Results

Enterprise Software Takeaways from Meeker's 2013 Internet Report

One of the presentations I look most forward to on a yearly level are KPCB's Mary Meeker's 'State of the Internet' presentations. These days she releases them as the 1st speaker of the AllThingsD conference - and thankfully they are available on slideshare immediately afterwards. Somehow Mary manages to always have some interesting trends up the sleeve, that at least I have not seen at all seen or not seen with that relevance... so why not check out what this year's presentation held for the enterprise?


 

The Internet is the platform

Remember the times when professionals were even saying, that in the emerging countries to a certain point and in the third world for sure - there would be internet access problems? Well Google will take care of some of that now - but already today the internet coverage and usage is such that a global enterprise app needs to be not only browser based, but make sure that it understands the nuances of internet access in key markets. And there lies the challenge - though the hope lies on the shoulders of HTML5 - different bandwidth considerations have to be taken care of. 

 



BigData getting bigger

A lot has been written on the data explosion, but it's clear that any enterprise vendor needs to have a bigdata strategy. Too much relevant information is available now that it can be ignored in enterprise processes. And while the externally facing processes have been in the driver seat in the past, bigdata is relevant for internal processes, too. Think of the explosion of picture, voice and video data - this will not stop at the enterprise gates, enterprise apps will enable relevant usage of media for business processes and the resulting data needs to be stored, accessed and analyzed later.

 

 

The sharing economy

One of the emerging trends is the sharing economy - and it manifests itself in consumer apps like snapchat.com - but when consumers start to share resources, it will not be or long until this trend will be a differentiator for the back-end processes of enterprises. At the end of the day it's the apps at these enterprises that enable the economy, so if sharing starts as a business trend, it will raise all kind of issues towards a more rigid, purchase-only minded business automation app. 





 

Mobile First is not a choice but a Must

No surprise that mobile internet access is booming, but interesting to see inflection points of mobile internet usage ecclipsing all other usage in countries like China and South Korea. And with tablet shipments surpassing desktop and notebook PC shipments, it's key to design for flexible form factors. 






The unfortunate state of enterprise applications at this point is, that there has not been an enterprise application architected and designed from the ground up for all processes to be mobile first. There will be first-mover gains in this area - if a vendor gets this right.

The xx-able revolution

With miniaturization of devices progressing, it's clear that smart devices will permeate form and become wearable, driveable, flyable, scanable etc. It's early days, and enterprises are still figuring out how to eg track high value equipment via RFID, but the whole social and collaborative aspect of business work will change with wearable devices. Why even go to a video conference room, or skype, if your communicator device can be with you all the time. Why spend time on expensive printing, if a simple QR code can suffice? And QR codes solve a problem that isn't solved on most wearable and smart devices, information retrival. The QR code avoids that, brings the user to the wanted information - and avoids distractions as served by a search engine or other means of information retrival. 







Look at China

There have been a lot of concerns around a market that is tough to enter, copy cat competitors, IP issues etc have been raised in the past - but Meeker's presentation makes clear that China is a modern market, and innovation really happens there. If China wouldn't be such a huge market - we would see much more of the innovation in the US. 
Just think of the Chinese innovations presented coming from a small market like e.g. Belgium - they all would be exported and available in the US already. But given some degree of North American xenophobia vs China and the attractiveness of the home market for Chinese startups - we haven't seen much of them yet here. For instance I knew Alibaba, but that Alibaba merchandise shipments have passed the combined Amazon and eBay volumen - was a surprise. Same day delivery, taxi apps, the social site Weibo - are all key trends that any enterprise vendor has to look into. And China will soon pass Europe in its share of the world's GDP - an impressive chart:






Enterprise Freemium Model?

We have seen a lot of Freemium apps in the B2C space - but not in the enterprise apps space. Somehow the thinking is - as you pay for the license - you don't get any advertisement / promotion coming your way. But seeing Meeker's slides on the market - why not offer a mild form of advertisement in a enterprise app? Especially for the occasional user of self services apps - the advertisement may not even be noticed - but may lead to a free usage of the enterprise app. It will take some B2C entrepreneurs to experiment here - but I think there is an opportunity here.







Other notables

High tech stands on immigrants shoulders, 60% of the Top 25 tech companies were founded by 1st and 2nd generation Americans - and immigration is needed to close the talent gap - as e.g. IBM, Intel, Microsoft, Oracle and Qualcomm have over 10000 openings in the US. With a lot of innovation still coming form the US, e.g. Meeker pointed out that 80+% of in top internet properties come from the US, but 80+% of traffic comes from outside the US - it remains key for enterprise software vendors to recruit talent from across the world. It's cheaper having two Brazilians working for you in e.g. Sunnyvale and getting the Brazilian verison done right, than opening an operation in Brazil. 




Gold in the Appendix

Some more interesting findings from an enterprise perspective were in the appendix. E.g. the IBM survey see technology factors rising to the #2 concerns for CEOs, they were #3 in 2008 and 2006, and #4 in 2004. This is a huge opprtunity for enterprise vendors to address and leverage for their future offerings - but they need to keep the reduction of risk and the focus on a positive business impact in mind. 



Re-Imagination is live and well according to Meeker, but note that most examples come from the B2C area - with the exception of MakerBits 3D printing and eLance and oDesk flexible employment (did you know WaaS is Workforce as a Service?). The question is - where is re-imagination of enterprise apps? 

 




What I missed

I can only immagine what compromise Meeker's must have undergone to take her 90 slide presentation into 60 minutes presentation - but here are a few trends I would have liked to see make the deck:

 

  • Analytics
    We are seeing more software that predicts what we want to do and see than ever before. If you haven't played e.g. with Google Now - fairly simple analytics apps - take a look.
     
  • Social meets Business
    It may not have been the scope of Meeker's presentation, but the whole CxO discussion and how enterprises have to figure out their social presence and actions was missing.
     
  • Cloud
    And while you can say it's remarkable that it wasn't mentioned and cloud is a given - Meeker only touched the edges, e.g. it's easier and cheaper today to get 1 Million users on your product than eve. But the changes and implications the cloud's elasticity brings to markets would have been something I expected. 

MyPOV

As an enterprise vendor today you need to build for the larger, more global internet, going mobile (and tablet) first, source your talent globally, have a big data architecture and think through your China strategy. Make sure your user interfaces are highly transportable and independent of form factors, as we do not know where the xx-able revolution will lead us for the consumption of enterprise services. 

And look at the consumer space, where newer trends like project based work, sharing resources etc will soon have an impact on the future enterprise apps. 

Tech Optimization Data to Decisions Future of Work Innovation & Product-led Growth New C-Suite ML Machine Learning LLMs Agentic AI Generative AI Robotics AI Analytics Automation B2B B2C CX EX Employee Experience HR HCM business Marketing Metaverse developer SaaS PaaS IaaS Supply Chain Quantum Computing Growth Cloud Digital Transformation Disruptive Technology eCommerce Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP Leadership finance Social Healthcare VR CCaaS UCaaS Customer Service Content Management Collaboration M&A Enterprise Service Chief Customer Officer Chief Executive Officer Chief Financial Officer Chief Information Officer Chief Marketing Officer Chief People Officer Chief Procurement Officer Chief Supply Chain Officer Chief Technology Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Operating Officer Chief Revenue Officer Chief Information Security Officer

Lead Your Life the Right Way, the Dreams Will Come to You

1

One of the amazing things about the web is that we are constantly in a state of renewal. We read, consume, engage and move on. Great ideas, applications, innovations – and even people – come into our sphere of attention and leave. Sometimes without a trace. Or sometimes with only a line or two in our memory. A feeling. A sense of pride or loss.

I remember watching Carnegie Mellon University professor, Randy Pausch deliver his “last lecture” and being gobsmacked. I felt like this piece of content – this lecture from 2007 – would become “internet history”. I felt that it would somehow be automatically consumed by people as they engaged more deeply with the web, its abundant content and the bone achingly powerful stories that many share.

But I recently mentioned Randy Pausch’s last lecture and was met with a stony silence. I explained a little – to provide some context – about the world leading computer science professor famous for his work in human computer interaction. Still nothing.

In a world with an abundance of information, we continue to struggle to prioritise what comes into our sphere of attention. And in the rush to sort, file and proceed, we often – mistakenly in my view – prioritise the new in favour of the great. So today, I’d like to momentarily reverse that and suggest you spend an hour – yes a full hour – with Randy Pausch. It may just change your life.


_MG_3020

wil p via Compfight

 

Marketing Transformation Sales Marketing Innovation & Product-led Growth Next-Generation Customer Experience Tech Optimization Future of Work Marketing B2B B2C CX Customer Experience EX Employee Experience AI ML Generative AI Analytics Automation Cloud Digital Transformation Disruptive Technology Growth eCommerce Enterprise Software Next Gen Apps Social Customer Service Content Management Collaboration Machine Learning business SaaS PaaS CRM ERP Leadership LLMs Agentic AI HR HCM Metaverse developer IaaS Supply Chain Quantum Computing Enterprise IT Enterprise Acceleration IoT Blockchain finance Healthcare VR CCaaS UCaaS M&A Enterprise Service Robotics Chief Executive Officer Chief Marketing Officer Chief Information Officer Chief Technology Officer Chief Digital Officer Chief Data Officer Chief Analytics Officer Chief Information Security Officer Chief Operating Officer

Tuesday’s Tip: Putting the Kibosh On ERP Vendor Sales Reps Who Troll For Indirect Access

Constellation Sees An Alarming Increase In Inquiries

Constellation has received an alarming increase in inquiries about an unethical vendor sales practice coined as “trolling for indirect access”. Indirect access is when a vendor claims that a client is accessing their perpetually licensed software in an unintentional manner or inappropriately licensed manner.

One vendor uses a definition of, “any individual or machine that accesses the computing capabilities of the software must be a licensed user”.

Another vendor sees it as “any time a system is accessed by a non-vendor system, a license is required to access that data”

In fact, a rash of inquiries over the past two quarters has raised the alarm bells among software customers.

Unethical Sales Leaders Endorse This Practice To Make Their Numbers

While this practice is nothing new, the pickup by vendors raises serious issues as to why this practice remains in their sales play books. Constellation identifies five reasons why vendors continue this practice:

  1. Open up dormant accounts. After pleasant introductions, new sales reps will use this technique to further deals.  Former sales reps agree this is a shake down for cash technique.
  2. Drive sales through fear of audits. Audits are used to start the discussion.  Unsuspecting customers who no longer have context about the original contract may fear breach of contract.
  3. Scare customers into making additional purchases. Threats are used to set expectations.  The vendorsoften waives the issue if the customer buys additional licenses as a “compromise”
  4. Force compliance into new licensing policies. Vendors use this as a way to drive conformity to new license models.  The move from concurrent usage to named users was one example.
  5. Meet territory sales goals. Unscrupulous sales managers suggest this technique to meet their numbers.  Sales reps are told they are defending the vendors license rights.

It All Starts With An Innocent Sales Call From A New Sales Rep

The approach often begins when a new and often greener sales rep is assigned to a dormant account or accounts that have stopped paying maintenance. The sales rep appears to be quite friendly and initiates the call with lots of “getting to know you” questions.

What’s really going on, the sales rep is probing on usage and a customer’s install base. After a few weeks the sales rep calls to share news on the latest products. In the next call the sales rep gauges a former client’s interest in buying new products. If the customer shows interest, the sales rep continues through the sales process and remains quite friendly. If the customer shows no interest or the deal comes to halt, the conversation quickly moves to a stern tone and the issue of audits and indirect access is introduced.

Let’s Get Real About What’s Not Indirect Access

While the vendors typically have a tough time proving indirect access, they will fight hard with legal threats and wasted cycles.  However, most buyers and users see the following acceptable usage of data with their existing investment at the time they purchased the product.

  • Processing batch data
  • Aggregating information into a data warehouse or another source system
  • Accessing data for use in another system through data integration
  • Entering data from a third party system

The danger is that some vendors have rewritten or updated their software license terms in a very vague way to null the above use cases.  Even worse, many unsuspecting customers have signed addendums.

Recommendations: Stop the Madness On Software Vendor Audits And The Lame Excuses About Indirect Access

Constellation has successfully helped many clients navigate this tricky process with vendors.  Usually the issue is a break down in communications.  Here are three secrets to success:

  1. Assert the industry definition of indirect access. Hold to your guns on indirect access.  Keep in mind, you own perpetual software and just because the software vendor’s lawyers say so, it doesn’t meant it’s correct.
  2. Counter the indirect access issue. Conduct your own audits on usage and take precautions to make sure access meets industry acceptable definitions.  Escalate to top management. Avoid the sales management chain and go to the CEO office or the CMO office.
  3. Shame the vendor into submission. Vendors are gun shy when you take the case public.  Prepare to expose the issue to press, media, user groups, and industry analysts.  The threats work but you better be prepared to go all the way.

A third party approach provides the most effective course of action.  Start with a legal counsel, an industry analyst, or other trusted advisor that can assist without breaking any non-disclosure and confidentiality requirements.  One other suggestion is for the user groups to take on this issue and prevent the vendor from extracting any more damage the vendor client relationship.

Your POV.

Let us know your experiences with SAP or Oracle contract negotiations   Add your comments to the blog or reach me via email: R (at) ConstellationRG (dot) com or R (at) SoftwareInsider (dot) com.

Let Us Help You.

Need help with your software contract or working out the rationale for used software or third party maintenance?  Put the power of experience with over 1500 software contract negotiations to work.  Contact us throughout the vendor selection or negotiation process.  We can help with a quick contract review or even the complete vendor selection.  We provide fix-fee and gain sharing arrangements.

Related Constellation Research

Wang, R. “Best Practices – Three Simple Software Maintenance Strategies That Can Save You Millions” Constellation Research, Inc. March 7, 2012

Wang, R. “Best Practices: Why Every CIO Should Consider Third-Party Maintenance.” Constellation Research, Inc. August 7, 2012.

Wang, R. “Market Overview: The Market For SAP Optimization Options.” Constellation Research, Inc. May 11, 2011.

Wang, R. “Best Practices: The Case for Two-Tier ERP Deployments.” Constellation Research, Inc. February 28, 2011.

Related Resources And Links

20090612, Channel Partner, “Used software – SAP suffers defeat”

20090612 Channel Partner, “UsedSoft obtains a provisional order against Microsoft”

20080602 Federal Judge Approves eBay Auction of Copyrighted Autodesk AutoCAD Design Software”

20120318 Research Summary: Best Practices – Three Simple Software Maintenance Strategies That Can Save You Millions

20100419 Tuesday’s Tip: Dealing With Pesky Software Licensing Audits

20090714 Research Summary: An Enterprise Software Licensee’s Bill of Rights, V2

20101214 Tuesday’s Tip: Dealing With Vendor Offers To Cancel Shelfware And Replace With New Licenses

20100308 Monday’s Musings: Decoupling Support From Maintenance – What Apps Vendors Can Learn From Microsoft Dynamics

20100222 Monday’s Musings: Why Users Should Preserve Their Third Party Maintenance Rights

20100104 News Analysis: SAP Revives Two-Tier Maintenance Options

20090210 Tuesday’s Tip: Software Licensing and Pricing – Do Not Give Away Your Third Party Maintenance And Access Rights

20090709 Tuesday’s Tip: Do Not Bundle Your Support and Maintenance Contracts!

20091222 Tuesday’s Tip: 10 Cloud And SaaS Apps Strategies For 2010

20091208 Tuesday’s Tip: 2010 Apps Strategies Should Start With Business Value

20091102 Best Practices: Lessons Learned In What SMB’s Want From Their ERP Provider

20091006 Tuesday’s Tip: Why Free Software Ain’t Really Free

20090504 News Analysis: Oracle Waives Fees On Extended Support Offerings

20080909 Trends: What Customers Want From Maintenance And Support

20080215 Software Licensing and Pricing: Stop the Anti-Competitive Maintenance Fee Madness

20090405 Monday’s Musings: Total Account Value, True Cost of Ownership, And Software Vendor Business Models

20090324 Tuesday’s Tips: Five Simple Steps To Reduce Your Software Maintenance Costs

20090223 Monday’s Musings: Five Programs Some Vendors Have Implemented To Help Clients In An Economic Recession

20091012 Research Report: Customer Bill of Rights – Software-as-a Service

20090910 Tuesday’s Tip: Note To Self – Start Renegotiating Your Q4 Software Maintenance Contracts Now!

20090721 Tuesday’s Tip: 3 Approaches To Return Shelfware

20090127 Tuesday’s Tip: Software Licensing and Pricing – Now’s The Time To Remove “Gag Rule” Clauses In Your Software Contracts

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.  Keep in mind, we are not lawyers and do not provide legal advice. We suggest you always check with your legal counsel and your procurement teams to remain in compliance.

* Not responsible for any factual errors or omissions.  However, happy to correct any errors upon email receipt.

Copyright © 2001 – 2013 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience!

 

New C-Suite Tech Optimization Innovation & Product-led Growth Future of Work Sales Marketing Data to Decisions Digital Safety, Privacy & Cybersecurity SoftwareInsider SAP Oracle Marketing B2B B2C CX Customer Experience EX Employee Experience AI ML Generative AI Analytics Automation Cloud Digital Transformation Disruptive Technology Growth eCommerce Enterprise Software Next Gen Apps Social Customer Service Content Management Collaboration CRM Data to Decisions Enterprise IT finance HCM HR Machine Learning SaaS PaaS IaaS Supply Chain LLMs Agentic AI Robotics business Metaverse developer Quantum Computing Enterprise Acceleration IoT Blockchain ERP Leadership Healthcare VR CCaaS UCaaS M&A Enterprise Service Chief Financial Officer Chief Information Officer Chief Procurement Officer Chief Experience Officer Chief Marketing Officer Chief Executive Officer Chief Technology Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Operating Officer Chief Revenue Officer Chief Information Security Officer

Preparing for Disruption with WebRTC

It is important to understand what WebRTC can do for you, but it is equally important to understand what WebRTC may do to you.

Introduction
WebRTC is an emerging standard that enables real-time voice, video and data sharing in a Web browser without the need for browser plugins. Potentially billions of devices supporting a browser--PCs, laptops, smartphones, tablets and a host of new devices--from a variety of manufacturers will be real-time communications-enabled. Whereas browsers have typically interacted only with one or more Web servers, WebRTC allows browsers to exchange media and data with one another directly and in a secure manner.

Although third-party programs like Skype have been around for a long time, and some browser-based plugins have been available for limited communications interactions, the implications WebRTC brings to organizations of all types and sizes are enormous. Ubiquitous voice, video, and data for gaming, customer service, communications and personal and group engagement opens a new world of possibilities for innovation and disruption.

The transformative power behind WebRTC is that ordinary Web developers using just JavaScript Application Programming Interfaces (APIs) can craft fully functioning voice, video and data collaboration applications or embed these capabilities within other applications with just a few lines of code.

A WebRTC Primer
WebRTC (Web real-time communications) is an effort to create an open framework for embedding real-time communications capabilities into Web browsers. WebRTC allows HTML5 Web programmers, with no telecommunications skills and using simple Javascript APIs, to surface real-time audio and video functionality in Web servers and in browser-based applications running on computers, laptops, tablets and smartphones without the need for browser plugins or third-party applications.

Two standards bodies involved in creating the WebRTC standards include: the World Wide Web Consortium (W3C) and the Internet Engineering Task Force (IETF). The W3C is tasked with creating the Web APIs used in WebRTC while the IETF focuses on the underlying communications and data transfer protocols. Together, both groups collaborate on WebRTC specifications.

Powered by a Triangular P2P Architecture
The WebRTC architecture involves Web servers and browser clients. The Web server "serves up" Web applications with embedded Javascript, and the browser clients (PCs, tablets, smartphones) run the Javascript application. Traditionally, Web browsers have communicated only with Web servers. What is unique about WebRTC is that the Web application can now enable peer-to-peer (P2P) communications between two browser clients (See Figure 1).

Figure 1. WebRTC's Triangle Architecture (Adapted from "WebRTC: APIs and RTCWeb Protocols of the HTML5 Real-Time Web", Johnson, Alan B. and Daniel C. Burnett, First Edition, September 2012, Digital Codex LLC)

While the control data flows between the browser client and the Web server, the audio and video streams flow directly between the browsers. Directly transmitting media between browsers is very useful because voice and video are very sensitive to network latency and jitter, and the direct transmission eliminates additional paths for traffic to travel, on which it could encounter additional impairments.

WebRTC enables point-to-point browser communications as well as multipoint communications sessions. In a multipoint session, each browser sends and receives audio, video and data streams to and from every other browser in the session in a fully meshed configuration (see Figure 2).

Figure 2. Fully Meshed Peer Connections in WebRTC Multi-Point Communications Sessions

Keep in mind, WebRTC will not scale particularly well in many-to-many situations due to the processing power and network bandwidth required for all of the individual peer-to-peer connections that must be established. Consequently, audio and video bridging infrastructure may be required for large meetings with numerous endpoints.

The good news is that the majority of multipoint audio or video meetings typically involve only three or four endpoints. But these have typically been room or group endpoints. WebRTC will enable individuals to meet in multipoint video conferences, and recent data indicates that the number of endpoints participating in such conferences is increasing because people no longer congregate in three to four conference rooms for video meetings.

 

WebRTC Requires Directory Services
One of the elements WebRTC does not supply is a directory service. A directory is necessary so that WebRTC users can find one another. This capability could be termed a "rendezvous service".

WebRTC directory services must be supplied by the application developer. In many cases, directory services will be provided by interfacing with a website's authentication mechanism or with an existing enterprise directory.

When a browser connects to a website, the application can ask the user for login credentials. As the user is authenticated, the Web server creates a directory that maps authenticated users to active Web browsing sessions. Directory information can then be pushed down to the browser interface, allowing people to communicate with one another.

An alternative scenario would be a customer service web site that interfaces to a contact center. In this scenario, the user browsing the web site does not authenticate; only the contact center agent requires authentication. The Web server can automatically create the linkage between the customer and a contact center agent through the contact center's routing software.

Directories can be simple or complex, but they will be required in order for users to establish communications sessions using WebRTC.

WebRTC Federates Using a Trapezoid Approach
Although WebRTC capabilities may soon be ubiquitous in the browsers most people use, the ability to reach out and connect to others who may not be connected to the same Web server is an essential capability. Consequently, Web servers running WebRTC may ultimately need to be able to federate with one another. Federating between WebRTC domains results in the trapezoid architecture (see Figure 3).

One of the issues Web developers must pay attention to is how the control data will be exchanged. WebRTC specifies the use of a protocol called Session Description Protocol (SDP) to exchange communications parameters, but it does not specify what those parameters are nor the format that should be used to establish and control the communications session. These details are left up to each individual WebRTC application developer. Thus, developers wishing to federate with other WebRTC domains will need to ensure that they use common session initiation and control mechanisms.

Figure 3. The WebRTC Trapezoid for Federation between Server Domains

WebRTC Voice and Video Protocols
The IETF has standardized on the wideband Opus and the narrowband G.711 codecs for audio in WebRTC. If Opus is used in a WebRTC application, then any interoperability with SIP or the PSTN would require a transcoding border element. If G.711 is used, then audio transcoding between WebRTC and SIP would not be required because almost all SIP systems have G.711 as an available codec .

Video in WebRTC is far from finalized. Google has been pushing the VP8 video codec, and it has spent at least $125 million to make it available royalty-free to any WebRTC implementation. However, most of the existing video infrastructure in the world does not use VP8. Existing infrastructure often supports H.264. Mobile devices also have H.264 capability embedded into their hardware chipsets. Consequently, H.264 is the codec preferred by many IETF members; however, it is not royalty-free.

There has been no vote on which video codecs would be mandatory to implement . Google has made VP8 available to developers, and WebRTC developers using Google Chrome and Mozilla Firefox can have video interoperability today using VP8.

A straw poll taken at a recent IETF meeting showed 70 members could live with H.264 as a mandatory-to-implement codec. In the same meeting, 50 members could live with VP8 as a mandatory-to-implement codec (people could raise their hands more than once).

Some are suggesting that the WebRTC standard should push forward without specifying a mandatory video codec, leaving it up to the market to decide which, if any video codecs would be included. There are huge implications for both browser and hardware manufacturers, regardless of where this issue ultimately falls. Use of H.264 may not be such a huge licensing issue because most of the current browser and mobile device vendors have already paid the maximum licensing fee; the issue is that future codecs based on H.264 may have higher licensing costs, and choosing H.264 today as a mandatory codec may require much higher licensing fees in the future as H.265/HEVC become available.

Conclusion
WebRTC is already making headway into our everyday lives. Anyone running the latest version of Google Chrome has WebRTC capability already enabled. The automatic update for Mozilla Firefox (Firefox 22) will soon have WebRTC capabilities as well.

I am personally aware of over 70 companies that are either developing WebRTC browsers, toolkits, service platforms, or that have already created solutions in use by end users. New entrants are appearing nearly every week. WebRTC-based video bridging capability is already available in the services offered by VidTel and Blue Jeans Network. Expect to see WebRTC-enabled customer engagement solutions from some of the big contact center companies later this year and in early 2014.

WebRTC has the potential to turn the communications and collaboration industry on its head over the next few years. Executives and product managers would do well to learn what WebRTC is all about. It is important to understand not only what WebRTC can do for you, but it is equally important to understand what WebRTC may do to you.

This article is an excerpt from Dr. Kelly's recently published report titled, "Ten Things CIOs Should Know About WebRTC."

Future of Work Matrix Commerce New C-Suite Tech Optimization Innovation & Product-led Growth AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership Chief Customer Officer Chief Executive Officer Chief People Officer Chief Information Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Operating Officer

Monday's Musings: Four Elements for A #SharingEconomy Biz Model In #MatrixCommerce

Hard Times And Good Will Drive The Disownership Movement

From car sharing in the late 1990′s, to vacation rentals, to collaborative financing, the sharing economy has been inching it’s way into the forefront of the consumer’s minds.  Since the late 2000′s, thought leaders such as Rachel Botsman, Lisa Gansky, Anne-Sophie Novel, have been chronicling the forces, underlying trends, and players behind the movement. During the past five years, several poster children have emerged including AirBnB, DogVacay, Fon, GetAround, LendingClub, Liquid (Spin Lister), Lyft, Neighborgoods, Poshmark, Relay RidesSideCar, Task Rabbit, Zaarly, and ZipCar.

Also known as collaborative consumption, an April 2013 study by SunRunHomes, a solar leasing company, and Harris Interactive shows that more than half (52%) of a 2252 surveyed group of Americans, have rented, leased, or borrowed traditionally owned items in the last two years.   These items include cars, white good appliances, vacation homes, heavy tools, house hold tools, solar panels, books/textbooks, and children’s apparel (see Figure 1).  The survey reveals a uniform view that cuts across age groups and coastal biases.  In fact, the top reasons people rent, lease, or borrow traditionally owned items were saving money (53%) and cutting down on maintenance and/or storage (39%).

Figure 1. Disownership Is Now The New Normal



Source: SunRunHomes and Harris Interactive Study

Future Matrix Commerce Models Must Account For New Mega Trends Such As The Sharing Economy

Matrix Commerce analyzes the disruptive pressures influencing the commerce paradigm. Commerce faces rapidly changing business models, societal norms, and new payment options that are often misunderstood and poorly integrated.   Matrix commerce (TM) means the fusing of demand signals and supply chains in an increasingly complex world of buyers seeking frictionless buying experiences.  Friction in this new world originates from new regulatory requirements such as sustainability, taxation, and privacy.  As the world revolves around the buyer, channels, demand signals, supply chains, payment options, enablers, and big data will converge to create what Constellation coined in 2011 as Matrix Commerce.  Matrix Commerce spans across disciplines as people, process, and technologies continue to transform today’s commerce models.

The mega trend shift for certain market segments to a sharing economy and collaborative consumption will transform many existing business models in the same way the internet and mobility transformed the bricks and mortar world of retail and services.  In accounting for buyer centric behavior, organizations must factor in how these trends impact business models in existing customer segments.

The Bottom Line: Four Elements Required For A Successful Business Model

Preliminary Constellation Research studies identify four key elements required to create a sustainable business model around the sharing economy:

  1. Identification of underutilized assets. High value, high capital but underutilized personal assets provide prime opportunities.  Common examples include homes, heavy equipment, motor vehicles, furniture, and solar panels.  Assets utilized for fleeting life events or temporary usage also provide opportunities.  Children’s goods, wedding apparel, and roaming wifi top the lists.
  2. Optimization of value through renting, leasing, or borrowing. The sum of the parts will yield much greater value than the whole.  As with fractional ownership of jets, condos, and medical equipment, the goal is to maximize profits and revenues by selling slices of usage.
  3. Trading on good will and generosity of others. Social good provides a driving market force.  Economic hardship has created opportunities where individuals wish to share or monetize excess capacity.  In the case of auto, sharing reduces carbon emissions, provides car pool lane access, and reduces commuting costs.  For vacation properties owners pay for their mortgage while leasing out excess capacity. 
  4. Building a big data treasure trove for the reputation economy. Trust is the social currency. Transparency is the holy grail.  Data on participants in the sharing economy will emerge as the new credit score in this reputation economy.  Third party data aggregators will pay for this information.  Trust Cloud and Trust You are already jockeying to provide reputation as a service.

In the classic B2B world, cloud computing, equipment leasing, air craft financing, and medical device leasing have already pioneered these business models.
Your POV

Are you ready to support a sharing economy? Will collaborative consumption optimize your profits?  Is this trend just relegated to hipsters in metropolitan markets?   Add your comments to the blog or send us a comment at R (at) SoftwareInsider (dot) org or R (at) ConstellationRG (dot) com

Related Resources

Reprints

Reprints can be purchased through Constellation Research, Inc. To request official reprints in PDF format, please contact Sales .

Disclosure

Although we work closely with many mega software vendors, we want you to trust us. For the full disclosure policy, stay tuned for the full client list on the Constellation Research website.

* Not responsible for any factual errors or omissions.  However, happy to correct any errors upon email receipt.

Copyright © 2001 -2013 R Wang and Insider Associates, LLC All rights reserved.
Contact the Sales team to purchase this report on a a la carte basis or join the Constellation Customer Experience!

 

Marketing Transformation Matrix Commerce Next-Generation Customer Experience Sales Marketing Revenue & Growth Effectiveness Data to Decisions Future of Work Innovation & Product-led Growth New C-Suite Tech Optimization SoftwareInsider AI ML Machine Learning Generative AI Analytics Automation B2B B2C CX EX Employee Experience business Marketing SaaS PaaS Growth Cloud Digital Transformation eCommerce Enterprise Software CRM ERP Leadership Social Customer Service Content Management Collaboration LLMs Agentic AI Robotics IaaS Quantum Computing Disruptive Technology Enterprise IT Enterprise Acceleration Next Gen Apps IoT Blockchain CCaaS UCaaS Enterprise Service developer Metaverse VR Healthcare Supply Chain Chief Customer Officer Chief Information Officer Chief Marketing Officer Chief Executive Officer Chief Technology Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Financial Officer Chief Operating Officer Chief Revenue Officer Chief Information Security Officer Chief People Officer Chief Human Resources Officer Chief Experience Officer

A Date with Lindsay Lohan. Or How Celebrity Adds Punch to Your Brand

1
 

If there is one thing I love, its when people are publicly honest. Or self-deprecatingly honest. Or self-deprecatingly honest in public. But I love this even more when the person at the centre of the confession is famous. Or hyper-famous, like Lindsay Lohan.

So, imagine that you are the brand manager for eHarmony, the dating site, and you notice that your social media mentions are going through the roof. What could it be? A crisis? A catastrophe? Another cat picture?

Maybe it’s a parody by Funny or Die. Featuring Lindsay Lohan.


 

Marketing Transformation Chief Marketing Officer

SuccessConnect – Where Talent and Social Collide at the SuccessFactors Conference

1
 

 

Marketing Transformation Future of Work Next-Generation Customer Experience Chief Customer Officer Chief Information Officer Chief Marketing Officer

Passwords – One for the Money, Two for the Show

1
 


I am always going to love an Elvis quote. We don’t see enough of it in the world of business. And we should. After all, he was “The King”.

So this quick guide to unhackable passwords from McAfee and Intel caught my attention straight away.

The guide points out that you need multiple passwords:

  • One password for banking
  • A different password for email
  • Another password for social media

Unfortunately, we all have more than three needs, right?  So one idea is to add the account information into your password:

  • Facebook: your Facebook password can become my_facebook_password
  • Twitter: your Twitter password can become my_twitter_password

Or variations on that theme.

mcafee-passwords

HT Lindy Asimus’ pinterest collection.

 

Marketing Transformation Next-Generation Customer Experience Chief Customer Officer Chief Information Officer Chief Marketing Officer

Ten Things CIOs Need to Know About WebRTC webinar wrapup

Today we presented the webinar "Ten Things CIOs NEED to Know About WebRTC". Here are a few highlights from the event:

WebRTC (Web Real-Time Communications) is a technology that enables point-to-point or multipoint voice, video, and data communications without plugins.

  • WebRTC is the next disruption
  • WebRTC is native and built into web browsers. Currently being developed by Google, Mozilla, Opera, and a handfull of other communications companies. 
  • Voice, video, and data become part of the fabric of the internet; no longer a plugin or application. This technology will be embedded in everything we do on the internet.
  • WebRTC is enabled through JavaScript programming 
  • WebRTC will be compatible across browsers. 
  • WebRTC makes voice, video, and data ubiquitious across the devices we use
  • Think of WebRTC as an enabler--like HTML; not a market

WebRTC creates opportunities

  • Customer service
  • Training
  • Conferencing/collaboration
  • Maintenance, break/fix services
  • Gaming
  • more...

Watch the webinar 

Download the deck

Contact Dr. E. Brent Kelly

Constellation Research has published a report about the coming WebRTC revolution, "Ten Things CIOs Should Know About WebRTC". 
Included in this report:

  1. Where's the money for me in WebRTC?
  2. How WebRTC will disrupt the current communications industry
  3. The timing of the WebRTC standard
  4. The islands WebRTC will create (for better or for worse)
  5. Why offerings like Skype may not go away
  6. Why Microsoft opposes WebRTC as it's presently constituted
  7. How WebRTC will play into the world of mobile devices including smartphones and tablets
  8. Why WebRTC may not disrupt all complex collaboration, only most of it
  9. The millions of interfaces that will emerge to invoke WebRTC capabilities
  10. Identifying and classifying the WebRTC players
  11. Eight recommendations organizations can take now to prepare for WebRTC's disruptive capabilities
Future of Work New C-Suite Next-Generation Customer Experience Tech Optimization Innovation & Product-led Growth AI ML Machine Learning LLMs Agentic AI Generative AI Robotics Analytics Automation Cloud SaaS PaaS IaaS Quantum Computing Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software Next Gen Apps IoT Blockchain CRM ERP CCaaS UCaaS Collaboration Enterprise Service developer Metaverse VR Healthcare Supply Chain Leadership Chief Customer Officer Chief Executive Officer Chief Financial Officer Chief People Officer Chief Information Officer Chief Marketing Officer Chief Technology Officer Chief Information Security Officer Chief Data Officer Chief Digital Officer Chief Analytics Officer Chief Operating Officer

Forget your raison d’être. What’s your raison pour le faire?

1
 

I am a fan of deep thinking. Really I am. And I am a fan of long copy advertising. Documentaries. And books. Those old fashioned paper products that immerse you in other worlds. I love them and collect them and will continue to do so.

Each of these sing to my soul. They ground me in a way that other things cannot. And they tap into my sense of self. My sense of purpose. My reason for being.

But while I love ideas and the way that they can inspire others, what happens when the energy of that moment wanes? What happens when the talk stops and you find yourself alone and unguarded. What then?

That’s when your reason for doing takes over.

Where the raison d’être – your reason for being – speaks of life, raison pour le faire- your reason for doing – speaks of action.

On the one hand you have thought. On the other hand, life.

We seem to have plenty of ideas, thought and inspiration. They abound in life, art and work. We attend conferences devoted to them.

But inspiration doesn’t create change. That’s hard work beyond the realm of ideas. It’s the realm of life. And you can only change life through doing.

So stop reading.

Architect of Your Future - Tattoo Design

Creative Commons License - = Duke One = - via Compfight

 

Marketing Transformation Future of Work Chief Customer Officer Chief Marketing Officer