Results

Have Your Own Device is the business changer

Have Your Own Device is the business changer

Have Your Own Device, HYOD, is the driver of Digital Business and the issues for DAVOS 2014.

(Bring Your Own Device, BYOD, is only important to internal IT operations!)

A very popular slide during 2013 has shown four technologies grouped together as the drivers of change and, invariably, in the presentation that follows Cloud will be positioned as the biggest factor, followed by mobility, big data and then collaboration tools. Indeed some three years ago I produced such a slide myself as part of the struggle to identify, and understand, the new wave of technologies. But why does Cloud always get the leading position? I believe its because the changes that it first produced where understandable in terms of the current IT function, and Client-Server technology, rather than it being the true disruptive game changing leader. That role belongs to Bring Your Own Device, BYOD, or at least to the impact of new user devices and consumerisation of technology.

Actually the term really ought to be Have Your Own Device, HYOD, apparently 50% of all Britons now have, or have access to, a Tablet device, and if you translate that into the use they make of them, then you have the true massive disruption force in computing.

So why did, and still does, Cloud get the top billing? Probably for the same reason that Networking initially got the attention in the late eighties before the real impact of the PC as a true technology disruption, and a driver in Business change, became clear. Networking existing Mainframes and Minis could be understood, and deployed, to improve the operational effectiveness of the existing technology. A quick win! As it is with Clouds and Servers, where Virtualisation is a quick and effective win, and external resource hosting increasingly offers further benefits. Clouds answer the basic question for the IT operations of ‘do more with less’ and as such it’s right to focus on this. But to do this at the expensive of investigating further to understand the real disruption that true Clouds are enabling is to fail to see the real Business issue.

Consider this, with the benefit of hindsight can you really place networking as more important than PCs? Of course not, it was the PC that changed the usability, availability, and capabilities of computing based technology with networking technology then quickly growing in importance and capabilities driven by a whole new set of PC roles and uses. It was then, and is now, a disruption driven by users and usability. If you think of Mobility as delivering current IT applications to Smart Phones and Tablets then that’s more ‘networking’, just as providing a web site as an alternative method to allow customers to order goods is not Digital Business.

The first iPad appeared four years ago to a world that didn’t know it wanted them because they could only visualize using them in the current uses supported by a PC. If you want to do computer centric data transaction work then a PC with a keyboard still remains best, but the iPad, Android tablet, even the Kindle, have all disruptively changed use towards people centric interactions around pictures, music, video, and a host of other new capabilities all driven by simple touch screens, with not a key board in sight. The simplicity of the Cloud enabled mass scalability of simple small Apps delivered by Browser based technology instead of heavy weight Client-Server monolithic applications is the enabler that is powering the huge and rapid growth. But it is the new generation of Devices and their wide spread ownership that is at the heart of the disruption.

Tablets, and the Smart Phones, pretty well only differentiating in details of size and connectivity options, offer a model that allows mass participation in every sense of the word. Taken together these devices are driving computing still further from its starting point, and towards ubiquitous ownership. It’s a change not just in computing, or even in business, but in society as a whole. Digital Business means wholly new sets of Government, Business and Social models. Not for nothing does the Davos 2014 executive summary of the event for World Leaders state;

Profound political, economic, social and, above all, technological forces are transforming our lives, communities and institutions. Rapidly crossing geographic, gender and generational boundaries, they are shifting power from traditional hierarchies to networked heterarchies.”

 

These are not the issues caused by the availability of Clouds, its caused by what people all over the world are choosing to do with the Devices of their choice! Having Your Own Device, HYOD, also means choosing what you what to do with it, without the constraints, and (necessary) restrictions, of the internal Enterprise IT model. And that in turn creates the huge and rapidly growing Digital Business model, together with a complex change in social behavior. That’s why BYOD might be an IT led decision in terms of what is supported in terms of existing PC based internal IT services, but for any business surviving, and prospering, means recognizing and enthusiastically grasp HYOD and Digital Business in all its disruptive dimensions.Text Box: HYOD and Digital Business is a people and behaviours shift

New C-Suite Marketing Transformation Tech Optimization SaaS PaaS IaaS Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Executive Officer

Must Innovation always happen outside of IT?

Must Innovation always happen outside of IT?

Must Innovation happen outside of IT?

Download Quark snapshot:  The Path to Digital Innovation Amidst Consumerization of Tech

Read the title again very carefully; it doesn’t say ‘the IT department’, it just says ‘IT’.  In todays pressures we need to be very careful to fully understand exactly what the ‘IT’ really means in terms of the business capabilities it delivers together with the experience and governance models developed for successful operation. And right upfront lets recall if we are old enough, or do a little on line research engines to establish that this term was deliberately introduced in the mid 1990s to define a wholly different era of technology and its business use from the computing services that preceded it.

IT, IT departments and the role of the CIO to manage both, defined the rapidly growing new and innovative business use of networked PCs, and the adoption of Client-Server architected Enterprise Applications. This was a time of great business model innovation as the new ‘Information Technology’ allowed genuine innovation in how a business was organized around efficient processes that ran across the entire enterprise. The Business Schools dubbed the resulting Transformation of Business models and organization Business Process Re-engineering, or BPR, and this in turn led to the revolution of Enterprise Resource Planning, or ERP, which today has become so dominant in our thinking and methods when faced with new business requirements.

My point is at this time ‘innovation’ meant going outside the existing business model based on completely separate and self contained specialized departments where terminal based mainframes and mini computers were used to run non integrated separate departmental applications. In short you use the word ‘Innovation’ you should be carefully identifying something that couldn’t exist within the current circumstances and therefore by definition is happening ‘outside’ the existing circumstances!

That’s as true today in respect of Innovative Business models based on a new generation of touch screen, personal devices, supported by Clouds to deliver Apps, as it was back then to define the then new technologies of PCs, Networks, with Enterprise Applications supported on Client-Server. In fact we can easily go on stage further and identify Information Technology as having revolutionized the manner in which an enterprise operates its ‘Back Office’ internal ‘processes’ and ‘transacts’ the business outcomes. A key part of this is to reduce the involvement of expensive and error prone people as the benefit will be shown principally as ‘cost reduction’.

Conversely the new technologies and innovation in business are all about how an enterprise does business externally through improving the ability of ‘people’ to ‘interact’ around ‘events’ with the aim of optimizing the ability to win business revenues. Again conversely this means people, their experience, and judgment, are at the center of what creates ‘value’ in the form of increased sales, better service, etc.

So its time to return to the title and ask does the experience, methods and even role definition of ‘IT’ developed over the last twenty years to operate PC based Client Server data centric integrated large enterprise applications protected by the Firewall, really fit with the new genuinely innovative use of Tablet/Smart Phone based Cloud architected people centric interactions through Apps used outside the Firewall?

I’ll assume that you recognize this point, and accept the reality of the title question and understand exactly what is meant by ‘Innovation outside of IT’! BUT does this mean without the CIO and the experience of members of the IT department? After all there needs to be a recognition of the realities of a ‘joined up’ enterprise functioning responsibly within the requirements of compliance and the auditors. No, but it does mean approaching how to align with new business objectives based on completely new technologies with a recognition of this, and a change in approach. Consider instead the following question:

Not what is the role of IT in the enterprise, but ‘what role should technology be playing in the enterprise?’ That’s the question I am keen to address starting in my recent report ‘The Pathway to Digital Business for IT Amidst the Consumerisation of Technology’.

Download Quark snapshot:  The Path to Digital Innovation Amidst Consumerization of Tech

New C-Suite Tech Optimization Data to Decisions Future of Work Innovation & Product-led Growth Chief Information Officer Chief Marketing Officer

Getting Social with Siebel #7: Is It Ready Yet?

Getting Social with Siebel #7: Is It Ready Yet?

Social with Siebel

By Richard Napier

Getting Social With Siebel - Buzzient LogoIn this final post in our little series about selecting a Social Engagement solution, we come to our last question. It is probably one of the most important, if not the most obvious.

Question 8 : Is the solution ready yet?

Of course, I hear you say. It is ready! I have seen the powerpoints and watched the (same) demo many times. But who is using it? Are there any companies out there you can talk to?

Does the solution actually feel like a solution or just a bunch of loosely connected disparate applications? If you are looking for real integration into embedded processes and business flows, you might want to ask that question…

Check out the list of Buzzient Features

Ready to get started learning about Buzzient for Social Engagement?  

This post originally appeared in the On Demand Education Ltd. Blog

New C-Suite Tech Optimization Future of Work Innovation & Product-led Growth Marketing Transformation Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity Chief Information Officer Chief Marketing Officer Chief Customer Officer Chief People Officer Chief Human Resources Officer

Company Culture Inside the Industry's Leading Future of Work Vendors

Company Culture Inside the Industry's Leading Future of Work Vendors

Future of Work panel at Connected Enterprise shares approaches to producing the industry's most intuitive and innovative HR products.

Future of Work Chief People Officer On <iframe width="560" height="315" src="//www.youtube.com/embed/6GCpciFZk4I" frameborder="0" allowfullscreen></iframe>
Media Name: sshcm.png

News Analysis: HootSuite Acquires uberVU For Analytics And Enterprise Growth

News Analysis: HootSuite Acquires uberVU For Analytics And Enterprise Growth

HootSuite Prepares For Enterprise Growth

On January 22nd, 2014, Hootsuite announced its acquisition of analytics provider uberVU for an undisclosed sum. The Bucharest, Romania and Cambridge, MA based software company brings 42 employees and over 200 customers to HootSuite. Key insights for customers and prospects include:

  • uberVu provides Hootsuite with enterprise class analytics. uberVU’s technology aggregates, analyzes, and distributes real time social data. The solutions supports data sources such as blogs, forums, and social networks. HootsSuite intends to keep uberVU as a separate offering and integrate the products over time.

    Point of View (POV): Most big data and analytics solutions in the social and cloud space are misnomers. In fact, these solutions often provide simple, retroactive reporting and dashboards. The addition of uberVU will allow HootSuite users to gain real-time analysis and future industry specific benchmarking capabilities. Moreover, Hootsuite has invested in an increasing set of enterprise features over the past three years (see Figure 1). This analytics acquisition marks a commitment to enterprise class features.
  • HootSuite gains key clients. uberVU brings big brands and enterprise logos to HootSuite. Marquee names span across a variety of industries including Ariad, Dassault Systems, DDB, Fujitsu, Getty Images, Giant Eagle, Indiegogo, JDRF, L’Occitane, Method, NBC, Phillips, SC Johnson, Method, NBC, Phillips, and Wolverine Worldwide.

    (POV): Using globalization and in-depth industry thought leadership, the uberVU team had grown the company via international enterprise expansion. Most customers praised uberVU for a fair pricing model based on streams, not mentions. HootSuite intends to keep this pricing.

Figure 1. HootSuite’s Product Roadmap Represents A Methodical March To Enterprise

Source: HootSuite

The Bottom Line: Customers Should Demand Better Analytics From Their Vendors

Most HootSuite customers have had positive comments about the core social media management offering. However, a key area of opportunity has been better analytics. This acquisition provides a short term solution for existing customers. However, the true benefit arises when HootSuite integrates uberVU into the overall user experience.

Your POV.

As a HootSuite customer are you excited about improved analytics? As a uberVU customer, do you have any concerns with the acquisition? Are you embarking on a digital business transformation? Let us know how it’s going! Add your comments to the blog or reach me via email: R (at) ConstellationR (dot) com or R (at) SoftwareInsider (dot) org.

Please let us know if you need help with your Customer Centricity and Digital Business transformation efforts. Here’s how we can assist:

  • Assessing customer centricity readiness
  • Developing your digital business strategy
  • Connecting with other pioneers
  • Sharing best practices
  • Vendor selection
  • Implementation partner selection
  • Providing contract negotiations and software licensing support
  • Demystifying software licensing

Related Research:

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions. However, happy to correct any errors upon email receipt.

Copyright © 2001 – 2014 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience!

 

Marketing Transformation Matrix Commerce New C-Suite Next-Generation Customer Experience Data to Decisions Future of Work Innovation & Product-led Growth Tech Optimization Revenue & Growth Effectiveness SoftwareInsider B2C CX Marketing B2B Customer Experience EX Employee Experience AI ML Generative AI Analytics Automation Cloud Digital Transformation Disruptive Technology Growth eCommerce Enterprise Software Next Gen Apps Social Customer Service Content Management Collaboration Machine Learning LLMs Agentic AI Robotics HR HCM business Metaverse developer SaaS PaaS IaaS Supply Chain Quantum Computing Enterprise IT Enterprise Acceleration IoT Blockchain CRM ERP Leadership finance Healthcare VR CCaaS UCaaS M&A Enterprise Service Chief Customer Officer Chief Financial Officer Chief Marketing Officer Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief People Officer Chief Revenue Officer Chief Executive Officer Chief Digital Officer Chief Analytics Officer Chief Operating Officer Chief Human Resources Officer Chief Experience Officer

Will the First Generation of Robot Laborers Be Ridiculed By Those Opposing Outsourcing?

Will the First Generation of Robot Laborers Be Ridiculed By Those Opposing Outsourcing?

1

2014-01-20-robolaborer.jpg
The word "robosourcing" is making its way into the technology media, and starting to skirt the fringes of the mainstream media via the help of Hollywood and other platforms like TED.

Just recently, a TED talk by Guy Hoffman on robots with "souls" tipped the scale (in my opinion) in conjunction with movies dating back to Star Wars and as recent as HER and Transcendence.

Somewhere between the noise and the hype is the tangible reality that if we continue to innovate in the direction and the pace of today, robotics, connectedness, artificial intelligence and automation will converge on a single truth.

The single truth is that robots will enter to workforce.

Before we wrestle with the 1st generation of robot laborers, let us realize that many of us use robots today. One can argue that my washing machine is a robot, my vacuum is a robot, the drone announced by Amazon is a robot, and for the most part in factories all across the world are generations of robots working on behalf of mankind; however, they are not seen as laborers, the are seen more as automation machines.

Henry Ford replaced horses with robots, we call them engines, and they still have horsepower.

I would like to explore the precept of a robot laborer, what will "it" (I don't think first generation robo-laborers will be gender aware) be capable of doing, how will it be paid, who will own it and who will repair it (robo-doctors)? All tough questions, but they trigger two discussions in my head. They trigger:

1. The outsourcing debacle we have delved into for two decades, and

2. The construct of Humans as a Service (HuaaS) as we think about a liquid cloud of human capacity.

Without digging too deep into the techno babble, this article on CIO.com simplifies the first part for us. We may be robo-phobic.

Outsourcing, or as we coined it on twitter, robosourcing.

First generation robot laborers will not replace knowledge workers, they will more than likely replace manual workers. While we all marvel in the capability of IBM's Watson to win chess and Jeopardy tournaments, first generation robo-workers will not be a workforce of Watsons, they will be more like a workforce of strong machines that can do laborious tasks that are easily repeatable and well defined.

The video below brilliantly describe the first generation robo-laborer world where robots can react to natural disasters, help in radioactive spills, etc. The world could be exciting ..




But not so fast, take for example mowing the lawn, or fetching boxes when moving, cleaning the floors (with mops and water) or feeding the homeless. Based on the state and direction of the science, innovation and technology, we will be using robots to outsource laborers in every day, not just in natural disasters. Here I see a backlash against said robo-laborers similar to those calling out against jobs being moved to India and China, and against recent immigrants taking work away from willing Americans.

Thankfully, the robots may not have feelings, or souls as yet, but they will be ridiculed. Their makers will be for sure.

Human as a Service, can we get to a liquid and contestable cloud of human capacity.

In the example above, it can be assumed that companies will own fleets of robots. Pontificate with me the notion that I may one day own a robot, more than likely a cheap, first generation robo-laborer, or if I'm affluent, a more expensive second generation unit all by myself. In a world where humans are becoming fungible, work is being broken into smaller repeatable tasks, supply and demand for work is completely flexible, and organizations can spin up and tear down teams of human capacity based on changing project demands and task requirements (think the future of taskrabbit.com, odesk.com, elance.com, etc.) Will my robot step in for me on days when I only have simple tasks to do? Man, think about the future state of working form home.

Will my robot be more of a clone of me, will I be able to program it to learn my skills/tasks (you bet I will) and will my personal robot simply be a swap in or out for me on the days where not too much thinking is needed, and only simple tasks need to be done, like create documents, make calls, write, read and summaries etc.?

I see this as a reality within reach during my lifetime, but I wonder about the social backlash. What will folks think of me and my one-on-one, outsourcing robo-laborer buddy? We have seen the negative perception of things like YourManInIndia.com and stories of professionals hiring others to do their jobs on their behalf for less then their salary. How will this be received?


 

  1. Will our ingrained negative perception of outsourcing create ridicule for first generation robo-laborers enabling robosourcing?
  2. Will we be snarky with those the use robots as personal staff augmentation, and is this good or bad?
  3. Will we see regulation on what jobs and categories of work robo-laborers will be allowed to do, the robo-sourcing act?


I can tell you this much, my friends, I thought I was incredible lazy (and crazy) when I got my first robo-vacuum in 2003. Today over 50 percent of us own one, or tried one and broken it.

Poor bots.

 

Future of Work Data to Decisions Innovation & Product-led Growth New C-Suite Tech Optimization Chief People Officer

News Analysis: VMware Signals Commitment To Mobility With $1.54B Intent To Acquire Airwatch

News Analysis: VMware Signals Commitment To Mobility With $1.54B Intent To Acquire Airwatch

Mobile Management Consolidation Continues And VMware Accelerates Mobile Efforts

On January 22nd, 2014, VMware (NYSE: VMW) announced the intent to acquire Atlanta, GA based Airwatch for $1.54B.  More than just an acquisition of a leading enterprise mobile management (EMM) vendor, the acquisition represents a cornerstone for VMware's mobile strategy for end user computing.  Should the deal close, co-founder Alan Dabbiere will report to VMware CEO Pat Gelsinger.  AirWatch will continue to be led by CEO John Marshall and included in VMware's end-user computing group, led by General Manager, Sanjay Poonen.  Upon completion of the acquisition, the market impact is significant because:

  • AirWatch users breath a sigh of relief amidst rapid market consolidation and uncertainty. AirWatch is a leading enterprise mobile management (EMM) vendor with over 10,000 customers and 1600 employees. The company has received $200M+ in Series A funding, delivered a global presence with 10 global offices and 16 languages, and achieved over a 90% customer retention rate.  AirWatch brings a rich ecosystem of device manufacturers, feature set partners, resellers, mobile operators, and managed services providers.  Despite these successes, the EMM space faces rapid consolidation and AirWatch is a constant candidate for acquisition.

    Point of View (POV): Citrix’s acquisition of Zenprise foreshadowed the EMM market consolidation and the acquisition of MaaS360 (Fiberlink) by IBM in November 2013 created some concern for existing customers and prospects about AirWatch's long term fate.  In addition, a price war in 2013 stalled a planned IPO process for AirWatch.  Many customers and prospects feared that AirWatch would remain the last EMM vendor standing.  Given the proposed management structure and VMware's history of mergers and acquisition, AirWatch users should feel confident that the technology and team are in good hands and that VMware intends to invest and grow the business.
  • VMware gains a mobility foundation and moves from feature set to end point management. AirWatch's EMM offerings cover a broad set of device and enterprise features.  Device features include MDM, MAM, MCM, MEM, SSO, OS Container, Enterprise Workspaces, App Wrapping/SDK, API Framework, and Device usage.  Enterprise features include API, PKI, DLP, NAC, Directory Services, Content Repositories, Event Management, SIEM, Business Workflow and Systems Management.  Other key areas include Platform Integration, Process Automation, Workflow Templates, and a Privacy Framework.

    (POV): VMware signals a commitment to mobility and goes head to head with Citrix.  The move raises VMware's total addressable market.  After some attempted efforts in mobility at VMware, an acquisition was required to accelerate entry in the market.  MobileIron, a key partner, was most likely a consideration.  However, the price tag could have been 4 to 5X the cost of AirWatch for similar capabilities.  In fact, AirWatch provides not only the technology and feature set, but also the human capital and know-how to take VMware's business into the mobile world.  In the long run, the acquisition of AirWatch's mobile offering will provide a key piece of end point management that moves beyond the bring your own device trend and into the wearable computing age, sensor analytic ecosystems, and the internet of things (IOT).

Recommendations.

As the acquisition has not closed yet, AirWatch prospects and users should reach out to their sales reps and:

  1. Lock in existing discounts and agreements prior to the VMware acquisition.
  2. Seek product road map clarifications and commitments where possible.
  3. Explore the VMware roadmap to anticipate future synergies

The Bottom Line: Mobile Management Is The Gateway Technology To Internet Of Things and Machine To Machine For The Future Of VMware

While acquisitions today address critical consumerization of technology (CoIT) and bring your own device (BYOD) needs, the core concepts behind enterprise mobile management have many key components required to build sensor analytic ecosystems.  How you manage a mobile device from security, identity, content, and monitoring has many features required for end point management. Acquisition by larger players bodes well for bringing key innovations to not only end user computing, but also a growing world of machine to machine interactions.  Coupled with a deep analytics capability, buyers can expect new business models to be created in this chapter of digital business disruption in the decade to come.

Your POV.

Are you looking at a mobile strategy? Do you see the link between mobility and digital business?  Do you see VMware succeeding in this shift to mobility? Add your comments to the blog or reach me via email: R (at) ConstellationR (dot) com or R (at) SoftwareInsider (dot) com.

Please let us know if you need help with your mobility and Digital Business transformation efforts.  Here’s how we can assist:

  • Assessing mobile readiness
  • Developing your digital business strategy
  • Vendor selection
  • Implementation partner selection
  • Connecting with other pioneers
  • Sharing best practices
  • Designing a next gen apps strategy
  • Providing contract negotiations and software licensing support
  • Demystifying software licensing

Related Resources

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions.  However, happy to correct any errors upon email receipt.

Copyright © 2001 – 2014 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience!

Data to Decisions Future of Work Innovation & Product-led Growth New C-Suite Tech Optimization Revenue & Growth Effectiveness vmware SoftwareInsider AI ML Machine Learning LLMs Agentic AI Generative AI Analytics Automation B2B B2C CX EX Employee Experience HR HCM business Marketing SaaS PaaS IaaS Supply Chain Growth Cloud Digital Transformation Disruptive Technology eCommerce Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP Leadership finance Customer Service Content Management Collaboration M&A Enterprise Service Robotics Quantum Computing CCaaS UCaaS developer Metaverse VR Healthcare Social Chief Executive Officer Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Operating Officer Chief Financial Officer Chief Marketing Officer Chief Revenue Officer Chief Experience Officer

Consolidation - Why VMware Bought AirWatch

Consolidation - Why VMware Bought AirWatch

1

Well, no one was expecting this. Everyone knew and had conjectured that VMware was going to be buying someone in the MDM (Mobile Device Management) space, but to be fair AirWatch was never on the radar. Some of that was due to the fact that CEO John Marshall had declared that he wasn’t interested in selling and other was due to speculation on MobileIron and Good being better fits to what VMware traditionally did.

The funny thing, despite all that VMware has proclaimed for the last three years, they really haven’t been doing mobile. They spent far too long developing a virtualization product for Android that carriers weren’t willing to push and OEMs didn’t talk about. They came up with a strategy for iOS devices that could work but very few were interested in and yet they continued forward with pieces that would fit very well within an encompassing mobile strategy such as parts of their Horizon suite.

The big thing with VMware is that they knew that they had to get a hand around mobile and we had heard about past overtures in this space. Their EUC (End User Computing) division had struggled with building a mobile solution themselves and this had led to a complete shakeup of the whole division bringing Sanjay Poonen in from SAP. Sanjay has a track record of knowing where to focus and it has been evident over the last few months that he understood the weaknesses of his EUC division.

So why buy AirWatch? Airwatch has a long history, starting as Wandering WiFi and then pivoting into the MDM space after the iPhone came out and smartphones became mainstream. John Marshall, their CEO, has been laser focused in building the “biggest and best” MDM company around and yet wasn’t afraid to be challenged and react to those challenges. What had started out as an MDM only company quickly morphed into and EMM (Enterprise Mobility Management) play where AirWatch took on the challenges of content and app management.

I sat with John Marshall a little over 3 years ago and asked him “MDM is dead, where are you going next?” His answer to my question was most telling. “Brian, I don’t quite agree with you that MDM is dead. It still has a lot of life in it, but, we are in this for the long haul and understand it’s more than just about devices.” John and I have had many debates like this over the years and it’s been fun watching them grow from a company of less than 500 people to one of more than 1600. Their goal has always been to be the “go to” company when it comes to mobile and they have embraced the whole EMM stack (well most of it, MIM isn’t there for anyone yet).

Sanjay, realizing what he had in VMware, has essentially thrown out the baby with the bath water and put a stake in the ground for VMware. AirWatch will be VMware’s mobile play and will eventually integrate other pieces of VMware’s EUC division as they fit into an overall mobile strategy. Airwatch gets more pieces to make its engine go faster, a great worldwide work force to augment what they have been building and some real talent to help with development for the pieces that they will integrate. VMware now owns the entire stack from (virtual) server straight through to desktop and mobile, essentially from the datacenter to the endpoint. This is huge for them and allows them to continue to on the enterprise money train. It also gives both of them the ability to leverage the other, VMware now has a cogent mobile story to walk into its many clients and AirWatch gets even more access to people who can make decisions and are already partnered with VMware.

It’s hard to see this as anything other than a win-win situation for both players, while other EMM players will have to work even harder to match the scope and velocity of the new VMware/AirWatch. Expect to see the remaining players become even more of an acquisition target as we move further into 2014.

New C-Suite Tech Optimization Innovation & Product-led Growth vmware Chief Information Officer

An Alien Tweet (Almost)

An Alien Tweet (Almost)

1
There is something that tickles me about this tweet from the (now) out of hibernation Rosetta space probe.

After three years of hibernation, the probe which is on a mission to intercept a comet (yes, in real life, not fantasy), was awoken and signalled its readiness with the classic Hello World message. If only all our efforts and communications were as simple and successful as this.

Marketing Transformation Future of Work Innovation & Product-led Growth New C-Suite Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity X Chief Marketing Officer Chief Customer Officer Chief People Officer Chief Human Resources Officer

Security Isn't Secure

Security Isn't Secure

That is, information security is not intellectually secure. Almost every precept of orthodox information security is ready for a shake-up. Infosec practices are built on crumbling foundations.

UPDATE: I've been selected to speak on this topic at the 2014 AusCERT Conference - the biggest information security event in Australasia.

The recent tragic experience of data breaches -- at Target, Snapchat, Adobe Systems and RSA to name a very few -- shows that orthodox information security is simply not up to the task of securing serious digital assets. We have to face facts: no amount of today's conventional security is ever going to protect assets worth billions of dollars.

Our approach to infosec is based on old management process standards (which can be traced back to ISO 9000) and a ponderous technology neutrality that overly emphasises people and processes. The things we call "Information Security Management Systems" are actually not systems that any engineer would recognise but instead are flabby sets of documents and audit procedures.

"Continuous security improvement" in reality is continuous document engorgement.

Most ISMSs sit passively on shelves and share drives doing nothing for 12 months, until the next audit, when the papers become the centre of attention (not the actual security). Audit has become a sick joke. ISO 27000 and PCI assessors have the nerve to tell us their work only provides a snapshot, and if a breach occurs between visits, it's not their fault. In their words they admit therefore that audits do not predict performance between audits. While nobody is looking, our credit card numbers are about as secure as Schrodinger's Cat!

The deep problem is that computer systems have become so very complex and so very fragile that they are not manageable by traditional means. Our standard security tools, including Threat & Risk Assessment and hierarchical layered network design, are rooted in conventional engineering. Failure Modes & Criticality Analysis works well in linear systems, where small perturbations have small effects, but IT is utterly unlike this. The smallest most trivial omission in software or in a server configuration can have dire and unlimited consequences. Look at the terrible "goto fail" bug in Apple's iOS7, resulting from a single silly line of code. It's like we're playing Jenga.

Security needs to be re-thought from the bottom up. We need bigger ideas.

We need less rigid, less formulaic security management structures, that allow encourage people at the coal face to exercise their judgement and skill. We need straight talking CISOs with deep technical experience in how computers really work, and not 'suits' more focused on the C-suite than the dev teams. And we need to equate security with software quality and reliability, and demand that adequate time and resources be allowed for the detailed work to be done right.

If we can't protect credit card numbers today, we urgently need do things differently, standing as we are on the brink of the Internet of Things.

Resources

Why Cloud Geography Matters in a Post Snowden/NSA Era

The FIDO Alliance

New C-Suite Future of Work Tech Optimization Digital Safety, Privacy & Cybersecurity Security Zero Trust Chief Customer Officer Chief Executive Officer Chief People Officer Chief Information Officer Chief Information Security Officer Chief Privacy Officer