Results

Rethinking Marketing: From Media to Experience

Rethinking Marketing: From Media to Experience

1

In the marketing industry, we have been talking, writing and even creating a shift in the way that we do business for over a decade. Early blogs and (what is now called) social media provided an inkling into where the shift was going – away from paid media into “owned” and “earned” media. This was a difficult, but relatively understandable transition because we were essentially talking the same language – the language of media. Accordingly we shifted from media planning and strategy towards “content planning and strategy” – we were still talking about the same processes behind the brand curtain – it’s just that some of those activities happened on the other side:

  • Paid media – traditional advertising like print, television, radio, direct mail, retail/channel and the kind of placement that you have to pay for. The benefits of paid media is that you get (mostly) what you pay for – control over the context, content, use of your logo and other branding, messaging, focus and tone of voice.
  • Owned media – your own properties like your website, microsites and blogs, forums or branded communities. To an extent, your Facebook fan pages, Twitter profiles and YouTube channels etc fall into owned media – though you have less precise control over interaction/commentary, overall look and feel (ie your Facebook page is always going to look like it belongs to Facebook).
  • Earned media – the word of mouth, social mentions (tweets, status updates, mentions, reviews, blog posts) and so on that are produced about your brand by your fans. You have little influence over the structure, timing or even appearance of your messaging or branded assets – but it ranks as one of the most influential forms of media.

But while we (marketers) were talking about the different kinds of media, technology companies and startups were out there changing the form and function of that media. They weren’t interested in the marketer’s view of media – looking instead for ways that technology could extend, enhance or accelerate the flow of that media from brand to consumer. Accordingly they focused their efforts on four technology trends – creating an enterprise-scale IT model known as SMAC which combines Social, Mobile, Analytics and Cloud. And while this works from an inside-out point of view, it must be revisited and reframed to deliver value and relevance to our customers.

Experience as the beating heart of brands

It’s easy to rant about poor customer experience. We see it on social media all the time. Sometimes it is warranted. Sometimes it isn’t. But SMAC has removed the barriers to entry for the vast majority. All we have to do is take a photo upload it to Facebook or Twitter and tag it with #fail and it will reach not only our friends and connections but others who monitor and amplify these kind of failures of brand experience (yes, these people really do exist).

Take a look at this single tweet from Mashable about a “Valentines Day flower failure”. With over 5 million followers and hundreds of retweets – a poor customer experience can turn a bad day into an unfolding disaster.

The point, however, is that we – as consumers – experience brands at a very personal level. With this in mind, it is worth reframing SMAC and media from the outside-in. It’s time to understand the behavioural triggers that arise out of SMAC and create engagement that works for our fans, customers, and advocates.

Paid

  • Social: The Social dimension has the potential to deliver powerful, personal yet scalable CONNECTION. It offers a single conversational channel, builds trust and offers a way to accelerate a resolution or conversion process
  • Mobile: The Mobile dimension delivers LOCATION. With a connected device in your pocket (close to your beating heart), a mobile phone is the convergence point where the digital and the “real” worlds collide
  • Analytics: The power of big data is not in crunching everything known about a customer. The real value is in delivering AWARENESS to a network. This effectively means creating USER context from the social, mobile and business data signals available
  • Cloud: And the cloud provides the mechanism for SERVICE. To remain relevant to customers, brands must re-acquaint themselves with the value of service. And Cloud provides the mechanism to do so.

Combining SMAC with an understanding of customer behaviour means that SERVICE can be delivered conveniently at the right time, in the right space in the right context. And even in the right environment.

Is it the future of marketing? Don’t look too far towards the horizon, for this future has already happened. Only some heard it knocking on the door.

Marketing Transformation Data to Decisions Future of Work Innovation & Product-led Growth New C-Suite Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity Marketing B2B B2C CX Customer Experience EX Employee Experience AI ML Generative AI Analytics Automation Cloud Digital Transformation Disruptive Technology Growth eCommerce Enterprise Software Next Gen Apps Social Customer Service Content Management Collaboration Chief Marketing Officer Chief Customer Officer Chief People Officer Chief Human Resources Officer

How Many Security Breach Notices Have You Gotten? Time Cloud Providers Step Up

How Many Security Breach Notices Have You Gotten? Time Cloud Providers Step Up

I don’t know about you, but I do worry about cybercrime. I just got another notice in the mail from a company saying that they “may have had a security breach.”  The security of CRM or customer data is clearly something that customers care about. It has become so common that it’s almost not a shocker when I get letters like this. CRM vendors, especially those that put customer records, data and customer analytics in the cloud must step up their security. I was relieved to hear about the independent auditors that verified that Microsoft Azure, Office 365, Microsoft Dynamics CRM Online, and Intune align to ISO/IEC 27018, which provides a uniform, international approach to protecting Personally Identifiable Information (PII) in the cloud.

The company hit other privacy milestones last year, including confirmation from European data protection authorities (Europe tends to have stricter regulations than the US) that its enterprise cloud contracts are in line with “model clauses” under EU privacy law, and was among the first companies to sign the Student Privacy Pledge. In a blog post by Brad Smith, General Counsel & Executive Vice President, Legal and Corporate Affairs, Microsoft, he said the privacy standard, known as ISO/IEC 27018, was developed by the International Organization for Standardization (ISO) to establish a uniform, international approach to protecting privacy for personal data stored in the cloud.

What does this mean for companies and their customers? Adherence to ISO 27018 assures enterprise customers that customer privacy will be protected in several ways.

  • Companies are in control of their data. If they use the Microsoft products that adhere to ISO 27018, that adherence to the standard ensures that Microsoft only processes personally identifiable information according to the instructions that a company provides to Microsoft. So if you are a Microsoft customer, time to make sure the CRM folks and the IT/ Security folks are having lunch and meetings to discuss, plan and execute on their privacy strategies.
  • Companies know what’s happening with their data. Adherence to the standard ensures transparency about Microsoft’s policies regarding the return, transfer, and deletion of personal information the company stores in the data centers. Microsoft will not only let the company know where their customer’s data is, but if Microsoft works with other companies who need to access your data, Microsoft will let the company know who Microsoft is working with. In addition, if there is unauthorized access to personally identifiable information or processing equipment or facilities resulting in the loss, disclosure or alteration of this information, Microsoft will inform the company of this.
  • Microsoft provides strong security protection for a company’s customer data. Adherence to ISO 27018 provides a number of important security safeguards. It ensures that there are defined restrictions on how Microsoft handle personally identifiable information, including restrictions on its transmission over public networks, storage on transportable media, and proper processes for data recovery and restoration efforts. In addition, the standard ensures that all of the people, including Microsoft’s own employees, who process personally identifiable information must be subject to a confidentiality obligation.
  • Your customer’s data won’t be used for advertising. Enterprise customers have been expressing their concerns about cloud service providers using their data for advertising purposes, especially without consent. The adoption of this standard reaffirms Microsoft’s longstanding commitment not to use enterprise customer data for advertising purposes.
  • Microsoft will inform companies about government access to data. The standard requires that law enforcement requests for disclosure of personally identifiable data must be disclosed to a company as an enterprise customer, unless this disclosure is prohibited by law. Microsoft already adheres to this approach, and the adoption of the standard reinforces this commitment.

So as a consumer, do you feel safer or not? That’s the important thing. It’s a very good step in the right direction for Microsoft and it’s products. Now what to do about those cybercriminals?

@drnatalie

VP and Principal Analyst, Constellation Research

Covering Customer Experiences that Engage, Empower and Ensure High Customer Lifetime Value

 

Share

Digital Safety, Privacy & Cybersecurity New C-Suite Next-Generation Customer Experience Tech Optimization Chief Customer Officer Chief Information Officer Chief Marketing Officer Chief Digital Officer

What Does Plugged-In Mean? Computers In Class & Conference Rooms

What Does Plugged-In Mean? Computers In Class & Conference Rooms

1

A colleague recently shared this Washington Post article with me: This year, I resolve to ban laptops from my classroom. Yes, I have seen the studies about long-hand versus typed notes (long-hand wins). But that is comparing across one dimension -- something everyone in any of my classes or workshops knows is not what you want to do.

Your learning experience or meeting is not about lecture and taking a test... or at least it shouldn't be. It should be about the full process: The best course design or collaboration using the best tools (electronic or not), designed to work in the best way with your own skills, context, and needs.

Mixing Human, Technical, and Organizational Dimensions in Your Work

Being plugged-in is about the mix of human, technical, and organizational dimensions. If all we did were listen to lectures, take notes, and then take tests, I might suggest you keep the computer in your bag. If you simply don't have the self-control to stay off of your social streams, then too, maybe leave the computer in the bag until we need it for a specific task.

But, if the computer is giving you a way to link what we're doing in class or in a meeting to how it's going to help you at work, or how it relates to other material -- or if it's the way you're co-creating the learning experience or work product -- then I'm going to ask you to have an "internet enabled device" as part of your toolkit.

Learning By Integrating

I'm just back from a conference where a colleague said he'd banned computers in the classroom. I said I'd have to drop his course. My notes, even those from that conference, are a combination of what's being said plus links back to other material. I think I even sent follow-up emails to colleagues not at the conference so we could take a related action. I'm fully engaged, both with the inflow of the information in the room, but perhaps more importantly, with how that information relates to my own work. Yes, I could create those links after the class or conference session, but few of us get the chance for that kind of reflection. I'll also admit that I may have missed a talking point while integrating a previous point with a possible action item. (Might a different session design have pauses built in to allow for this integration?)

I'm also at a loss when a meeting kicks off with a request to close the laptops or put down the tablets. There is a presumption that all the information we'll need to do our work is in our heads, that we don't have the self-control to stay focused on the topic, and/or that we couldn't be leveraging our tools to do the work of the meeting (taking group notes, getting information from others not present, starting the draft of the report while we can all be looking at the result, etc.) Rarely can I as a meeting leader guess at the best way for the session to go. I need to be confident that my colleagues are making good choices - and of course I want to provide a clear agenda in advance so they can.

The Answer

Plugged-In doesn't mean always connected. It means engaging appropriately with all the human, technical, and organizational dimensions of your work and learning.

  • Stop and consider the context and goals of the session, both for you and your colleagues.
  • Build your approach to match these goals. Think of it as as negotiating change, even if it's just for yourself.
  • Share (think out loud) with your colleagues and look for improvements to your practice. They'll appreciate you're aware of the issues and you may co-create a better overall approach for reaching your goals.

And if you are checking Facebook rather than engaging with your colleagues, realize that the camera documenting the course or meeting, is also pointed right at your screen....

Future of Work Chief Executive Officer Chief People Officer

Marketing and Dating: How to Get a Date by the Numbers

Marketing and Dating: How to Get a Date by the Numbers

1

Dating is big business. There are generic dating sites designed to help you find a date, a life partner or someone just to hang out with. There are also incredibly focused dating sites that are designed to introduce you to other people who have the same particular passions and interests as you. Maybe you are looking for a “sea captain” or perhaps you just hate it when Movember finishes and need to sate your passion for the tache. Whatever the case, if you look hard enough you’re bound to find a dating site designed just for people like you (yes, you crazy cat lady).

In many ways, the challenge of dating is the same challenge that marketers face. We’re all looking for that one-to-one connection – though often we struggle to a way to meet and start a conversation. In both cases (marketing and dating), digital disruption is creating both opportunities and challenges. And at the heart of this is data.

Inga Ting reveals that what we say in our dating profiles and what we want are often completely different. Dating sites – just like data-driven marketers – are less interested in “stated intentions” and more interested in actual behaviour. By looking at online behaviour – the things that we like, connect with, share and return to – marketers can adjust their profiling to reach and more deeply engage potential customers. This algorithmic approach relies not on focus groups and market research but on an adaptive approach which operates between your stated profile (self designed) and the actions you take online. In the world of online dating it means operating in-between spaces:

Behaviour-based matching is adaptive. It compares what you said you wanted with how you behave to work out things you might not even know about yourself.

For example, you said you wanted a partner with a steady income but you keep messaging “pro-bono computer game testers” and “freelance writers”, so the algorithm changes its recommendations.

Our profile

But, of course, while there can be volumes of data about ourselves online – we are also highly visual. The rise of photo based apps like Tinder for example shows that sometimes dating (and even marketing) is only skin deep. Relying on your photo and your location information, Tinder matches people based on whether they are close and interested (you swipe a prospective date’s photo to the left to reject and to the right to connect).

For those who are serious about dating, perhaps a single app is not the answer. The “multichannel” approach that works for marketers may yield better results. Take for example, the data from Axciom’s infographic (ht Will Scully-Power) that reveals that, in Sydney:

  • Single females outnumber males at all ages except the 18-24 age group
  • Potts Point is home to the most singles
  • Wine enthusiasts are most likely to reside in the Eastern and Inner West suburbs

If you were a male in the highly competitive 18-24 age group, a multichannel (or omnichannel) marketing approach to maximising your chances would include:

  1. Establishing your base profiles on high traffic sites
  2. Create a profile image that shows your passion for fitness and interest in fine wine (please be tasteful)
  3. Spend time in cafes in Potts Point using Tinder

Of course, you could pepper your profile with quotes from Shakespeare, but that may be overkill. Remember, that the algorithms will override your stated profile anyway – so your true intentions will always be revealed in the data – based on who you swipe right and who you swipe left, who you message, like and connect with. And like all good marketing, the question comes down to ROI, engagement and outcomes. I hope you get your algorithm right!

acxiom-valentine-infographic-hires

Marketing Transformation Chief Customer Officer Chief Marketing Officer

News Analysis: Rumors On Apple's Foray Into Cars "Project Titan"

News Analysis: Rumors On Apple's Foray Into Cars "Project Titan"

Project Titan May Put Apple Into The Auto Business

The February 13th, 2015 Wall Street Journal story spotlighted many of the rumors around the developments behind Apple going into the car business.   Framed around challenging Tesla Motors, the story discussed how Apple may be putting together an Apple branded electric vehicle.  Vice President Steve Zadesky of iPod and iPad fame is said to be leading the charge with a mandate to hire up to 1000 folks both internally and externally for the code named Titan project.  Apple has neither confirmed nor denied any elements of the Wall Street Journal story (see Video 1).

Video 1: CNBC Interview on Prospects Of An Apple Car

The Bottom Line: Apple Seeks Continuity Across The Digital Lifestyle

While there have been key hires across the board with auto experience and that’s one part of the equation, the other part is reimagining the broader digital lifestyle in new pallettes. Stripping away the hype and focusing on the Apple core, Constellation believes this is about finding new markets for Apple’s operating systems.   Similar to how mobile put Apple back on the map for not just a device, but also an operating system with an ecosystem, Apple sees cars, homes, and other areas of the digital lifestyle as opportunities to embed the operating system and build out new networked economies.

The focus on continuity of experience is at the heart and soul of Apple.  This is the foundation behind health kit, home kit, watch kit, and car play.   Apple is focused on delivering its ubiquitous experience from walking outside, checking your wrist, to hopping in the car, making a payment, to the in home experience.  The car puts Apple’s OS in the proverbial driver’s seat.

Unfortunately, putting together an auto company is not an easy thing to do. The barriers of entry are high for most prospective entrants. Tesla couldn’t pull it off without all the government  subsidies and tax write offs, including carbon credits in California.  Apple is one of the few companies in the world who have the cash and the  ability to pull the know how together.

However, the car may be the concept  that becomes a platform others build on.  Apple may not get into the car business but they may provide all the pieces required to deliver the new digital experience for auto makers to build on top of.  If they choose this route, they can create another area of the Apple OS to grow market share and increase and already impossibly high total addressable market.

Your POV.

Ready for a car from Apple, Google, or someone else?  Think Apple can disrupt the auto world with a car?  Add your comments to the blog or reach me via email: R (at) ConstellationR (dot) com or R (at) SoftwareInsider (dot) org.

Please let us know if you need help with your Digital Business transformation efforts. Here’s how we can assist:

  • Developing your digital business strategy
  • Connecting with other pioneers
  • Sharing best practices
  • Vendor selection
  • Implementation partner selection
  • Providing contract negotiations and software licensing support
  • Demystifying software licensing

Resources

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy,stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions.  However, happy to correct any errors upon email receipt.

Copyright © 2001 -2014 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience

The post News Analysis: Rumors On Apple’s Foray Into Cars “Project Titan” appeared first on A Software Insider's Point of View.

 

New C-Suite Marketing Transformation Next-Generation Customer Experience Data to Decisions Innovation & Product-led Growth Revenue & Growth Effectiveness Tech Optimization Future of Work SoftwareInsider AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership Marketing B2B B2C CX Customer Experience EX Employee Experience Growth eCommerce Social Customer Service Content Management business HR HCM finance M&A Chief Customer Officer Chief Marketing Officer Chief Digital Officer Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Executive Officer Chief Analytics Officer Chief Financial Officer Chief Operating Officer Chief Revenue Officer Chief Experience Officer Chief People Officer Chief Human Resources Officer

Fixing The Suckiness of Predictive Analytics

Fixing The Suckiness of Predictive Analytics

1

You have been so nice to respond to my publishing of “old” work that was never shown that I want to continue doing that.

What follows is the fist of a three part series (when you are breaking down a 3-4 page writeup into pieces three parts seems to be about ideal).

I was tasked last year to focus on how to make predictive better.  I was never a fan of how predictive analytics was implemented (I am fine with the concept, but I don’t think anyone cares about the concept – instead deteriorating it into a parrot-act of repetitiveness with no good results).

In conducting the research came upon come long-forgotten concepts and ideas, and mulling through them gave me a new idea: the one you will read about in next week’s installment :-)

First, let me set the playing field.

Predictive analytics is finally changing.

An art form of sorts, revived by the recent interest in Big Data and analytics shown by global corporations in the past decade, predictive was never intended for the current uses.

The definition of predictive analytics puts it at odd with the current usage.

Predicting a behavior was not intended to be used as a harbinger of a customer’s intention to purchase but rather as a lagging indicator of an occurrence or event so that the knowledge could be used to build better analytics models.

The thought that an occurrence will repeat many times over because of past data points indicating a similar setup is criticized by many analytics experts – even when adopted by most organizations.

The difference is the narrowness of what predictive can do today. We are simply focused on one path, one way to get from point A to point B. If last time we were at point A we took a bus to get to point B, we will do the same today. The complexity of today’s world makes those “guesses” just about impossible. What if, for example, it is raining heavily and I am in a rush? Could I take a taxi instead? Or, what f I have time and it is a beautiful day? Could I walk? Or, what if I am with someone who owns a motorcycle? As you can see, the many variables that are traditionally ignored by predictive (we look for a pattern, and then try to repeat it when similar data points are recognized in the same sequence) are what make the new models far more interesting.

Keep in mind, this is not what predictive intended to be – but what became from the poor implementations along the way.

A successful bad implementation will  be repeated.  A failed good implementation never sees the light of day again.  This is how Twitter came be used for Customer Service (but I digress)

Instead of trying to predict behavior step-by-step as most predictive applications do, why not use the pattern as a loose guideline of a sought outcome, break down the steps, and consider the many options available at each step. What yonder could’ve been a monumental step in calculating and analytics is very possible today thanks to advances in data capture, storage, management, and analysis.

The “Big Data” era brought the capabilities to analyze just about any data set in real-time and add many more variables as part of the analysis yielding far more interesting insights.

And it is within this new approach that we find not predictive analytics – but anticipatory analytics: the ability to dynamically and actively generate insights at each step of the way based on previously impossible to include variables and elements: intent, decision-making by users in real time, and untold goals and objectives.

As a result, my phone may hail a taxi for me (and maybe offer me a discount) if it detects rain or nudge me towards walking on a nice day – not because I did it before, but because I am about to do it. This is where predictive transforms to become the art of the possible.

What does anticipatory analytics look like?  Come back next week to see…

Matrix Commerce Next-Generation Customer Experience B2C CX Chief Customer Officer Chief People Officer Chief Human Resources Officer

Obama's Cybersecurity Summit

Obama's Cybersecurity Summit

The White House Summit on Cybersecurity and Consumer Protection was hosted at Stanford University on Friday February 13. I followed the event from Sydney, via the live webcast.

It would be naive to expect the White House Cybersecurity Summit to have been less political. President Obama and his colleagues were in their comfort zone, talking up America's recent economic turnaround, and framing their recent wins squarely within Silicon Valley where the summit took place. With a few exceptions, the first two hours was more about green energy, jobs and manufacturing than cyber security. It was a lot like a lost episode of The West Wing.

The exceptions were important. Some speakers really nailed some security issues. I especially liked the morning contributions from Intel President Renee James and MasterCard CEO Ajay Banga. James highlighted that Intel has worked for 10 years to improve "the baseline of computing security", making her one of the few speakers to get anywhere near the inherent insecurity of our cyber infrastructure. The shocking truth is that cyberspace is built on terrible foundations; the software development practices and operating systems that bear the economy today were not built for the job. For mine, the Summit was too much about military/intelligence themed information sharing, and not enough about why our systems are such a shambles. I know it's a dry subject but if they're serious about security, policy makers really have to engage with software quality and reliability, instead of thrilling to kids learning to code. Software development practices are to blame for many of our problems; more on software failures here.

Ajay Banga was one of several speakers to urge the end of passwords. He summed up the authentication problem very nicely: "Stop making us remember things in order to prove who we are". He touched on MasterCard's exploration of continuous authentication bracelets and biometrics (more news of which coincidentally came out today). It's important however that policy makers' understanding of digital infrastructure resilience, cybercrime and cyber terrorism isn't skewed by everyone's favourite security topic - customer authentication. It's in need of repair yet it is not to blame for the vast majority of breaches. Mom and Pop struggle with passwords and they deserve better, but the vast majority of stolen personal data is lifted by organised criminals en masse from poorly secured back-end databases. Replacing customer passwords or giving everyone biometrics is not going to solve the breach epidemic.

Banga also indicated that the Information Highway should be more like road infrastructure. He highlighted that national routes are regulated, drivers are licensed, there are rules of the road, standardised signs, and enforcement. All these infrastructure arrangements leave plenty of room for innovation in car design, but it's accepted that "all cars have four wheels".

Tim Cook was then the warm-up act before Obama. Many on Twitter unkindly branded Cook's speech as an ad for Apple, paid for by the White House, but I'll accentuate the positives. Cook continues to campaign against business models that monetize personal data. He repeated his promise made after the ApplePay launch that they will not exploit the data they have on their customers. He put privacy before security in everything he said.

Cook painted a vision where digital wallets hold your passport, driver license and other personal documents, under the user's sole control, and without trading security for convenience. I trust that he's got the mobile phone Secure Element in mind; until we can sort out cybersecurity at large, I can't support the counter trend towards cloud-based wallets. The world's strongest banks still can't guarantee to keep credit card numbers safe, so we're hardly ready to put our entire identities in the cloud.

In his speech, President Obama reiterated his recent legislative agenda for information sharing, uniform breach notification, student digital privacy, and a Consumer Privacy Bill of Rights. He stressed the need for private-public partnership and cybersecurity responsibility to be shared between government and business. He reiterated the new Cyber Threat Intelligence Integration Center. And as flagged just before the summit, the president signed an Executive Order that will establish cyber threat information sharing "hubs" and standards to foster sharing while protecting privacy.

Obama told the audience that cybersecurity "is not an ideological issue". Of course that message was actually for Congress which is deliberating over his cyber legislation. But let's take a moment to think about how ideology really does permeate this arena. Three quasi-religious disputes come to mind immediately:

  • Free speech trumps privacy. The ideals of free speech have been interpreted in the US in such a way that makes broad-based privacy law intractable. The US is one of only two major nations now without a general data protection statute (the other is China). It seems this impasse is rarely questioned anymore by either side of the privacy debate, but perhaps the scope of the First Amendment has been allowed to creep out too far, for now free speech rights are in effect being granted even to computers. Look at the controversy over the "Right to be Forgotten" (RTBF), where Google is being asked to remove certain personal search results if they are irrelevant, old and inaccurate. Jimmy Wales claims this requirement harms "our most fundamental rights of expression and privacy". But we're not talking about speech here, or even historical records, but rather the output of a computer algorithm, and a secret algorithm at that, operated in the service of an advertising business. The vociferous attacks on RTBF are very ideological indeed.
  • "Innovation" trumps privacy. It's become an unexamined mantra that digital businesses require unfettered access to information. I don't dispute that some of the world's richest ever men, and some of the world's most powerful ever corporations have relied upon the raw data that exudes from the Internet. It's just like the riches uncovered by the black gold rush on the 1800s. But it's an ideological jump to extrapolate that all cyber innovation or digital entrepreneurship must continue the same way. Rampant data mining is laying waste to consumer confidence and trust in the Internet. Some reasonable degree of consumer rights regulation seems inevitable, and just, if we are to avert a digital Tragedy of the Commons.
  • National Security trumps privacy. I am a rare privacy advocate who actually agrees that the privacy-security equilibrium needs to be adjusted. I believe the world has changed since some of our foundational values were codified, and civil liberties are just one desirable property of a very complicated social system. However, I call out one dimensional ideology when national security enthusiasts assert that privacy has to take a back seat. There are ways to explore a measured re-calibration of privacy, to maintain proportionality, respect and trust.

President Obama described the modern technological world as a "magnificent cathedral" and he made an appeal to "values embedded in the architecture of the system". We should look critically at whether the values of entrepreneurship, innovation and competitiveness embedded in the way digital business is done in America could be adjusted a little, to help restore the self-control and confidence that consumers keep telling us is evaporating online.

 

See Part 2 of my coverarge of the summit here

Data to Decisions Digital Safety, Privacy & Cybersecurity New C-Suite Tech Optimization Security Zero Trust Chief Customer Officer Chief Financial Officer Chief Information Officer Chief Digital Officer Chief Information Security Officer Chief Privacy Officer

Progress Report - SAP HCM makes progress and consolidates - a lot of moving parts

Progress Report - SAP HCM makes progress and consolidates - a lot of moving parts

SAP had their first anual analyst meeting in San Francisco and it was a good time to catch up on overall progress almost 6 months after SuccessConnect in Las Vegas (my takeaways here).
 


Before we embark, here is a great slide on the history of both SAP HCM and SuccessFactors:

 

As typical for a Progress Report – here are my Top 3 takeaways:

1. A lot of moving parts – Even before the SAP S/4HANA announcement from the other week (see my First Take here), there were already a lot of moving parts in the SAP HCM / SuccessFactors portfolio. While SAP built EmployeeCentral on the MDF Framework, it was clear that more had to happen with the rest of the SuccessFactors application portfolio, as well as the BI / Analytics space. And SAP was also working on making the proven and venerable R/3 payroll engine available for SaaS deployments. And then there was this new database that SuccessFactors is supposed to run on, HANA. And with the new S/4HANA product, there is a new architecture and product suite announced and it will need to have some HCM capabilities, too. So let’s peel all these pieces back:


  • SAP plans to make cloud applications only available for real cloud deployments. In contrast to S/4HANA – EmployeeCentral and other SuccessFactors applications will not be available to be installed on premise or in a private cloud. Not really a surprise as the code is probably not designed and engineered for that – but what kind of new ERP suite is S/4HANA without HCM. Of course SAP has already ‘side by side’ implementations of Business Suite and EmployeeCentral / SuccessFactors available, and is likely to make the same available for on premise and private cloud S/4HANA installations. But it means that you can have the new SAP HCM products only in the cloud. A gutsy move considering that there are still large customer groups that think / want to deploy HCM on premise (or private cloud). Of course SAP still has R/3 HCM available – but questions will arise in regards of how in tune that functionality is with the HCM best practices of 2015.
The SuccessFactors V12 Home Page
  • SAP is in the process of moving all payroll relevant information into EmployeeCentral, making the R/3 payroll engine more and more a ‘thin & dumb’ engine that can be called easily, and quasi elastic. SAP showed a demo of an employee taking vacation / time off and how it instantly changed the paycheck. Given the history of the SAP payroll engine, quite a feat. But a necessity as e.g. ADP and Ceridian have shown the same already last year. Additionally SAP has made progress in the UI it uses on top of the Payroll Administration – looks as good (or is it) Fiori [Update Feb. 19th - SAP confirms it is Fiori. Good.]. Maybe it can bring back some ‘fun’ to run payroll.

  • SAP is in process of finishing its work around the Learning module. Bringing your own content sharing and using ‘true’ analytics to serve relevant content will be a powerful upgrade to the former Plateau product. 

  • At the same time SAP plans (sorry details under NDA) to move other SuccessFactors Talent Management modules to the MDF platform. That is certainly welcome as the diversity of the different SuccessFactors architecture is a sizeable technical debt. Good to see SAP tackling this area (at last some customers say).

  • And finally SAP has some interesting plans in the Business Intelligence and Analytics space. SuccessFactors has always been good at Benchmarking, with almost all customers participating in the benchmarking process. With the integration of Lumira, SAP HCM users will receive an attractive BI tool with probably good enough capabilities to fight of potential Tableau installs for the average HCM user. Moreover, SAP is making good progress in the ‘real’ analytics area for some selected analytical questions (what I mean with ‘real’ analytics – read here). 
 

The SAP HCM Cloud Architecture - OData APIs 
 

2. APIs as the new integration paradigm – Dmitri Krakovsky walked us through a set of new qualities for future SuccessFactors products as well as capabilities of the existing architecture. And as Ettling pointed out earlier, SAP HCM has abandoned the mantra of the one schema / object model. The future are APIs and using OData as interface to have the existing and new applications communicate to each other [Update  SAP correctly reminds me that it is using ODATA already today.] Not a new approach, but new for SAP overall. Many questions remain, such as if the APIs will be open to outside of SAP built consumption, what is the integration platform (HCP?) for more complex integration and transformation processes and so on. From a strategic perspective the most important aspect was that Krakovsky said that being ready for more acquisitions was an additional benefit of the strategy. And while that was not a statement to any specific acquisitions, it is certainly is good to be ready for them – on an architecture level.
 
SAP Services Lifecyle
3. Services as differentiator!?  – SAP spend a good portion of the day talking about various service offerings and capabilities. The topic is near and dear to SAP HCM leader Ettling, so it is good to SAP investing in the area. When I asked what sets SAP apart in services, Ettling said it is the adoption teams that grow proportionally to subscription revenue and the newly revisited support offerings.
 

Tidbits


  • SAP JAM - As custom at SAP HCM events, we also got an update on the JAM product. JAM has passed 17.5M users and is growing well, it looks like the work package approach the team has taken, is creating value for SAP customers using JAM alongside SAP HCM products. 
SAP JAM momentum slide
    • Bye Bye Boomi – SAP SuccessFactors is moving away from the Boomi based integration and towards HANA cloud integration – a good step to reduce technical debt and 3rd party license payments. 
    • Bye Bye Oracle – And SuccessFactors is moving off Oracle and onto HANA. New customers will be brought to HANA first, but the overall migration will be completed in 2016. We will be watching. 


    MyPOV

    SAP is making good progress on its HCM portfolio. It is good to see, that the vendor is actively embarking on the journey to bring all its HCM products on the MDF Framework, which really is a platform. With that SAP has a dual positioning challenge with HANA Cloud Platform (HCP), but the vendor juggled the two well: MDF is for transactional (HCM) applications, HCP is an all-purpose PaaS product. But that all creates a lot of moving parts, and moving parts in software always bring the risk of quality issues. SAP has a senior enough team for not making that an issue, but it is certainly an area to watch, also given key competitors have less of a re-build / re-write load in the coming next years. But re-writes, re-platforming has to happen every 10 or so years in most cases, so 2015 just marks the date where SAP embarks into the effort. Lastly SAP needs to be more proactive and transparent on the roadmap and milestones related to that effort. A complete roadmap of what is going to happen certainly will be welcomed by prospects, customers and the overall ecosystem. That other events happen, like e.g. an S/4HANA launch, the acquisition of Concur is a possibility, if not a likely reality. And that such events could re-trigger a new roadmap is nothing shocking anymore in the cloud era. It could be even something customers welcome, as they want to take advantage of the new functionality. So a public roadmap of future products would be an important step. 

    ----------

     

    And more on overall SAP strategy and products:

     

    • First Take - SAP launches S/4HANA - The good, the challenge and the concern - read here
    • First Take - SAP's IoT strategy becomes clearer - read here
    • SAP appoints a CTO - some musings - read here
    • Event Report - SAP's SAPtd - (Finally) more talk on PaaS, good progress and aligning with IBM and Oracle - read here
    • News Analysis - SAP and IBM partner for cloud success - good news - read here
    • Market Move - SAP strikes again - this time it is Concur and the spend into spend management - read here
    • Event Report - SAP SuccessFactors picks up speed - but there remains work to be done - read here
    • First Take - SAP SuccessFactors SuccessConnect - Top 3 Takeaways Day 1 Keynote - read here.
    • Event Report - Sapphire - SAP finds its (unique) path to cloud - read here
    • What I would like SAP to address this Sapphire - read here
    • News Analysis - SAP becomes more about applications - again - read here
    • Market Move - SAP acquires Fieldglass - off to the contingent workforce - early move or reaction? Read here.
    • SAP's startup program keep rolling – read here.
    • Why SAP acquired KXEN? Getting serious about Analytics – read here.
    • SAP steamlines organization further – the Danes are leaving – read here.
    • Reading between the lines… SAP Q2 Earnings – cloudy with potential structural changes – read here.
    • SAP wants to be a technology company, really – read here
    • Why SAP acquired hybris software – read here.
    • SAP gets serious about the cloud – organizationally – read here.
    • Taking stock – what SAP answered and it didn’t answer this Sapphire [2013] – read here.
    • Act III & Final Day – A tale of two conference – Sapphire & SuiteWorld13 – read here.
    • The middle day – 2 keynotes and press releases – Sapphire & SuiteWorld – read here.
    • A tale of 2 keynotes and press releases – Sapphire & SuiteWorld – read here.
    • What I would like SAP to address this Sapphire – read here.
    • Why 3rd party maintenance is key to SAP’s and Oracle’s success – read here.
    • Why SAP acquired Camillion – read here.
    • Why SAP acquired SmartOps – read here.
    • Next in your mall – SAP and Oracle? Read here.

     


    And more about SAP technology:
    • HANA Cloud Platform - Revisited - Improvements ahead and turning into a real PaaS - read here
    • News Analysis - SAP commits to CloudFoundry and OpenSource - key steps - but what is the direction? - Read here.
    • News Analysis - SAP moves Ariba Spend Visibility to HANA - Interesting first step in a long journey - read here
    • Launch Report - When BW 7.4 meets HANA it is like 2 + 2 = 5 - but is 5 enough - read here
    • Event Report - BI 2014 and HANA 2014 takeaways - it is all about HANA and Lumira - but is that enough? Read here.
    • News Analysis – SAP slices and dices into more Cloud, and of course more HANA – read here.
    • SAP gets serious about open source and courts developers – about time – read here.
    • My top 3 takeaways from the SAP TechEd keynote – read here.
    • SAP discovers elasticity for HANA – kind of – read here.
    • Can HANA Cloud be elastic? Tough – read here.
    • SAP’s Cloud plans get more cloudy – read here.
    • HANA Enterprise Cloud helps SAP discover the cloud (benefits) – read here.
     
    Find more coverage on the Constellation Research website here.

     

    Future of Work Tech Optimization Next-Generation Customer Experience Revenue & Growth Effectiveness Data to Decisions Innovation & Product-led Growth New C-Suite Marketing Transformation Digital Safety, Privacy & Cybersecurity Oracle ADP SuccessFactors workday SAP AI Analytics Automation CX EX Employee Experience HCM Machine Learning ML SaaS PaaS Cloud Digital Transformation Enterprise Software Enterprise IT Leadership HR Chief People Officer Chief Information Officer Chief Customer Officer Chief Human Resources Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer

    The Rite To Be Forgotten

    The Rite To Be Forgotten

    This is a repost of my analysis of the Right to be Forgotten. Original post published September 30, 2014. 

    The European Court of Justice recently ruled on the so-called "Right to be Forgotten" granting members of the public limited rights to request that search engines like Google suppress links to Personal Information under some circumstances.  The decision has been roundly criticised by technologists, by American libertarians, and even by some privacy advocates.  Objections are raised on various grounds; the one I want to answer here is that search engines should not have to censor "facts" retrieved from the "public domain". 

     
    In an address on August 18, the European Union's Justice Commissioner Martine Reicherts made the following points about the Right to be Forgotten (RTBF):
    • "[The European Court of Justice] said that individuals have the right to ask companies operating search engines to remove links with personal information about them -- under certain conditions. This applies when information is inaccurate, for example, or inadequate, irrelevant, outdated or excessive for the purposes of data processing. The Court explicitly ruled that the right to be forgotten is not absolute, but that it will always need to be balanced against other fundamental rights, such as the freedom of expression and the freedom of the media -- which, by the way, are not absolute rights either".

    For The New Yorker, Toobin interviewed Kent Walker, Google's general counsel. Walker said Google likes to think of itself as a "card catalogue": "We don't create the information. We make it accessible. A decision like [the ECJ's], which makes us decide what goes inside the card catalogue, forces us into a role we don't want."

    But there's a great deal more to search than Walker lets on.

    Google certainly does create fresh Personal Information, and in stupendous quantities. Their search engine is the bedrock of a hundred billion dollar business, founded on a mission to "organize the world's information". Google search is an incredible machine, the result of one of the world's biggest ever and ongoing software R&D projects. Few of us now can imagine life without Internet search and instant access to limitless information that would otherwise be utterly invisible. Search really is magic - just as Arthur C. Clarke said any sufficiently advanced technology would be.

    On its face therefore, no search result is a passive reproduction of data from a "public domain". Google makes the public domain public.

    But while search is free, it is hyper profitable, for the whole point of it is to underpin a gigantic advertising business. The search engine might not create the raw facts and figures in response to our queries, but it covertly creates and collects symbiotic metadata, complicating the picture. Google monitors our search histories, interests, reactions and habits, as well as details of the devices we're using, when and where and even how we are using them, all in order to divine our deep predilections. These insights are then provided in various ways to Google's paying customers (advertisers) and are also fed back into the search engine, to continuously tune it. The things we see courtesy of Google are shaped not only by their page ranking metrics but also by the company's knowledge of our preferences (which it forms by watching us across the whole portfolio of search, Gmail, maps, YouTube, and the Google+ social network). When we search for something, Google tries to predict what we really want to know.

    In the modern vernacular, Google hacks the public domain.

    The collection and monetization of personal metadata is inextricably linked to the machinery of search. The information Google serves up to us is shaped and transformed to such an extent, in the service of Google's business objectives, that it should be regarded as synthetic and therefore the responsibility of the company. Their search algorithms are famously secret, putting them beyond peer review; nevertheless, there is a whole body of academic work now on the subtle and untoward influences that Google exerts as it filters and shapes the version reality it thinks we need to see.

    Some objections to the RTBF ruling see it as censorship, or meddling with the "truth". But what exactly is the state of the truth that Google purportedly serves up? Search results are influenced by many arbitrary factors of Google's choosing; we don't know what those factors are, but they are dictated  by Google's business interests.  So in principle, why is an individual's interests in having some influence over search results any less worthy than Google's? The "right to be forgotten" is an unfortunate misnomer: it is really more of a 'limited right to have search results filtered differently'. 

    When people frame RTBF as "rewriting history" they seem to regard Googe's search results as a formal public record. But they're not - they are they means to an end for an advertising business.  Search results represent Google's proprietary assessment of what matters.  And they are relative.  Search results are utterly different from one user to another, and from one month to the next.  Why should this customised stream of corporate consciousness not be subject to reasonable editing so as to balance the rights of people that it happens to include? 

    If Google's machinery reveals Personal Information that was hitherto impossible to find, then why shouldn't it at least participate in protecting the interests of the people affected? I don't deny that modern technology and hyper-connectivity creates new challenges for the law, and that traditional notions of privacy may be shifting. But it's not a step-change, and in the meantime, we need to tread carefully. There are as many unintended consequences and problems in the new technology as there are in the established laws. The powerful owners of benefactors of these technologies should accept some responsibility for the privacy impacts. With its talents and resources, Google could rise to the challenge of better managing privacy, instead of pleading that it's not their problem.

    Research

    The State of Privacy in 2015

    Download Report Snapshot

    Big Privacy Rises to the Challenges of Big Data

    Webcast

    Critical Big Data and Privacy Trends


    Digital Safety, Privacy & Cybersecurity Security Zero Trust Chief Customer Officer Chief Information Officer Chief Information Security Officer Chief Privacy Officer

    Supply chains strive to achieve precise demand shaping – doubled edged sword

    Supply chains strive to achieve precise demand shaping – doubled edged sword

    Over the past few weeks I have been meeting with a number of supply chain services companies who are talking about and focusing on developing solutions that will allow users to be laser focused with demand sensing and shaping. This was particularly evident during my meetings at NRF in New York. We also have the likes of eCommerce giant Amazon who have patented technology that claims to be able to put on the truck the product you have yet to order because they know that you will order it! All very interesting and exciting for supply chains – these supply chains strive to eliminate or at least control the lumpiness associated with their demand patterns.

    However this begets a question – is this necessarily good? For example. The situation I hear often is what takes place at Starbucks. A regular client walks into their local Starbucks, the barista notices them standing in line and knows their preferred order. The customer reaches the cash register and their usual venti, skinny, vanilla latte is already waiting for them. All they have to do is pay and pick up their piping hot coffee.  Sounds lovely.

    They know what  you want before you order it!

    They know what you want before you order it!

    And for the most part maybe that customer appreciates the convenience, and feeling of being so well known that you are the “mayor” of that Starbucks. But what if that customer does not want that skinny vanilla latte? What if the customer wants a hot chocolate one day? Do they dare deviate from their usual order or do they accept the usual order for the convenience?

    The same holds true for grocers such as Stop and Shop or Walmart, who let you order online and pick up in store – and will predict what your basket will look like. So all you need to do is drive to the grocery store and pick up your order. There is no need to think too much. Of course the positive is that there are tremendous time savings for the customer if they do not want to contemplate a new mix of groceries. But what if the consumer wants to try a new cheese or kitchen cleaner? If their order is already compiled for them will they get the opportunity to see what else is available? Or do we not want to give them the opportunity? How do we make sure they have the opportunity to browse?

    My point is not that supply chain users and vendors should not stop striving to get too smart and more effective when it comes to demand shaping and sensing. However there must be some balance when it comes to how precise and “effective” the supply chains need and want to be with regards to the customer. Yes, we want to eliminate lumpiness and extract those savings from the supply chain. But retailers and other players in the supply chains need to still keep a balance with being very precise with how they manipulate and predict demand with the opportunity for their customers to deviate from their usual demand. Retailers and other customer focused industries need to determine how precise they want to be with their demand shaping and how much freedom they want to give their customers to roam and wander through options.

     

    Matrix Commerce Tech Optimization Data to Decisions Innovation & Product-led Growth Next-Generation Customer Experience Marketing Transformation Revenue & Growth Effectiveness Future of Work New C-Suite amazon B2B B2C CX Customer Experience EX Employee Experience business Marketing eCommerce Supply Chain Growth Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP Leadership finance Social Customer Service Content Management Collaboration M&A Enterprise Service AI Analytics Automation Machine Learning Generative AI Chief Supply Chain Officer Chief Customer Officer Chief Data Officer Chief Digital Officer Chief Executive Officer Chief Financial Officer Chief Growth Officer Chief Information Officer Chief Marketing Officer Chief Product Officer Chief Revenue Officer Chief Technology Officer