must Be The Customer

The Year of the Customer: Research Points to the New Focus Must Be The Customer

Over the years I’ve covered Marketing, Sales, Customer Service and Support, Customer Success Management – all of which end up providing the brand or company the ability to deliver on a promise and make good on that promise or somewhere along that customer journey, do something that creates an unpleasant experience and drives the customer away from the company and to a competitor. We’ve known for over 25 years, its less expensive to keep current customers happy and continuously buying from a brand, yet companies are still not getting the value in perpetual customer experience. What I mean by that is that – it’s not just one experience that matters. Its every single interaction – and from the customer’s point of view. But it’s not that simple. It’s every single interaction from every single customer – perpetually.

Often people have argued with me whether social / digital makes a difference in customer service and customer loyalty. If you consider the 1-9-90 rule — which means that 1% of the population posts, 9% respond and 90% just lurk or read what the 10% posted — there are literally millions, if not billions of people who have read posts by that 10%. And even though that 10% is the tip of the iceberg of the total customer population, they are very influential. Consider that a good percentage of that 90% reads what the 10% writes. They could read about how horrible a brand’s products and services are, and without even engaging with them, a brand could make the decision to never buy from them. And consider if this is the case, there will be companies that look up one day and their customer base is gone and they will wonder where it went. It went to your competitors.

I thought I would provide a list of the research I’ve been working on – just to give you an idea of the various things I think about and where I see the world going. One of the best things about being an analyst is that you get to see the world from a collected set of experiences – from vendor briefings, conferences, speaking engagements and advisory – and you start to see patterns and that helps to shape your point of view on the world. Truthfully, while there’s some things changing, it’s still should be a customer-focused world. No Customers, no business. It’s that simple.

Here’s some of my thoughts on these topics below. @drnatalie

VP and Principal Analyst, Covering Marketing, Sales and Customer Service and Customer Success Management to Create Great Customer Experiences

 
 
 
 
 
 
 
 
 
 
 


Next-Generation Customer Experience B2C CX Chief Customer Officer Chief People Officer Chief Human Resources Officer

10 Tricks to Help Anyone Write a Book

10 Tricks to Help Anyone Write a Book

1
  • Write less, not more. Initially my biggest fear was "would I have enough content?" Trust me when I tell you, most authors suffer from too many words, not too little. Books are getting shorter and shorter to match our shortening attention span. Write less, then expand later. It is much less difficult than writing too much, and then having to shorten.

  • Select your target competitors. Writing a book is about focus, you have to have a few books in mind that your book will compete with. For example I knew on day one that Corporate Awesome Sauce would compete with the Four Hour Work Week from Tim Ferriss.

  • Test your chapters. Every chapter I eventually wrote was sound tested in a blog or a series of tweets. We have the tools to see how readers respond to content, use them. For example my blog entry on Networking Like a Ninja was a test for the book.

  • Hire an editor early. I engaged withEmily Loose after writing only two chapters, this was important for me to see what an editor wants, and how I should write. I then worked with Emily to write then edit one chapter at a time, by the time we got to the last chapter, Emily barely had to do any work!

  • Get a co-author. The thing about writing is it makes you realize how little you know. And as a result you need to read lots more. Steven King tells us in what I believe to be one of his greatest pieces titled On Writing, that the best way to become a good writer, is to read. A co-author can help you read, and research! Dhar Ramdehal was instrumental in the research and reading needed for lots of the leadership science in Corporate Awesome Sauce.

  • Hang yourself by the tongue. From the first day I started writing, to the day of publishing was about 12 months (this is short compared to what other authors have shared with me). On day one I started advertising, and as a result I was forced to complete the book or face embarrassment of failing. It holds you accountable when you say it out loud and early, "I am writing a book."

  • Be the book. This one is easy authenticity sells. Most people, who refer my book to others to read, believe that I am the book. Any crack in authenticity will impede the ability for you to write a book that will sell.

  • Cover design matters. I did not realize this until I started talking to publishers. Publishers will tell you "what cover designs work in your genre". Don't listen to them; people buy books on looks, sex sells. Red books sell better than blue books it is that simple. Keep the cover simple, and drive intrigue by design. I ditched the editors and went out to 99designs.com to really get the cover I wanted.

  • Shop around. My first offer for the book was17,500.00. I didn't take it, and I shopped around quite a bit before I found a strategy that worked for me. You have to find the right publisher, and publishing arrangement that works for you. For example, I own all rights, and can re-publish with another publisher if I so desire.

  • Do not take yourself too seriously. Corporate Awesome Sauce took about 12 months, the last four weeks (1/12 of the process) comprised of cover changes and finding and fixing typos. At some point you have to stop and say "it is just a book" and move on. If I were to keep tweaking the cover, and tweaking words, I could have gone on for another eight weeks!

  • I write as a labor of love, in exchange I ask that you share this writing if you think others may find value.

    - Richie

    Author's BOOK NOW AVAILABLE for purchase (Apple iBooks) or (Amazon).


    2015-03-05-1425517725-2786712-HBK8Render.png
    Future of Work Chief Executive Officer

    Is there a single initiative to start Enterprise Digital Business adoption? Yes, there is!

    Is there a single initiative to start Enterprise Digital Business adoption? Yes, there is!

    If there is a standard question asked in any meeting involving Digital Business, or even on current IT, by a CEO, or a CIO, then this is the one! Fortunately there is a clear answer that has not yet failed to arouse interest, as the financial benefits are immediately clear and easy to track, yet at the same time it is low on internal operational disruption. Finally, it doesn’t cause conflict with Sales, Marketing or new Digital Officers activities!

    The answer lies in transforming Procurement through using Digital Business to reduce the cost of each purchase by real time competition; increase the number of items that are subjected to individual bids through reducing the cost of bidding; and to realign Procurement staff experience and knowledge towards finding new lower cost suppliers through using Digital Markets.

    Focusing on Procurement seems somewhat counter intuitive as to date the almost inevitable focus of Digital Business has been to look to find new ways to sell more, but by the end of this blog hopefully the reasons will have become clear!

    Even if your Enterprise is focused on using Digital Business to transform its competitive abilities then sooner, or later, it will become clear that Procurement will need to be transformed to match. It is difficult to radically transform sales and marketing of products with out an equally radical transformation in the procurement processes to provide a back-to-back alignment of agility and flexibility from your suppliers!

    Before introducing the immediate, and very real, cost savings to be made from Procurement, with the practical steps to deliver these results, consider the very real strategic benefit in support of the Sales and Go To Market activities. The transformation of the Enterprise supply side market place placing pressure on Suppliers to find new ways to compete to gain your Enterprise business is an excellent demonstration of the kind of future Digital Business markets that your Sales activities will need to compete within.

    Creating a Digital Business market in which your Suppliers must compete in real-time for your business introduces a perfect environment to learn new techniques and methods that can deliver sales success for your own Enterprise’s ability to compete in Digital Business markets.

    But what can the transformation of Procurement into a Digital Business actually produce as practical tangible short-term results?  Constellation Research has an available case study on how an investment of $13 million turned into savings of $132 million in the first full financial year following the investment. In the second year savings of more than $200 million are forecast, as a return on investment that’s way better than most, perhaps even all current IT projects can manage! In fact that’s worth saying again in bold print to make the point!

    See how an investment of $13 million in a Procurement Transformation to a Digital Business made savings in the first full financial year of $132 million in Constellation Research case study

    https://www.constellationr.com/research/how-transforming-purchasing-can-lead-annual-savings-128-million

    The approach, methodology and focus on cost saving all align to the role that the CIO and IT department has traditionally played in the Enterprise, so its well within the current enterprise approach for IT projects. A point not necessarily true for many Sales and Marketing projects, plus most Procurement Management is more than happy to work in partnership improving their core function. Its fair to say that a Procurement Transformation is the low hanging fruit of Digital Business being most readily accessible, and offering clear financial benefit targets, in contrast to many Sales moves.

    Where do the cost savings accrue from in Digital Business Procurement?

    1. A sharp, and pronounced decrease in the cost of competitive supplier bidding, coupled with substantial automation of the procurement bidding processes, enables an increased amount of the procurement expenditure to be competitively managed. In the case study some $5 billion of expenditure was moved from periodic competitive bidding with one or more year best buy status awards to every purchase being competitively bid.
    2. The automation of bidding processes by new technology Services and capabilities, (supporting point 1), reduces substantially reduces the time/cost of running a procurement bid. Shifting to online real time auction bidding using reverse auctioning, which forces suppliers to bid against each other, and can be fully integrated with the requirement and order processes.
    3. A reorganization of work teams, (to enable point 2) by introducing flexible virtual workgroups based to better utilize time and knowledge optimization through collaboration and social tools. Virtual work teams focus on using personal knowledge and flexible time management to better find and realize short-term opportunities.

    In most enterprises though reduced expenditure (point1) is the transformation ‘to be’ outcome the path from the current ‘as is’ situation will start from the reorganization of the manner of working (point 3) to unlock the necessary skills and knowledge to make the transformation. In any case introducing good quality collaboration tools to enhance communication and clarification of every day working issues is fast becoming accepted good practice as speed and variety of the daily activities increases and becomes more frequently variable.

    Collaboration tools allow unstructured questions to be asked around topic, and answered by those able to provide answers, without either party needing to know the names or roles of each other. Unlike email that constrains the questioner to only being able to address questions to people they know, and therefore misses reaching a large section of the available experience and knowledge accumulated within an Enterprise.

    Analyzing the results of Collaboration provides new and usually radically different information, it possible to see the new unrecognized issues being raised, by whom, and with what the frequency of occurrence to better understand and improve existing processes. This newly found knowledge allows the transformation program to immediately add operational improvements.

    Analyzing Collaboration threads quickly identifies who is answering which question, and allows a new mapping of people skills and knowledge by topics, thus providing a fundamental insight into who is best able to contribute to which part of the transformation process through redesign of particular identified elements.

    Armed with this increased knowledge of the current issues, trends and the capabilities of the people in Procurement it becomes easier to logically break down the transformation tasks to align with available skills. Leaders of virtual work groups can now tap into a deeper pool of expertise without disrupting normal organizational structures or work. The first stage will need to focus on understanding exactly what is current good practice in Digital Business Procurement, or e-commerce online procurement to add an older term.

    For those not familiar with the various aspects of ‘digital’ Procurement there is a bewildering section of terms and techniques though almost all are based on some from of Reverse Auction. This is literally the reverse of an ordinary auction in which a single Seller offers goods for sale and a range of Buyers compete through outbidding each other with increasing prices. In a Reverse Auction there is a single Buyer with multiple sellers, usually actively bidding in real time to undercut each other. A Reverse Auction is usually a fully transparent bidding process, through a single sealed bid process is possible, to actively excite interest and competitive pricing pressures from suppliers in order to secure the business.

    Implicit in Reverse Auctioning Procurement is the Sellers acceptance of the Buyers commercial terms, thus placing the responsibility, a major part of the cost, and a great deal of the work, associated with normal Procurement process onto the seller! This point alone results in sharp reductions in time and negotiations of terms in normal competitive bidding.

    In examining the market for information on ‘digital’ procurement any of the following terms may be used by various Business Process Outsourcing, or BPO, providers, and product vendors, to describe the capabilities they provide; Procurement auction, e-auction, sourcing event, e-sourcing or eRA, eRFP, e-RFO, e-procurement, B2B Auction.

    In addition there is a further specialized type of ‘digital’ procurement whereby the Buyer stipulates the maximum price they are prepared to pay.  The use of this process is of great value when a manufacturer is costing their fully assembled product and wants to allocate an allowable cost to each bought in component.  

    There are a large number of Procurement Service Providers offering various levels and volumes of Procurement capabilities, As a Service, avoiding direct investment and aiding direct cost allocation to individual business activities. This is a further advantage in adopting Procurement as a Digital Business transformation as the practices are indeed standardized with the outcomes providing the competitive differentiation. Unlike Sales and Marketing Digital Business where the competitive differentiation is usually a key success factor in Digital Business initiatives and accordingly requires higher investment.

    An a quick first stop example to gain a rapid overview on Business Process Outsourcing, SourceOne offer an informative and well laid out web site. There are of course a great many other Procurement BPO providers, as well as many excellent Procurement products. Some Enterprises in some industry sectors will still wish to maintain particularly competitive advantages by operating their own Procurement Services, a reasonable comprehensive list of some of the best-known products can be found here.

    If you have read this far then the argument that there is a single initiative that introduces Digital Business into the enterprise with both the capability to target clear savings, and with a transformation program that offers less risk and disruption must be becoming clear.

    Most likely you are even now formulating some ideas on how to explore further how Digital Business Procurement might work in your Enterprise. So in conclusion here is a set of suggestions as to a starting point to work out the potential benefits.

    1. Determine the total annual spend of your enterprise in the last financial year, together with the number of orders, and the number of suppliers. (Previous good Procurement practice has been to reduce the number of suppliers, due to cost of administration of any supplier, with a switch to multi year call off awards so the results may be surprising).

    Build a simple model to show these parameters of the current situation in a manner that suits your enterprise point of view and the metrics discovered. This is the current base from which to calculate improvements. Do not forget to search for items normally regarded as out of scope and not included in the ‘annual’ procurement process.

    1. Carry out a series of analytics that refine the emerging picture of exactly how your enterprise expenditure is made up. Some key factors are usually; 
    • Split the expenditure between items that directly add value to your products and market versus items that support the administration of your enterprise. Administrative support purchases can be the lowest risk starting point to trial Digital Business Procurement, but the big rewards come from increased competitiveness, or margin improvement, in the product area
    • Determine separately firstly the amount of expenditure and the number of orders that are subject to competitive bidding individually, and secondly orders on an annual basis with multiple call offs that are not subject to individual competitive bids. Orders place in multi year bid awards stretching over more than one year should be excluded as non-competitive!
    • Use the information from b) to produce a graph for product-based expenditure with number of orders on one axis and value of individual order on the other axis. Overlay this graph with data as to individually competitively bid orders, and annually awarded contract call off orders.
    • Look for the anomalies that will comprise of the first round of targets in terms of amounts and sizes of orders, then carry out a detailed analysis of these orders to really understand the details and determine if these are realistic targets.

    This is obviously an exercise to carry out with the Procurement department so it must be about jointly established objectives. This is the focus and those responsible should be clear on this even though at an Enterprise level this may form part of a strategic move towards Digital Business. Attempts to integrate this directly with the sales strategy towards increased flexibility in the market place, or simply a further move in strategic cost reduction plans, should not muddle the prime purpose.

    Procurement professionals want to find ways to improve purchasing costs by making better use of their knowledge and experience, and are generally frustrated by the lack of time to focus on this due to the amount of time spent on  ‘bid administration’. Introducing Digital Business Procurement with dynamic bidding services reduces the ‘administration’ element and allows the to focus on finding new, more competitive sources. In parallel the dynamics of Digital Business Procurement model allow trials of improved purchasing profiles, using different parameters such as changing trading volume to establish how this might impact price as an example, and rapid analysis of results to provide feedback for further improvement.

    In fact its difficult to find any reasonable argument not to start to actively investing your Enterprise Procurement profile to establish the potential gains. Most Enterprises will quickly be able to build a case with a worthwhile target to make a trial transformation of Procurement using an external BPO provider worthwhile. Add the low levels of internal disruption with equally low risk factors through using a Services approach and it is truly a single easy to quantify game changing move in the adoption of Digital Business!

    Innovation & Product-led Growth Tech Optimization Future of Work AI ML Machine Learning LLMs Agentic AI Generative AI Analytics Automation B2B B2C CX EX Employee Experience HR HCM business Marketing SaaS PaaS IaaS Supply Chain Growth Cloud Digital Transformation Disruptive Technology eCommerce Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP Leadership finance Customer Service Content Management Collaboration M&A Enterprise Service Chief Information Officer Chief Technology Officer Chief Digital Officer Chief Data Officer Chief Analytics Officer Chief Information Security Officer Chief Executive Officer Chief Operating Officer

    IBM Interconnect – Disruption dictates digital enablers embedded in all IBM does

    IBM Interconnect – Disruption dictates digital enablers embedded in all IBM does

    1

    In late February 2015, IBM held their first global Interconnect event in Las Vegas. All major software brands were bought together (with analytics in a support role) to highlight the future of IBM from a software perspective. Clearly given the difficult nature of key aspects of the overall business for IBM, Interconnect represented the future if IBM is to be successful, not just software products.

    The key strategic take away from capioIT’s perspective was the level to which IBM has embedded cloud, and analytics into every software product and solution that IBM and its (still) often overlooked partners will take to market.

    It is clear that when talking cloud, IBM is heavily betting on the hybrid cloud model as the future. Alongside cloud and analytics, mobility (both with, and without, the benefit of the Apple relationship) and security is increasingly embedded in all that IBM will do.

    A note on security, IBM needs to make more noise about security. Clearly the overall IBM portfolio is so vast (and often can be cumbersome) that it is not hard for even an offering as deep as security to get overlooked. Expect more attention from IBM towards promoting security capability through 2015 and into 2016.

    The most critical enabler for the IBM shift to embed traditional definitions of digital into all that it offers is the acquisition in June, 2013 of SoftLayer. Without underestimating the billions that IBM has historically spent on acquisitions, or more recently, earned through asset disposal, this was the best $2 billion that IBM has invested in several years.

    As part of the $1.2B investment in cloud capabilities IBM has significantly increased the number of data centre locations in the 20 months since the acquisition to approximately 40. These have included new nodes in Australia, Canada, India and Italy in 2015. Clearly the IBM localised approach is designed to differentiate from other IaaS and PaaS providers who have taken a more centralised location approach. Despite IBM’s recent struggles with internal scale and complexity, the localised data centre location ability is one area where the scale of IBM provides clear benefits.

    The other key investment that IBM is integrating to drive support clients efforts with digital disruption is Bluemix. Bluemix is the IBM PaaS that it has been positioned as “The Digital Innovation Platform”. With a strong IBM focus and investment in the Cloud Foundry, it is driving the Bluemix platform to attract enterprise alignment and developer support

    The Bluemix centred engagement between IBM and Citibank has been designed to accelerate Citibank’s ability to compete with new disruptive banking platforms. Citibank also gains the ability to augment an innovative culture within its digital and competitive ecosystem.

    The innovation on show from IBM at Interconnect is not a panacea to the ills that have impacted IBM for the past couple of years. Whilst it is arguable that IBM has been countering the decline of the legacy vendor better than cross country rival HP, it is still a company with several troubled elements that may take too many quarters to unwind to satisfy the market. For every Watson, (the IBM innovation benchmark) there is a heavily burdened legacy infrastructure outsourcing business and a failure to address key market opportunities eg ealesforce.com solutions.

    Unfortunately, IBM has still not nailed the partner ecosystem. This aspect needs to be genuinely and mutually enhanced particularly from the software point of view.

     Capture Point

    Whilst IBM still has significant internal and external issues, it is clear that IBM will innovate to drive success. That is the approach that IBM has always attempted and it rarely knows any other way. All it has to go now is to get customers, clients and the ecosystem on board to provide the market with the tools to drive the digital disruption that is the new normal.

    Tech Optimization Chief Information Officer

    White House Cyber Security Summit Misses The Point

    White House Cyber Security Summit Misses The Point

    This is Part 2 of my coverage of the White House #CyberSecuritySummit; see Part 1 here.

    On Feb 13th, at President Obahama's request, a good number of the upper echelon of Internet experts gathered at Stanford University in Silicon Valley to work out what to do next about cybersecurity and consumer protection online. The Cyber Security Summit was put together around Obama's signing a new Executive Order to create new cyber threat information sharing hubs and standards to foster sharing while protecting privacy, and it was meant to maintain the momentum of his cybersecurity and privacy legislative program.

    The main session of the summit traversed very few technical security issues. The dominant theme was intelligence sharing: how can business and government share what they know in real time about vulnerabilities and emerging cyber attacks? Just a couple of speakers made good points about preventative measures. Intel President Renee James highlighted the importance of a "baseline of computing security"; MasterCard CEO Ajay Banga was eloquent on how innovation can thrive in a safety-oriented regulated environment like road infrastructure and road rules. So apart from these few deviations, the summit had a distinct military intelligence vibe, in keeping with the cyber warfare trope beloved by politicians.

    On the one hand, it would be naive to expect such an event to make actual progress. And I don't mind a political showcase if it secures the commitment of influencers and builds awareness. But on the other hand, the root causes of our cybersecurity dilemma have been well known for years, and this esteemed gathering seemed oblivious to them.

    Where's the serious talk of preventing cyber security problems? Where is the attention to making e-business platforms and digital economy infostructure more robust?

    Personal Information today is like nitroglycerin - it has to be handled with the utmost care, lest it blow up in your face. So we have the elaborate and brittle measures of PCI-DSS or the HIPAA security rules, rendered useless by the slightest operational slip-up.

    How about rendering personal information safer online, so it cannot be stolen, co-opted, modified and replayed? If stolen information couldn't be used by identity thieves with impunity, we would neutralise the bulk of today's cybercrime. This is how EMV Chip & PIN payment security works. Personal data and purchase details are combined in a secure chip and digitally signed under the customer's control, to prove to the merchant that the transaction was genuine. The signed transaction data cannot be hacked; stolen identity data is useless to a thief if they don't control the chip; a stolen chip is only good for single transactions (and only if the PIN is stolen as well) rather than the mass fraud perpetrated after raiding large databases.

    It's obvious (isn't it?) that we need to do something radically different before the Internet of Things turns into a digital cesspool. The good news for privacy and security in ubiquitous computing is that most smart devices can come with Secure Elements and built-in digital signature capability, so that all the data they broadcast can be given pedigree. We should be able to know tell for sure that every piece of information flowing in the IoT has come from a genuine device, with definite attributes, operating with the consent of its owner.

    The technical building blocks for a properly secure IoT are at hand. Machine-to-Machine (M2M) identity modules (MIMs) and Trusted Execution Environments (TEEs) provide safe key storage and cryptographic functionality. The FIDO Alliance protocols leverage this embedded hardware and enable personal attributes to be exchanged reliably. Only a couple of years ago, Vint Cerf in an RSA Conference keynote speculated that ubiquitous public key cryptography would play a critical role in the Internet of Things, but he didn't know how exactly.

    In fact, we have have known what to do with this technology for years.

    At the close of the Cyber Security Summit, President Obama signed his Executive Order -- in ink. The irony of using a pen to sign a cybersecurity order seemed lost on all concerned. And it is truly tragic.

    In 1998, Bill Clinton and his Irish counterpart Bertie Ahern signed an US-Ireland communique on e-commerce. At that time, the presidents used smartcards. Then in 2003 -- still early days -- Bill Gates espoused the importance of chip technology for authentication.  Within weeks, several notebook computers were released with integrated smartcard readers, but service providers chose not to use the stronger security options. Instead of leading a new wave of decent security, banks and governments muddled through with passwords and then password generators or text messages. Mainstream e-business missed a huge opportunity through the 2000s to embed smart authentication in the day-to-day user experience.

    We probably wouldn't need a cybersecurity summit in 2015 if serious transaction security had been built into the cyber infrastructure over a decade ago.

    Digital Safety, Privacy & Cybersecurity Infosec Security Zero Trust Chief Information Officer Chief Information Security Officer Chief Privacy Officer

    The Future of Data – An Ultra Brief Summary

    The Future of Data – An Ultra Brief Summary

    1

    I wrote a lengthy report on the future of data… due to several reasons I never got around to publishing it  (yet — I’d like to eventually, but now needs some updating).

    I would like to share some excerpts from this report – such as the one below.  Please let me know your thoughts and it might encourage me to publish it (might, might, might… might).

    Data has been touted over the years as many things: the blood the corporation, the main asset, the most valuable part of IT’s responsibilities – and lately as “Big Data”: a vast collection consisting of real-time data that comes from all walks of life and technology.

    Regardless of how it is viewed, labeled, or categorized data remains the most important component of organizations finding and defining value for interactions between stakeholders and customers.

    There are, however, two aspects that merit notice and make this very different from any other time: analytics and experiences.

    The Value of Analytics

    Without any processing, analysis and understanding of the hidden value inherent to data it actually is nothing more than a collection of one-and-zeroes in a storage device (or transport, if it must be interpreted life from the network as opposed to picked up from storage).  The purpose of data is to be combined with other elements, mixed-and-mashed in myriad ways, and its secrets unhidden.

    This is actually one the most valuable advances of the recent years: the speed of processing, the understanding of the data, the advances in storage and management, and the better knowledge of how to manage data yielded amazing advances in real-time analytics and the use of predictive analytics (or, better yet – anticipatory analytics).

    Now all we need are the tools to use it properly.

    This is where most of the analytics vendors that get it are working on: data visualization, data-prep, data-scrubbing and more of those tools are losing their IT-centric, consultant-deployed models and embracing the rise of the citizen programmer.  Indeed, letting the stakeholders and the users directly access the data they need to conduct analytics and manipulate the data via graphical driven interfaces is removing the need for the “data scientist” and letting more and more organizations use their data better.

    This is translating into better insights, better results, and better processes being deployed in organizations – and all this is the tip-of-the-spear for the digital transformation investments that will explode in the next few years.

    All They Want is Experiences

    The era of the customer is upon us.  Customers are more empowered and better prepared now that at any other time in history.  Armed with online communities, other customer’s reviews, and access to infinity resources via the internet they are smarter, better educated, and more knowledgeable than organizations.  As a result, they are calling the shots in the interactions between organizations and them: deciding when and where they interact, and (more importantly) what they want to get form the interaction.

    This last point is critical: most organizations are not prepared to deliver those outcomes (in the form of experiences) because they don’t have access to the right information.

    Information management I shaping up to be the critical investment priority for organization in the next decade and the three elements that make up information (data, knowledge, and content) are shaping up to get generous budgets allocated to them.

    Of course, it is not simply about having the right information, or knowing where to find it, but also of making sure the right data is matched with the proper content and complemented with the necessary knowledge to provide a complete, personalized, and optimized answer to the customer’s question or inquiry.

    The understanding of how information is created (how data is analyzed, knowledge generated, and content maintained at the very least) is what is going to be driving infrastructure investments for IT in the next 2-3 years (and longer) as they adjust to the new reality of having to manage information using technology.

    What do you think? Am I way off?

    Data to Decisions Future of Work Innovation & Product-led Growth New C-Suite Sales Marketing Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership B2C CX business Marketing finance Customer Service Content Management Chief Customer Officer Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief People Officer Chief Human Resources Officer

    Capgemini – all about making innovation a habit

    Capgemini – all about making innovation a habit

    index

    Last week I decided to escape the snowy and brutal winter that has blanketed Boston and head to a sunny and warmer location – Chicago. Ha, clearly I am suffering from cabin fever. The reality is Chicago was warmer and had barely any snow, but enough about the weather.

    What brought my colleague Ray Wang and me to Chicago was to visit Capgemini and attend their well-organized analyst day. The theme over the two days was pretty clear – innovation is the future for Capgemini. Easy to proclaim, difficult to execute. So can Capgemini live up to their lofty proclamation? Only time will tell but here are three take-aways that indicate they are on the right path:

    • Instilling the closed loop process to innovation: Innovation cannot be a one time event, something that falls into a to-do list that we can check off as complete and move on to the next task. Being able to innovate must be something an organization takes on as a habit. Similar to exercising – going to the gym or for a swim is okay as a one-time event, but making it a habit is where we draw the greatest benefits. Capgemini emphasized the importance of infusing a habit of innovating with not only their clients but within their own organization. They highlighted work they did with many of their customers to constantly seek and execute on innovative needs. One such customer is one of North America’s largest agriculture co-operatives, who highlighted two large-scale workshops they had leveraging Capgemini’s Accelerated Solutions Environment facilitated process. These resulted in some important changes as well as greater innovative process for the companies 17 divisions. The framework from Capgemini is simple but requires discipline and rigor to stay with the process:
      • Discover – These are where the in person sessions are vital to flesh out where the needs are and what can be implemented.
      • Devise – Think of this as the fail fast segment. Implement quickly and learn quickly as to what works and will not.
      • Deploy – Take the successes from the prior stage and begin to deploy across the board.
      • Sustain – This is the key closed loop element. This cannot be a one-time project but must constantly build on itself. Sustain brings you back to the Discover phase.
    • Failure is just as important as success: It could be argued that failure is the foundation of success. The whole notion of “fail fast” is what allows you to get to the successes sooner. Capgemini highlighted an example of working with a large CPG to exploring greater efficiencies via using Google glass. Unfortunately, the project did not achieve the goals. But fortunately for all the parties involved they absorbed plenty of learning from the experience. As Capgemini stated, just because the project did not catch on, does not mean it will not resurface down the road. The use of the technology for the original goal did not get adopted, but the learning that came from the process was successful. Capgemini’s customer shelved what would have been a large expenditure, Google was provided with the feedback to improve their product and the findings from the experience provide the basis for potential similar projects in the future. As a client stated during the conference “The toe stubs are where innovation comes from.” Which is why the next take away is crucial to the innovation journey.
    • Long term relationship, not speed dating: Capgemini clearly displayed that their mind set is to develop and maintain long-term relationships with their customer base. They truly want to be seen as a partner for their customers and not only as firefighters being brought on to put out fires. Capgemini highlighted a number of clients Hydro One, Syngenta, Jamba Juice and Coca Cola to name a few. Wanting to create a long term business relationship is the goal of most companies, regardless of their industry. But it is clear for companies such as Capgemini, Accenture, KPMG and TCS to name a few, the days of large one off projects to implement large package applications are dwindling. That revenue stream cannot be sustainable. Becoming a trusted advisor to navigate the continually shifting technology and business process landscape could provide a more reliable revenue stream. It certainly will not be easy, but marriage never is!

    It is clear that Capgemini recognizes the needed to move from being an integrator to a trusted advisor. They provided some thoughts and some voice of the customer that seems to point to Capgemini being on the right path. However it will be interesting to see if they can make this innovation partnership a large enough chunk of their business. They did mention during the session that they did see lots of business from merger and acquisitions. These feel like firefighting opportunities. Companies need to consolidate systems and processes after a business event, but does that translate to long-term partnerships? To be determined.

    The new model for innovation is about delivering a stream of innovation not just one great idea. The right strategic direction for the company, but the journey will not be without major difficulties. But nothing worth achieving is simple.

    Matrix Commerce Chief Information Officer

    On pure maths and innovation: An open letter to the editor of The New Yorker, February 2015.

    On pure maths and innovation: An open letter to the editor of The New Yorker, February 2015.

    An unpublished letter to the editor of The New Yorker, February 2015.

    My letter

    Alec Wilkinson says in his absorbing profile of the quiet genius Yitang Zhang ("The pursuit of beauty", February 2) that pure mathematics is done "with no practical purposes in mind". I do hope mathematicians will forever be guided by aesthetics more than economics, but nevertheless, pure maths has become a cornerstone of the Information Age, just as physics was of the Industrial Revolution. For centuries, prime numbers might have been intellectual curios but in the 1970s they were beaten into modern cryptography. The security codes that scaffold almost all e-commerce are built from primes. Any advances in understanding these abstract materials impacts the Internet itself, for better or for worse. So when Zhang demurs that his result is "useless for industry", he's mispeaking.

    The online version of the article is subtitled "Solving an Unsolvable Problem". The apparent oxymoron belies a wondrous pattern we see in mathematical discovery. Conundrums widely accepted to be impossible are in fact solved quite often, and then frenetic periods of innovation usually follow. The surprise breakthrough is typically inefficient (or, far worse in a mathematician's mind, ugly) but it can inspire fresh thinking and lead to polished methods. We are in one of these intense creative periods right now. Until 2008, it was widely thought that true electronic cash was impossible, but then the mystery figure Satoshi Nakamoto created Bitcoin. While it overturned the conventional wisdom, Bitcoin is slow and anarchic, and problematic as mainstream money. But it has triggered a remarkable explosion of digital currency innovation.

    A published letter

    Another letter writer made a similar point:

    As Alec Wilkinson points out in his Profile of the math genius Yitang Zhang, results in pure mathematics can be sources of wonder and delight, regardless of their applications. Yet applications do crop up. Nineteenth-century mathematicians showed that there are geometries as logical and complete as Euclidean geometry, but which are utterly distinct from it. This seemed of no practical use at the time, but Albert Einstein used non-Euclidean geometry to make the most successful model that we have of the behavior of the universe on large scales of distance and time. Abstract results in number theory, Zhang's field, underlie cryptography used to protect communication on devices that many of us use every day. Abstract mathematics, beautiful in itself, continually results in helpful applications, and that's pretty wonderful and delightful, too.

    David Lee
    Sandy Spring, Md.

    On innovation

    My favorite example of mathematical innovation concerns public key cryptography (and I ignore here the credible reports that PKC was invented by the Brits decades before but kept secret). For centuries, there was essentially one family of cryptographic algorithms, in which a secret key shared by sender and recipient is used to both encrypt and decrypt the protected communication. Key distribution is the central problem in so-called "Symmetric" Cryptography: how does the sender get the secret key to the recipient some time before sending the message? The dream was for the two parties to be able to establish a secret key without ever having to meet or using any secret channel. It was thought to be an unsolvable problem ... until it was solved by Ralph Merkle in 1974. His solution, dubbed "Merkle's Puzzles" was almost hypothetical; the details don't matter here but they were going to be awkward to put it mildly, involving millions of small messages. But the impact on cryptography was near instantaneous. The fact that, in theory, two parties really could establish a shared secret via public messages triggered a burst of development of practical public key cryptography, first of the Diffie-Hellman algorithm, and then RSA by Ron Rivest, Adi Shamir and Leonard Adleman. We probably wouldn't have e-commerce if it wasn't for Merkle's crazy curious maths.

    Data to Decisions Digital Safety, Privacy & Cybersecurity Future of Work Innovation & Product-led Growth New C-Suite Tech Optimization Chief Customer Officer Chief Executive Officer Chief Digital Officer