pay-per-use
Transcription
pay-per-use
cio & leader.com Next Horizons Best of Breed Top IT-enabled Trends Pg 38 Analytics in Consumer Firms Pg 20 07 T r a c k t e c h n o lo g y B u i ld b usi n ess Shape self Is Traditional Security Enough? | Reality Check pay-per-use Volume 02 | Issue 07 In today's era of pay-per-use, are longstanding relationships between CIOs and traditional IT vendors in for a change ? page 26 A 9.9 Media Publication Viewpoint The Amazon Effect Pg 48 Volume 02 Issue 07 July 07 2013 150 editorial yashvendra singh | [email protected] New-Age Relationships Pay-per-use model will only cement the bond between the CIO and his vendor I t is a deep rooted practice. People prefer to buy from those who they trust and like, and with whom they have long-established relationships. Enterprise technology decisionmakers are no different. Trust, credibility and relationship have been the hallmark of any CIO-vendor successful association. However, businesses today are increasingly demanding speed, capabilities and flexibility from CIOs. To meet these needs, enterprise technology leaders are in turn looking at emerging pay-peruse models. The fast acceptance and rapid adoption of cloud computing has the potential to radically alter the long-standing relationship between the CIO and the vendor. For proponents of cloud computing, applications, software and hardware are not platforms that need to be supported through long and tough life cycles. They look at the power of computing as yet another disposable commodity. So, will this change in the manner in which enterprises purchase and consume technology spell the death of the editors pick 26 Pay-Per-Use In today’s era of pay-per-use, are longstanding relationships between CIOs and traditional IT vendors in for a change? 2 July 07 2013 traditional vendor-CIO relationship? Will the tenets of trust, strong rapport and bonding give way to a transactional relationship? While there may be those who would differ, we at CIO&Leader feel that the pay-per-use and outsourcing models will only cement the relationships between the CIOs and their vendors. There are enterprise technology leaders who, to achieve the desired results, work closely with their cloud vendors. They select, manage and focus on their vendors to achieve set goals of cost, quality service and satisfaction for their enterprises. In fact, the importance of taking the relationship to the next level can be gauged by the fact that a dedicated discipline has come to be established. Called VRM (Vendor Relationship Management), the new disciple has already been adopted by companies such as Cisco Systems and Citi. Amongst the key objectives of VRM is to make sure that there is a concerted effort to align the efforts of the vendor towards achieving the objectives of the enterprise. On its part, the vendor needs to understand that managing servers is akin to managing expectations of the CIO. Instead of for jostling for superiority, the vendor should work towards a collaborative relationship. In the current issue, we decided to explore this aspect of CIO-vendor relationship in the era of cloud computing. Let us know how you are managing your relationships with your cloud vendor. We look forward to your feedback. july 2013 26 Cover Story 26 | Pay-Per-Use 02 | Editorial 10 | Enterprise Roundup 48 | viewpoint S p i n e cio & leader.com In today’s era of pay-per-use, are longstanding relationships between CIOs and traditional IT vendors in for a change? RegulArs Next HorizoNs Best of Breed Top IT-enabled Trends Pg 38 Analytics in Consumer Firms Pg 20 ViewpoiNt The Amazon Effect Pg 48 Volume 02 Issue 07 July 07 2013 150 07 T r a c k T e c h n o lo g y B u i ld B uSi n eSS Shape Self Is TradITIonal securITy enough? | realITy check 4 Copyright, All rights reserved: Reproduction in whole or in part without written permission from Nine Dot Nine Interactive Pvt Ltd. is prohibited. Printed and published by Anuradha Das Mathur for Nine Dot Nine Interactive Pvt Ltd, Bungalow No. 725, Sector - 1, Shirvane, Nerul, Navi Mumbai - 400706. Printed at Tara Art Printers Pvt ltd. A-46-47, Sector-5, NOIDA (U.P.) 201301 July 07 2013 pay-per-use Volume 02 | Issue 07 Please Recycle This Magazine And Remove Inserts Before Recycling In today's era of pay-per-use, are longstandIng relatIonshIps between CIos and tradItIonal It vendors In for a Change ? page 26 a 9.9 Media Publication Cover design by: manav sachdev www.cioandleader.com 46 NO HOLDS BARRED 46 | The Era of Relationships Dan Springer, Chairman & CEO, Responsys, talks about the importance of customer engagement 34 | tech for governance: is traditional security enough? Organisations should look for a service that operates a global threat intelligence facility advertisers’ index 20 | Best of breed: Applying advanced analytics in consumer firms Con- 38 | Next Horizons: top itenabled business trends A look at sumer facing companies must be able to gather and manage the right data some trends that loom large on the top agenda of CIOs HPIFC Smartlink1 Schneider 7, 9 ESDS7 Zenith Computers 13 SAS Institute 15 ASSOCHAM19 DellIBC VodafoneBC This index is provided as an additional service.The publisher does not assume any liabilities for errors or omissions. Managing Director: Dr Pramath Raj Sinha Printer & Publisher: Anuradha Das Mathur Editorial Executive Editor: Yashvendra Singh Managing Editor: Rachit Kinger Consulting Editor: Atanu Kumar Das Assistant Editor: Akhilesh Shukla Correspondent: Debashis Sarkar DEsign Sr. Creative Director: Jayan K Narayanan Sr. Art Director: Anil VK Associate Art Directors: Atul Deshmukh & Anil T Sr. Visualisers: Manav Sachdev & Shokeen Saifi Visualiser: NV Baiju Sr. Designers: Raj Kishore Verma Shigil Narayanan & Haridas Balan Designers: Charu Dwivedi Peterson PJ & Pradeep G Nair MARCOM Designer: Rahul Babu STUDIO Chief Photographer: Subhojit Paul Sr. Photographer: Jiten Gandhi advisory Panel Anil Garg, CIO, Dabur David Briskman, CIO, Ranbaxy Mani Mulki, VP-IT, ICICI Bank Manish Gupta, Director, Enterprise Solutions AMEA, PepsiCo India Foods & Beverages, PepsiCo Raghu Raman, CEO, National Intelligence Grid, Govt. of India S R Mallela, Former CTO, AFL Santrupt Misra, Director, Aditya Birla Group Sushil Prakash, Sr Consultant, NMEICT (National Mission on Education through Information and Communication Technology) Vijay Sethi, CIO, Hero MotoCorp Vishal Salvi, CISO, HDFC Bank Deepak B Phatak, Subharao M Nilekani Chair Professor and Head, KReSIT, IIT - Bombay NEXT100 ADVISORY PANEL Manish Pal, Deputy Vice President, Information Security Group (ISG), HDFC Bank Shiju George, Sr Manager (IT Infrastructure), Shoppers Stop Farhan Khan, Associate Vice President – IT, Radico Khaitan Berjes Eric Shroff, Senior Manager – IT, Tata Services Sharat M Airani, Chief – IT (Systems & Security), Forbes Marshall Ashish Khanna, Corporate Manager, IT Infrastructure, The Oberoi Group Sales & marketing National Manager – Events and Special Projects: Mahantesh Godi (+91 98804 36623) National Sales Manager: Vinodh K (+91 97407 14817) Assistant General Manager Sales (South): Ashish Kumar Singh (+91 97407 61921) BRAND & EVENTS Brand Manager: Jigyasa Kishore (+91 98107 70298) Product Manager-CSO Forum: Astha Nagrath (+91 99020 93002) Manager: Sharath Kumar (+91 84529 49090) Assistant Manager: Rajat Ahluwalia (+91 98998 90049) Assistant Brand Managers: Nupur Chauhan (+91 98713 12202) Vinay Vashistha (+91 99102 34345) Assistant Manager – Corporate Initiatives (Events): Deepika Sharma Associate – Corporate Initiatives (Events): Naveen Kumar Production & Logistics Sr. GM. Operations: Shivshankar M Hiremath Manager Operations: Rakesh Upadhyay Asst. Manager - Logistics: Vijay Menon Executive Logistics: Nilesh Shiravadekar Production Executive: Vilas Mhatre Logistics: MP Singh & Mohd. Ansari OFFICE ADDRESS Published, Printed and Owned by Nine Dot Nine Interactive Pvt Ltd. Published and printed on their behalf by Anuradha Das Mathur. Published at Bungalow No. 725, Sector - 1, Shirvane, Nerul, Navi Mumbai - 400706. Printed at Tara Art Printers Pvt Ltd. A-46-47, Sector-5, NOIDA (U.P.) 201301 For any customer queries and assistance please contact [email protected] This issue of CIO&Leader includes 12 pages of CSO Forum free with the magazine July 07 2013 5 I Believe By Zafar Saeed, CTO, Albion Information Security - Internal Threats the author has recently been involved in managing a wide range of cloud-based products and services Employees are responsible for 95% of intrusions Most security breaches do not originate from external hackers, viruses or worms With growing dependency on Internet, organisations are spending a sizable chunk of their total IT budget in information security to protect data, networks and servers against external threats. An intrusion detection system at gateway, a sophisticated firewalls and a well-managed virtual private network, collec- 6 July 07 2013 tively called as perimeter security can only provide security if an attack is steered from outside. Companies generally don’t give much attention on securing the network and information that is on high-risk of being compromised from within the boundaries of the organisation. There are apparent reasons to believe that networks cannot be trusted (LAN or WAN) and that sensitive information is frequently travels unprotected through local area network. Conventionally, organisations have put their most information security efforts and budget in protecting their information assets from external threats. Internal information security is often being taken for granted and relied upon trust relationship with employees. According to a Gartner, most security breaches do not originate from external hackers, viruses or worms, but from employees who commit more than 70 percent of unauthorised access to information systems. Employees are responsible for more than 95 percent of intrusions. current challenge people accessing internal networks is always a threat Top Concerns The most obvious concern is the human factor. People accessing internal networks is always a threat that is very challenging to control. It may always not be intentional, for example an employee may innocently use an infected USB storage that may result in compromising either information Confidentiality, Integrity or Availability, or all of them in worst case scenario. 1. Unauthorised search or access, copying, modification, or deletion of confidential data 2. Brute force password attacks and installation of Trojans, bots, rootkits and other malicious software on the network by users 3. Installation of unauthorised and unapproved software by users on their allocated machines. Chief Sustainability Officer Production Manager Maximize production; ensure operational safety. IT Manager Ensure uptime and availability. Drive sustainability strategy; optimize resource efficiency. Facilities Manager Manage energy, lighting, safety, security, and HVAC. Chief Executive Officer Achieve competitive advantage through an efficient enterprise. Now, enterprise-wide energy efficiency is at your fingertips StruxureWare software delivers enhanced visibility for fast, informed decision-making You can’t manage what you can’t see. To optimize business performance and conserve enterprise resources, you need an efficiency and sustainability strategy driven by powerful, intelligent software that is integrated and engineered to work together. StruxureWare™ software applications and suites from Schneider Electric™ are the answer. The right information to the right user at the right time Open, scalable, and easily integrated with third-party and legacy systems, StruxureWare software is a unique platform of applications and suites that gives you visibility into energy and other resource use across your organization. Control rising energy costs; meet reporting obligations; keep stakeholders informed and engaged. No matter what your challenge, you’ll get customized, actionable information that eliminates departmental silos and conflict. And, when you deploy StruxureWare software within EcoStruxure™ integrated system architecture, you can realize significant savings on capital and operational expenses. A global leader in efficiency and sustainability Ranked 13th on the Global 100 Most Sustainable Companies, Schneider Electric has the solutions and expertise you need to maximize efficiency and minimize environmental impact. Independent analyst firm Verdantix named Schneider Electric a ‘Leader’ in energy management software, citing a compelling market vision, robust capabilities, and best-in-class partner network that ‘set the bar high’. Five critical ways StruxureWare software helps you from shop floor to top floor Access data instantly: Get the information you need, when and where you need it, presented in a form that meets your requirements. Share information confidently: Provide accurate, timely information across and outside your organization. Create actionable reports: Develop critical reporting tools, empowering your enterprise to take action. Make informed decisions: Work from one, integrated, real-time version of the truth, eliminating guesswork in decision-making. Operate more efficiently: Identify ways to save energy, enabling efficiency and process improvements. From theory to reality: 3 steps to implementing a sustainability programme > Executive summary Where are you on the road to sustainability? Find out when you download ‘From theory to reality: 3 steps to implementing a sustainability programme’. Plus, enter to win an iPad mini! Visit www.SEreply.com Key Code 50039y ©2013 Schneider Electric. All Rights Reserved. All trademarks are owned by Schneider Electric Industries SAS or its affiliated companies. www.schneider-electric.com. Part #998-1169566_IN LETTERS COVER STORY | glOCal glOCal | COVER STORY 1/14 #REASON cio & le ad No “SpeciaHoldS BArred lisation is the ke y” Creatin g a Co BeSt of Breed mpetitive landsc ape Pg 34 Pg 48 er.c om Illustration by Manav Sachdev By learning globally and06 implementing locally, Indian CIOs are transforming their enterprises By Atanu Kumar Das Tr ac June 2013 k Tec h n o lo ViewpoiNt Volume 02 Issue 06 June 2013 150 Pg 60 gy TOP EnC ryPT 24 So ftw definedareThere can be no substitute to global experience. We spoke to a few top CIOs who had the experience of working in a global enterprise at some point of their careers and how they are implementing Buil d Bu S i nwhat they learnt abroad, in India. eSS Shap e Sel f June 2013 INTRODUCING IDEAS AWARDS glocal S p i n e Celebrate ideas that transform business TO ATTEND THE EVENT 25 IOn BEnEfIT S | STrE AMlInIng IT AT CArESTr EAM HEA lTH | TOyO TA fInAnCIA l SErV ICES SEEk S IT AgIl ITy e 02 | Issue 06 Volum L.indd Media Join over 900 CIOs on the CIO&Leader LinkedIn group for latest news and hot enterprise technology discussions. Share your thoughts, participate in discussions and win prizes for the most valuable contribution. You can join The CIO&Leader group at: www.linkedin.com/ groups?mostPopular=&gid=2580450 Some of the hot discussions on the group are: Ashok Seth CIO, Sap i Technolo ient gies A 9.9 Cover-FINA CIO&Leader LinkedIn Group Publicatio n glocal By lear implem ning globally CIOs ar enting locallyand e transf , Indian enterpris or es Page 24 ming their 1 are CTOs more interested in satisfying the CFO & Board rather than the consumer? 6/26/2 013 4:38:3 7 PM CTO is aligned to the CFO and the Board in that order. The CTO will have to also be good at resume writing as he will not last too long. But then the question arises, is the CFO aligned to the consumer? If he is not, then he may be in hot water sooner or later. Virtual CTO/CIO A long term IT partner for your business growth This is a model that SMBs are slowly waking up to. While their IT head can chip away with his day-to-day activities, an external help (a part time CIO) can give their IT a proper direction and can review performance to ensure the company's objectives are met. —Balasubramanian S R Business & IT Consultant CIO&LEADER. COM Anuj Garg, Technical Director, Zync Global, shares his views on tech leadership http://www. cioandleader. com/cioleaders/ features/10280/leaders-motivateteam Opinion the age of applications arun gupta, CIO, Cipla Diwakar Dhyani, CTO, Corporate Infocom, talks about customised apps There is a need for developing custom applications by CIO/CTO for the employees. To read the full story go to: http://www.cioandleader. com/cioleaders/features/10235/age-apps WRITE TO US: CIO&Leader values your feedback. We want to know what you think about the magazine and how to make it a better read for you. Our endeavour continues to be work in progress and your comments will go a long way in making it the preferred publication of the CIO Community. Send your comments, compliments, complaints or questions about the magazine to [email protected] 8 July 07 2013 Diwakar Dhyani, CTO, Corporate Infocom Enterprise Cloud Office Systems Will Rise to 33 percent by 2017 Pg 12 Illustration by anil t Round-up Interview Inisde Polycom Unveils Collaboration Apps The new versions let users securely extend the use of video collaboration has announced its RealPresence Mobile 3.0 and RealPresence Desktop 3.0, video collaboration software applications for mobile devices and personal computers. The new versions include enhanced content-sharing capabilities and support across more devices from companies including Apple, LG, Samsung and Sony. RealPresence Mobile 3.0 and RealPresence Desktop 3.0 video collaboration software are powered by the Polycom RealPresence Platform. “Organisations expect a great collaboration experience, whether they’re at headquarters, at home, with a customer or on the road – or for that matter in a school, a hospital, a court room, or a manufacturing Polycom 10 July 07 2013 plant,” said A.E. Natarajan, Senior Vice President of Worldwide Engineering, Polycom. Polycom RealPresence Mobile 3.0 software is lets customers securely extend the use of video collaboration beyond the conference room to easily connect tablets and smartphones (iOS and Android devices) with other standards-based video systems, providing a simple and intuitive video collaboration experience when users are on-the-go, traveling or working remotely. For a more engaging video collaboration experience, iPad users can now capture and share images, live web content and content files - including .jpg, .png, html pages, PDF, PowerPoint, Excel. Data Briefing 16% Will be the growth of BI software market in 2013 Enterprise Round-up They Rahul Said it Khullar Reacting to a question from Hindu Business Line on whether the worst phase was over for telecom players, Khullar feels that the pain period for telecom sector is getting over slowly. HP Unveils Cloud Management Software Helps firms automate the complete life cycle of IT services HP has announced the next generation of its data center automation, orchestration and cloud management software, which is designed to enable enterprise IT to rapidly deliver services on a massive scale on premises or via the cloud HP's portfolio of software includes HP OO 10, HP SA 10, HP DMA 10 and HP Cloud Service Automation 3.2 which helps organisation to automate the complete life cycle of IT services—from routine data center maintenance to the delivery of business processes. HP Operations Orchestration (OO) 10 reduces the time needed to build and deploy business processes—on premises or via the cloud by automating all application and infrastructure runbooks. In addition, HP OO 10 speeds time to value with out-of-thebox support for more than 5,000 IT operations, including new support for Amazon S3 Storage, HP ArcSight, HP Fortify, OpenStack and SAP applications. The HP Server Automation (SA) 10 enterprise-grade server life cycle management platform allows IT to manage more than 100,000 physical and virtual servers from a single pane of glass to eliminate management complexity. In addition, HP SA 10 offers HP Server Automation Standard, a virtual appliance that allows smaller organisations and department-level IT teams to begin managing server environments in less than one hour. Quick Byte on cloud “I will never say the worst is behind. The pain period is ending slowly. We have sorted out many issues. Industry finances are improving. At TRAI, we are looking at what all of us – Government and regulator – need to do for the next 2-3 years.” — Rahul Khullar, Chairman, Telecom Regulatory Authority of India Only eight percent of office system users employ cloud-hosted email and desktop applications, according to analyst company Gartner. However, that figure is expected to grow rapidly in the next decade, as the number of devices that office workers use grows —Gartner July 07 2013 11 Illustration by anil t Enterprise Round-up Cloud Office Systems Will Rise to 33 percent by 2017 695 million office users will use cloud by 2022 Claims that most organisations have moved, or are moving, to cloud email or cloud office systems are not consistent with research by Gartner, Inc. Gartner estimates that there are currently about 50 million enterprise users of cloud office systems, which represent only eight per cent of overall office system users (excluding China and India). Gartner, however, predicts that a major shift toward cloud office systems will begin by the first half of 2015 and reach 33 per cent penetration by 2017. "Despite the hype surrounding migration to the cloud, big differences in movement rates continue, depending on organisations' size, industry, geography and specific requirements," said Tom Austin, vice president and Gartner Fellow. "While eight per cent of business people were using cloud office systems at the start of 2013, we estimate this number will grow to 695 million users by 2022, to represent 60 per cent." Although email remains the world's primary collaboration tool, others, such as Global Tracker Security services' market is forecast to reach $67.2 billion in 2013 12 July 07 2013 Source: gartner The worldwide security technology and team sites and communities are growing in importance. Nonetheless, email is typically pivotal in decisions to move — or not move — to cloud office systems. Gartner estimates that by the end of 2014 at least 10 per cent of enterprise email seats will be based on a cloud or software-as-a-service model. In addition, there has been a substantial expansion in the number of devices people use to access cloud office systems in recent years. In 2007, when the cloud office system market first appeared, typical individual users would employ just one device to access their enterprise's office systems. In 2013, that number has soared. Gartner estimates the typical knowledge worker now employs up to four devices — for example, mobile phone, media tablet, personal PC and enterprise PC — to access their organisation's office system capabilities in a single week. This explosion in the number of devices per user could drive some organisations to cloud office systems as they can reduce the IT burden of software installation, maintenance and upgrades of locally installed office software. Device counts are an important consideration. While organisations may need to buy licenses, for each and every device that a user uses to access non-cloud office systems and applications, cloud office systems are typically provisioned to each user, not to each device. As a result, two alternative cases emerge: for knowledge workers who are increasingly using multiple devices, moving to a per-user (not per-device) payment scheme can lead to significant savings if the customer would otherwise have to license (or buy subscriptions for) each device under older, per-device licensing approaches. Alternatively, organisations with many devices shared between workers — as in the banking and healthcare industries — may be better off licensing or subscribing by device. Current levels of adoption vary significantly by industry. Organisations in industries at the leading edge, such as higher education, discrete manufacturing, retail and hospitality, are significantly more likely to adopt cloud-based office systems at present. Those in the intelligence and defense sectors, and in heavily regulated parts of the financial services and healthcare industries, are among the least likely to be early adopters. Enterprise Round-up Illustration by anil t Personal Data On Company's IT is the Next Target Most firms will have data which they can't control Organisations should create a privacy programme that keeps personal data at arm's length, but under control, according to Gartner, Inc. Gartner predicts that by 2019, 90 percent of organisations will have personal data on IT systems that they don't own or control. Enterprises have traditionally been the target of security threats, and until recently, those hackers focused on attacking vulnerable IT infrastructure. As protection for such infrastructure improves, the attackers' attention shifts to softer targets, such as employees, contract workers, customers, citizens and patients. "As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organisation is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years." "The PCI Data Security Standard (DSS) requires the implementation of stringent controls of those who collect and store credit card data. In response, many companies have decided to eliminate credit card data from their own systems and completely entrust it to an external service provider," said Casper. "The same could happen with personal data. If control requirements are too strong and implementation is too costly, it would make sense to hand over personal data to a specialized 'personal-data processor'" Gartner has identified the following steps to prepare for such a strategy. The first step should be to create a policy that draws a clear line between data that relates to human beings and data that does not. The former category includes contact information and health and financial information, as well as an Internet Protocol address, geolocation data and other traces an individual leaves in the online world. The latter category especially includes business plans, corporate financial data and intellectual property. Separating the two is necessary, because different laws apply. Fact ticker Govt Unveils Cyber Security Framework To work with ISPs to oversee the metadata of Indian users With cyber security becoming a major concern globally, the Indian government is now implementing a new architecture to keep the IT infrastructure secure. According to a Times of India report, the new architecture envisages an interlinked set of bodies in departments such as NTRO, defence 14 July 07 2013 and home ministries. CERT will be the umbrella body that will take care of the cyber security. The inter-agency structure will be headed by a cybersecurity coordinator, whose named will be revealed by end of this month. The framework, cleared by the Union cabinet last month, also envisages working closely with Internet Service Providers (ISPs) to monitor the metadata of Indian users. However, this would be different from US' PRISM as it will not be covert. According to a Business Standard report, the architecture is rooted in the IT, Act 2000, particularly Sections 43, 43A, 72A and 79, which make it mandatory for the companies to adhere to data security and privacy protection guidelines. It also envisages multi-layered protection. Big Data T om Davenport of the International Institute for Analytics (IIA) and Jill Dyché of SAS has come with a new research report called Big Data in Big Companies , which describes how 20 large firms benefit from big data projects and how these companies have deployed analytics to generate value from their big data assets. “We’re making a big bet on big data,” says Bill Ruh, Vice President of GE’s Software and Analytics Center. “With that said, the pilot projects we’ve put out there have solved some big problems already. Our early proof-points were important. Now we’re moving forward with even more complex problem sets. We’re making this a part of everything we do.” Research participants included AIG, Bank of America, Caesars Entertainment, Carolinas Health Care, CIGNA, Dell, Discover, Fidelity, GE, Macys. com, Schneider National, Sears, T-Mobile, United Healthcare, UPS, Verizon and Wells Fargo. “As we engaged big company executives in conversations about big data for this report, they all agreed that big data is an evolutionary set of capabilities that would have new and sometimes unanticipated uses over time,” said Davenport, Research Director of the IIA and Visiting Professor at Harvard Business School. A Question of answers | Simon Cowley Simon Cowley | commscope Cloud is Gaining Momentum Simon Cowley, Vice President, Global Technical Support, CommScope, believes that moving to the cloud entails to gracefully giving up control while maintaining accountability. In a conversation with CIO&Leader, he gives insights into how cloud is catching up fast among enterprises and is proving to be a game changer While mobile devices are coming across as game changers in today’s businesses, CIOs are struggling to keep pace with mobility. How can they balance mobility’s dramatic effects on workplace productivity and requirements? BYOD (Bring Your Own Device) is a trend that seems like it’s here to stay. More and more people are coming to work with their own devices and expecting to use them seamlessly. This is true not just for employees but also for visiting customers or 16 July 07 2013 clients. To meet this demand, an increasing number of organisations are implementing in-building wireless and Distributed Antenna System (DAS) solutions to ensure ubiquitous coverage and high standards of the quality of service. Simultaneously, there are new Wi-Fi standards being developed, such as 802.11ac and 802.11ad, that are pushing the aggregate available bandwidth beyond 1G. This in turn is a solid driver for 10G capable infrastructure throughout the building to support both Wi-Fi and desktop applications. What are the top three most important technologies/best practices that a CIO should adopt to cut down on power consumption? There are a few solutions that will allow for a better managed network that can bend the cost curve and reduce power consumption in both the short and long run. Some of these options include: A DCIM (Data Centre Infrastructure Management) solution that automates workflows, empowers knowledge-based decision-making, Talk of the town: Bring-your-own-device is catching up fast in enterprises and promises to stay for a long time A Question of answers | Simon Cowley and maximises operational efficiency An intelligent infrastructure management solution that provides realtime documentation that can take the guesswork out of what is connected where, making the job of managing networks much easier. It will also assist with finding a device’s physical location in the network with IP device discovery. A power management solution, like Cisco EnergyWise, that can be used to monitor, control, and report the energy use of information technology (IT) and facilities equipment. Automated locationbased real-time update capability is paramount to an effective implementation. What are the top three challenges confronting today’s enterprise technology decision makers? How can they overcome these challenges? Recently, CommScope conducted a Global Enterprise Survey with 1,104 IT professionals across 63 countries and identified the following gamechangers or trends impacting the industry: Enterprise mobility - An in-building wireless solution to keep-up with the growing trend of BYOD. According to the survey, forty-four percent of surveyed participants see the widespread use of mobile technology as a game-changer. On average, respondents estimated that forty-three percent of all phone calls in enterprise buildings involve mobile phones. Thirty-five percent reported having a Distributed Antenna System (DAS) deployed on site to support the indoor wireless traffic. Cloud services - Moving to the cloud has been described as gracefully giving up control while maintaining accountability. Tools like intelligent infrastructure management provide security and management when the cloud infrastructure is in a remote location, either hosted or in private cloud, and help mitigate some of those risks. 18 July 07 2013 The best approach today is to select an infrastructure that supports your requirements and provides you the most options for the future Forty-four percent of surveyed respondents pointed to cloud services as a game-changer. Seventy-four percent of respondents currently use cloud services of some kind. While twenty-one percent currently rely on cloud technology to run more than half of their applications, by 2017, fifty-two percent believe that more than half of their applications will reside off-site in the cloud. 40Gbe and 100Gbe- Several transceiver Multi-Source Agreements (MSAs) are vying for market dominance and these vary by fiber type, lane speed, the number of lanes, and application distance support. The best approach today is to select an infrastructure that supports your requirements today but more importantly, provides you the most options for the future. This will allow for a cost effective transition to next generation optical technology, regardless of which implementation wins in the marketplace. things I Believe in The big trend to beat is mobility. According to a survey seventyfour percent respondents are currently using cloud of some kind. Automated location-based real-time update capability is paramount to an effective power management implementation Thirty-two percent of respondents indicated that 40GbE and 100GbE would have a significant impact on their future operations, with a majority citing the emergence of laser-optimised multimode. There was also consensus among the respondents as to their installation strategies for future data centers. Sixty-one percent of operators favored a pre-terminated data center solution as opposed to a field-terminated solution. Going forward what trends do you see emerging in the enterprise IT space? How should CIOs gear up to meet these trends? According to our global enterprise survey, the big trend to beat is mobility. With more people carrying more than one device and expecting connectivity everywhere they go, it seems that enterprise IT has to prepare for the amount of voice and data streaming in and out of the facility. Best of Applying advanced analytics in consumer firms Consumer-facing companies must be able to gather and manage the right data By Peter Breuer, Jessica Moulton, and Robert Turtle R 20 July 07 2013 etailers and consumer-packaged-goods (CPG) companies have long had access to vast amounts of transaction data: every day, companies capture information about every SKU sold to every customer at every store. In addition, companies regularly use sophisticated market-research techniques to answer a variety of questions: what products should we develop and sell? How much is the customer willing to pay? Which products Illustration by anil t Breed a n a l y t i c s | B EST OF B REED should we discount and when? Which marketing vehicles will allow us to reach the most customers? Adding to the reams of data and market research already at their fingertips, consumer companies now have access to socialmedia information and other large data sets known as big data. In this article, we discuss the potential of big data and advanced analytics for the retail and CPG industries and examine what it takes to turn this potential into actual value. Immense possibilities The combination of big data and advanced analytics offers retail and CPG companies countless opportunities across the value chain. In portfolio strategy and product development, for example, companies can get a more detailed understanding of consumer needs and attitudes and more precisely identify consumer segments, improving their ability to target the highest-value opportunities. They can measure the return on investment (ROI) for marketing spend across both traditional and newer marketing vehicles (such as social media), allowing them to shift marketing dollars to the most effective channels (see sidebar, “Unraveling the Web: A new way to understand the online customer”). Through detailed hourly analysis of in-stock rates by store, retailers can reduce out-of-stocks, provide a better shopping experience for consumers, and boost sales for both themselves and their CPG partners. Big data and advanced analytics allow companies to make better, faster decisions in their day-to-day business and deliver improved performance. A European CPG company, for instance, revolutionized its retailer-specific assortments and planograms: by applying advanced analytics to consumer data, it was able to determine which SKUs were selling well in which retail formats and which SKUs to swap in and out to best meet consumer preferences. It is now seeing 10 percent sales growth in a low-growth category. And the potential impact isn’t just in sales: recent research by McKinsey and Massachusetts Institute of Technology shows that companies that inject big data and analytics into their operations outperform their peers by five percent in productivity and six percent in profitability. Making it happen: Three ingredients groups—in this case, customer loyalty, marketing, and merchandising finance—it could identify subsegments among its loyal customers and figure out what types of direct mail resulted in the most incremental profit for each segment. Once the retailer understood what data it needed, it developed a focused process to extract and clean the needed data and bring it together for this new purpose. We find that such a targeted approach often leads to success and supports quick wins. Managing the data Define data-governance standards. Given As they embark on a data-and-analytics the vast amount of data that retail and CPG journey, companies should take a “decicompanies collect and manage, ensursion back” approach that begins by crisply ing the accuracy and reliability of data is answering one question: which decisions a constant challenge. For instance, proddo we want to improve? A retailer may, for uct information—package sizes, product instance, seek to make better decisions descriptions, or even the category in which about its promotional spending. Here, the a product belongs—isn’t always up-to-date range of decisions can be quite broad: do in retailers’ databases. If the data are needed we want to optimise the design (number of for analysis, the old saying “garbage in, garpages, number of products on each page) bage out” still largely applies. of our promotional leaflets and circulars? The increasing value of analysis-ready Do we want to reassess the distribution data mandates a mind-set shift: in particuof our circulars—which newspapers they lar, a shift from simply collecting the most should be inserted into, which addresses easily available information and storing it as they should be delivered to, and so on? Do is, to establishing rigorous data-governance we want to rethink the product mix in our standards that call for clean, consistent data circulars? Each decision requires different to be collected and stored in an analysisdata and analyses. Once they’ve determined ready state. The approach can be quite simithe specific business decisions they want to lar to the way retailers manage and mainimprove, consumer companies must coltain stores: they have processes and checks lect and manage the data needed to conduct in place to ensure that store assets are propinsightful analysis. In our experience, this erly cleaned, well designed, and periodically entails three deliberate actions: creatively refurbished to maintain their useful life. In sourcing data, defining data-governance the same way, data-governance standards standards, and establishing an IT infrastrucshould define what data will be collected, ture. Creatively source data. Often, we find the processes for checking and maintainthat a consumer company has the data it ing the data, and who in the organisation is needs to unlock business improvement, but responsible for managing each data set. the data reside in different business groups Establish the IT infrastructure. Compawithin the company. In effect, organisationnies need the IT infrastructure to store, easal silos “hide” data from the analysts who ily access, combine, and analyse can put it to work. large data sets. Setting up the For example, a specialty IT infrastructure requires close retailer sought to redesign the collaboration among business promotional mailings it sends managers, analysts, and IT staff to the more than five million to ensure that data storage is members of its loyalty-card prowill be the spending designed in a way that meets gramme. While the programme on platform-as-abusiness needs and technical IT had been successful, revenue service by the year requirements. and profit from loyal custom2016 One large retailer has taken ers was stagnating. The retailer big steps that improve data recognised that by combining accessibility. The retailer recentdata from various functional We have found that fully exploiting data and analytics requires three capabilities. First, companies must be able to choose the right data and manage multiple data sources. Second, they need the capability to build advanced models that turn the data into insights. Third and most critical, management must undertake a transformational-change program so that the insights translate into effective action. $3bn July 07 2013 21 B EST OF B REED | a n a l y t i c s ly announced plans to integrate its five-plus e-commerce Web sites onto one platform and move the corresponding data into a single in-house data repository. Whereas today sourcing of e-commerce data requires coordination across groups and can take several weeks, the new infrastructure will give the retailer’s business leaders instant transparency and access to e-commerce data, accelerating insight generation and business impact. Translating data into insights Managing the data is just the first step. Companies must next make sense of the flood of data—a task that requires sophisticated and sometimes complex analytic models. Two guiding principles can help. First, business users should be involved in the model-building process; they must understand the analytics and ensure that the model yields actionable results. Second, the modeling approach should aim for the least complex model that will deliver the needed insights. The power of these two steps became evident in a CPG company’s efforts to assess its marketing-spend ROI. An external vendor independently built a model that suggested online paid-search ads delivered incredibly high ROI. The CPG company’s marketing executives were surprised but trusted the results, even though they didn’t understand the model. Later, the company’s internal insights group partnered with the marketing function and built its own simplified model. The results were markedly different: this model showed ROI for paid-search ads to be 15 times lower than what the vendor’s model estimated. Further investigation revealed that one of the external company’s analysts, who had no knowledge of the business, had grouped the data erroneously—a mistake that a business practitioner would have easily caught. Moreover, the complexities of the vendor’s model hid the error from view. Turning insights into effective frontline action Gathering the right data and developing transparent models, however, won’t yield impact unless companies can also turn data-driven insights into effective action on the front line. Companies must define new processes in a way that managers and frontline workers can readily understand and adopt. When a large CPG manufacturer implemented a new demand-forecasting system that generated automatic forecasts of each retail customer’s inventory needs, sales managers weren’t told that the new process included shipping of safety stock to every customer. Worried that their customers weren’t receiving adequate stock, sales managers regularly overwrote the automatic forecasts. It took months before they changed their behaviour and trusted the new system. We see great potential for consumer-facing organisations that adopt big data and advanced analytics as a platform for growth. Done right, a data-and-analytics initiative can yield outsize rewards for retailers and CPG companies alike. —The article is published with prior permission from Mckinsey Quarterly. Department of Electronics & IT Ministry of Communications & IT Government of India Department of Science & Technology Ministry of Science and Technology Government of India 11th INDIA KNOWLEDGE SUMMIT 2013 Cyber Era - securing the Future 14th – 15th October, 2013 – Hotel Shangri-La, New Delhi ASSOCHAM India's Apex Chamber for Commerce & Industry was set up in 1920. Today the Chamber is proud to have more than 450,000 Companies as it's esteemed Member which includes many of the global technology companies. ASSOCHAM is privileged to be a Member of the “Cyber Regulation Advisory Committee” set up by Ministry of Communications and IT, and the Joint Working Group (JWG) on Cyber Security set up by the National Security Council Secretariat, Government of India. The ASSOCHAM’s flagship program the Annual INDIA KNOWLEDGE SUMMIT, organized since 1999 has been Addressed in the past by Noble Laureates, as distinguished ‘Key Note Speaker’ including – Dr. Craig Venter, Sir Harry Kroto, Prof. Aaron Ciechanover, Dr. Raj Reddy, Dr. A P J Abdul Kalam, Dr. Kirsty Duncan, Prof. John A Pickett to name a few. This year the 11th INDIA KNOWLEDGE SUMMIT is being organized from 14-15 October, 2013 in Hotel Shangri-La, New Delhi. The Theme for this year’s Summit is “Cyber Era - Securing the Future”. Who should Attend • • • • • • Central Government Officials State Government Officials Police & Paramilitary Departments Enforcement & Investigating Agencies Banks and Financial Institutions Legal Experts • • • • • • • • IT Software Companies IT Hardware Companies BPO/ ITes Telecom and Allied Companies Cyber Security Companies Consultants & Experts Institutes IT Security • • • • • • Professionals System Administrators Database Administrators Data Privacy Specialists Application Support Personnel Human Resources Professionals Operational Technology Auditors Why to attend • • • • • • • • Compliance Officers Corporate Security Professionals Civil Activist Municipal Corporation Utility Companies NDMA Railways Hospitals Airports Petroleum & Natural • • • • • • • • Gas Company Power Generation and Distribution Companies CTOs CIOs CSOs IT Managers Cyber Security Researchers PSUs Scientists Issues to be discussed • Gain an insight into the IT incidents • Understand how nations' premier companies are improving their cyber security • Address your questions to the best experts • Find out how secure you are and what level and form of attack could come in to you • Review your level of security and readiness for penetration • Align your security strategy with critical business and corporate goals • Obtain the latest update on state of art in digital treats in cyber underground • Utilize the full potential of cyber security • Learn how to information awareness can minimize your risk – Stay current on cyber security threats, vulnerabilities and exploits – Cost effective security training and peer networking – Catch up on industry developments and check out vendor displays – Find help for information security issues Technology Partner For details log on: fo rD Developing Cyber Security Standards Sharing of best practices and guidelines. Incident response mechanism. Proactive threat & vulnerability management. ☞ Improving the Security of the Nation's Critical Infrastructure Information sharing between Government and Private Bodies. Development of Cyber Security Framework. Provision of necessary budgetary support by the Government. • • • ☞ • • • Improving Public- Private Information Sharing and Information Security Capacity Building in the Area of Cyber Crime and Cyber Forensics. Bringing innovation through R & D. Strengthening Telecom Security. Research & Content Partner ☞ • • ☞ • • • ☞ • • • • Ensuring Privacy & Civil Liberty Protection Compliance driven focus. Adaptation of Cyber Security Policy. Collaborative and Cross-Cutting Approaches to Cyber Security Capacity building in the area of expertise and Judiciary. More power to sectoral CERTs. Establishment of cyber range to test cyber readiness. Staying Safe Online & Mobile Security Beware of unknown communication. Installation of regular updates. Sharing/storing of less personal information. Strong password protection. Supported By ea r r nt Ce e ☞ • • • ch Knowledge Partner • • cy igit al Economy Poli s Re www.assocham.org www.facebook.com/aiks2013 For further information please contact: Ajay Sharma Senior Director M: 9899188488 E: [email protected] Varun Aggarwal Joint Director M: 9910613815 E: [email protected] Sahil Goswami Executive M: 9871962311 E: [email protected] Himanshu Rewaria Executive M: 9654251077 E: [email protected] THE ASSOCIATED CHAMBERS OF COMMERCE AND INDUSTRY OF INDIA 5, Sardar Patel Marg, ChankyaPuri, New Delhi-110021 • Tel: +91-11-46550555 (Hunting Line) • Fax: +91-11-23017008/9 Stop being consumed by where you are... ...focus instead on where you want to be. Are you at that stage in your career... when you start looking for something more. It could be a new direction, fresh focus or the next mountain to climb. You’ve already come a long way, but it’s time to aim for the top - the pinnacle. But scaling the next mountain is a big stretch. You need new skills. You require new perspectives. You want to be a stronger leader. The Pinnacle Programme will help you do all this - and more. www.theleadershipinstitute.in 9.9 Mediaworx, B-118, Sector 2, Noida – 201 301, India Tel: +91 120 4010999 By Akhilesh Shukla design by pradeep gnair Illustration by Manav Sachdev pay-per-use In today's era of pay-per-use, are longstanding relationships between CIOs and traditional IT vendors in for a change? T he way IT is deployed by organisations has changed. Now, IT is used more to enhance the business of the firm rather than vendors selling hardware as mere boxes. Today, vendors are not only responsible for timely delivery and implementation of the project but also act as a strategic partners who are responsible for the project to be successful. The relationship between the vendor and the client has matured over the years. C O V E R S T O R Y | p a y- p er - u se 1/14 #REASON TO ATTEND THE EVENT changing phase INTRODUCING IDEAS AWARDS Celebrate ideas that transform business the vendor-client realtionship is witnessing a welcome change with the vendor willingly becoming a strategic partner for the CIO and bringing out innovative ways to grow business R ecently, technology major IBM announced that the company has provided Jet Airways, one of the leading airlines in the country, a comprehensive solution for customer contact centre operations. The solution included improved analytics capabilities as well as an IT infrastructure upgradation. Under this agreement, IBM will provide contact center and back office services for the airline’s 11 lines of business covering its domestic and international reservations, Jet Privilege programme, cargo, re-issues, refunds and helpdesk services. The solution not only includes implementation of an Interactive Voice Response (IVR) system to improve “vendors are no longer responsible for implementation of projects, but also meeting the business needs of the company“ –Baskar Raj, CIO, FIS Global 28 July 07 2013 p a y- p e r - u s e | C O V ER S T O R y 2/14 #REASON TO ATTEND THE EVENT “Patiently planning for business eventualities is very important for a CIO“ ment, cargo management, customer relationship information system, aircraft maintenance and operational systems, baggage reconciliation systems and sales force automation. In simple terms, it mean that IBM is providing strong technology backup to the airline. It would not be possible for Jet Airlines to strengthen their leadership position in the Indian air space without IBM being a partner. This example clearly shows the evolution of CIO-vendor relationship. Partnership helps CIOs have realised that strategic partnership with few large vendors can help them in improving business. But this will only happen when a vendor is willing to look beyond the conventional ways of doing business. They have to work together, cocreate products and solutions for mutual and beneficial long-term relationship. This trend is slowly and gradually picking up in India. We often hear about such deals, but it is more often between a large enterprises and a large vendor rather than medium or small enterprises getting involved into it. “The client vendor relationship has matured over the years. The reason being today, organisations are July 07 2013 29 IS YOUR IDEA THERE? service levels but also advanced analytics technologies to provide increased revenue through insights gained while managing the contact centre. Jet Airways and JetKonnect together have over 25 percent of the domestic market share and international operations across 20 destinations. Jet Airways wanted to streamline its operations and bring in technology to increase its flexibility and scalability and gain competitive advantage. IBM will also restructure Jet Airways' existing contact centre personnel. With the new system in place, Jet Airways is expecting a revenue increase of Rs 20 crore, besides substantial cost savings. The IBM- Jet Airways deal highlights the changing relationship of a vendor and a client. IBM is not just a vendor to Jet-Airways, but a strategic partner. Both are working together for more than three years now where in IBM provides a host of services to Jet Airways, including data centre operations, end-user services, central helpdesk, network management services, server storage operation, and security services. In addition, IBM is responsible for application management services for the carrier including ERP, flight operations, revenue management, roster and crew manage- Unveiling of Wall of Ideas –Umesh Mehta, CIO, Jubilant C O V E R S T O R Y | p a y- p er - u se 3/14 #REASON FIND OUT WHY? We refuse to give you a printed agenda this year TO ATTEND THE EVENT “Price of course is a very important thing but that is not the only thing. We look for vendors having strong credentials“ –Manorajan Kumar, CIO Kanoria Chemicals deploying technology solutions and applications, to support businesses, rather than only upgrading hardware. For creating such solutions and applications a vendor needs to sit with the client to understand the nature of business and requirements. In such scenarios, the relationship is bound to change. They are no longer responsible for implementation of projects, but also meeting the business needs of the company. This means that now we can treat them as our strategic business partner,” says Bhaskar Raj, CIO, FIS Global. Raj, while finalising a vendor, looks for long-term relationships. He prefers to have at least a threeyears vision while working with a vendor. “Information technology is dynamic. We do not know how it would change after three years. But a threeyears vision is must for working with a vendor. Otherwise I find it not worth considering,” he feels. Cloud Computing Every new technology has to battle its way out among the existing technologies in the market. CIOs, initially, were skeptical about adopting these new technologies. They look for case studies, testimonials before taking the risk of implementing it 30 July 07 2013 in the organisation. Similarly, cloud computing has had its own share of battle, primarily due to a number of potentially damaging misconceptions. One of the key concerns for the CIOs is that cloud services have less secure environment built-in compared to any traditional solutions available in the market. Due to security reasons, CIOs, while selecting a vendor for their organisations, take extra precautionary measures. Such things have taken the relationship between the vendor and the client to a different level. The conversation begins largely with the CIOs not trusting the vendor. In many cases organisations alter selection process for cloud vendor. They crosscheck, verify and meet numerous vendors before taking the final decision. Vendor-client trust, like any business relationship, is crucial for security and performance of any product and services, especially on the cloud. However, some of the CIOs agree that there is no need to to reinvent the wheel. “Patiently planning for business eventualities and proper division of responsibility between both the parties will result in required accountability to help successful implementation of any cloud-based solution” says Umesh Mehta, CIO-India, Jubilant Life Science. p a y- p e r - u s e | C O V ER S T O R y E-Procurement In this era when people network socially online, the procurement process has also gone online. Gone or the days where IT vendor had to create a good image with the CIO or someone within the IT team to know the purchasing requirements of the company. Large organisations have already created a portal or developed an application for the procurement process of the organisation. They have a vendor selection process in which they formally authenticate the vendor to do business with the organisation. Once done, these vendors have access to the applications or vendor portal where they get to know about the requirements of the organisation. They can bid or re-bid for any project. “The entire process is open for everyone and its quite transparent also. A vendor can see what other vendors have quoted as their price and can think of offering better prices. It saves a lot of time for us and helps the vendors too,” says Manorajan Kumar, CIO Kanoria Chemicals. “Price of course is a very important thing but that is not the only thing. We look for vendors who have strong credentials and his work experience in that particular domain. We can not afford to risk the entire implementation just to save some money,” he affirms. Start-ups and Tier II vendors As the cost of currency is increasing, following the global economy scenario, CIOs are willing to look beyond established multinational vendors having global presence. Besides, some of the start-ups and Tier II vendors are offering innovating and cost-effective solutions. “We have realised that even the bigger vendors outsource a part of the product or solution from Tier II and start up companies. So we have decided to out-source some of the small budget projects to these companies. Once we started trusting them, we can consider them for big projects as well,” says Kumar. These vendors are willing to go that extra mile to please their clients or the CIOs. This again puts pressure on the larger vendors, who generally prefer to stick to the rule books or the SLAs. Now, even they have to look beyond the agreed SLAs. The vendor-client relationship has matured over the last few years. But still it has a long way to go. Some of the vendors are not willing to look beyond their targets and conventianal way of functioning. They promise everything on the earth when it comes to selling the product, but often such promises fizzle out post-implementation. Issues of not delivering the product on time are often reported. On his part, a CIO and his organisation have to speak in the same languages so that the vendor is not confused. They have to clearly spell out the requirements and expectations from an implementation. The road ahead for a CIO and his vendor is to work together and co-create product and solutions for mutual benefits. July 07 2013 31 4/14 #REASON TO ATTEND THE EVENT We will help you decipher the cryptic DSLR Similarly, models like pay-per-use have altered the age-old relationship between the vendors and the enterprises. Vendors know that price strategy plays a key role in determining success of Software-as-a-Service (SaaS). One of the primary category is pay-per-use, where each time a user uses the software, vendor charges an agreed amount. This is a very different approach from fixed pricing. Such model often brings the CIOs and the vendor on negotiating table. The frequency of such meetings are usually on a monthly basis. Besides, the vendor has to justify price according to the frequency of usage of the product. If the product is a valuable piece of software that would be used only once or twice a month by an organisation, than a CIO would prefer to pay less, no matter what the cost of the product is. However, if the product is frequently used, a CIO might prefer to pay a fixed fee. This type of model again changes the vendorCIO relations. Both of them would be profoundly engaged for a longer period of time. The model gives a little bit of edge to the CIO in terms of service delivery and billing, as theoretically he has an option to move to another service provider if things doesn't work to his expectations. However, CIOs still look for longterm engagement with a vendor. Mehta says, “Theoretically it sounds good that we can migrate to any service provider. But it is easier said than done. To migrate from one vendor to another, it is a tedious job and cost to the company. That is why even in pay-per-use model we look for long-term relationships with the vendor.” Jubilant Life Science has subscribed to the pay-per-use model for its ERP solutions. However, some of the CIOs are skeptical in using pay-per-use model, as it is complex to define the usage of the product. Besides, it is unpredictable and uncontrollable. Some of the CIOs find it difficult to prevent an unexpected, unbudgeted bill at the end of the month. PHOTOGRAPHY WORKSHOP! Pay-per-Use C O V E R S T O R Y | p a y- p er - u se 5/14 #REASON YOUR SPOUSE DESERVES THE HASSLE FREE TWO-NIGHTS-THREE-DAYS GETAWAY Bring them along! TO ATTEND THE EVENT Vendors and CIOs are co-creating solutions Arup Roy, Research Director, Gartner, in an interaction with Akhilesh Shukla, discusses the evolution of IT vendor-CIO relationship and what lies ahead How do you see the vendor-CIO relationship changing over the last few years? For the last five to six years, the relationship between the vendor and the CIO has evolved a lot. The relationship is getting much more stronger due the fact that today IT is evolving very fast and growing the business is the primary target of the CIO. Earlier, the consumption was more of 32 July 07 2013 standalone hardware but now the large IT deals are happening for complete IT solutions. Often these solutions are customised and are made to strengthen the business needs of the organisation. As a result, the vendor and the CIO relationship has matured. Vendors are no longer selling only hardware boxes. These days they sit with the client and co-create the solutions to meet the business demands. Payment, in some p a y- p e r - u s e | C O V ER S T O R y How important is it to treat your vendor as a strategic partner? As I said earlier, that the relationship between vendor and partner is not just about deploying a technology or selling a product and meeting the numbers. These days the vendor and the CIO are co-creating and both are learning with each others’ experience. The outcome of the implemention is important for both of them, as the performance of the CIO as well as the payment of vendors often depends on the business outcome of the solutions. The risk involved in the co-creation of the solutions is shared by both the vendor and the client. The outcome is bound to have a affect on both of them, be it positive or negative. It is the organisation that speaks to the client in the same language. These days the vendor and the organisation use a single interface to interact with each other. It reduces the risk of confusion and The price of the contract may be an important consideration, but certainly isn't the only one. What are you thoughts on this issue? In this era of economic uncertainty the cost of currency has increased. Organisations are investing money where they see value and faster (Return on Investment) ROI. So, money still plays a big role. But it would not come until and unless the client sees a value in the investment. This value is often seen in financial terms. Even the payments are made in some of the large IT deals post the business result. If the outcome does not meet the expectations of the client, then it is bound to impact the payment of the vendor. A vendor therefore has to ensure that all the expectation are met. So money plays a key role but it is not the only thing. Do you agree with the statement that CIOs who choose to stick only with large vendor often miss out on tremendous opportunities offered by going with smaller to mid-tier players? The large organisations that have a global foot print have a reason to go with the safer vendors. Often their investments are huge and across the globe. So they could not risk and play a gamble with the smaller players. Besides, they need vendors having a global presence, which the Tier-II or start-ups lack. But some of the CIOs have started exploring these Tier-II and start-up organisations. They start with them for smaller product and services. If the results are positive then they started trusting them for bigger implementations as well. Often it helps CIOs to save money and get first-hand experience on some of the innovations. Besides, it helps the Tier-II vendors and start-up companies to grow much faster. How you see the future relationship between the CIO and the vendor evolving over the next few years? The relationship between vendor and clients will continue to improve. The eco system like evolution of pay-per-use and cloud computing will also push the CIO and the vendor closer. They will continue to co-create the products and solutions and soon the distance between them will start shrinking. July 07 2013 33 6/14 #REASON TO ATTEND THE EVENT Ready to step into the shoes of a CEO/CMO/CFO? Do most of the organisations have a proper vendor management process in place? Tell us how a robust vendor management system helps an organisation? Globally we see that large organisations do have a vendor management team and process in place. However, in India we have started seeing the vendor selection and purchase process being put in place. Earlier, there was no separate vendor management team. The procurement team did all the purchasing and the selection the vendors. Not having a proper management team in place causes misuse of resources in the organisation. A client has to do micro management as well. Often the internal highlypaid employees are just taking care of the third party infrastructure and resources. Even some of the clients are involved in the hiring and appraisal process of the vendor resources. This is besides traning them as well. Both the client and vendors have to cover a lot of distance, as far as vendor management is concerned in India. helps in improving the outcome. Here it is very imporant to have SLAs properly defined. The CIO should take inputs for all the departments before finalising the SLAs. THE ROLE-PLAY CHALLENGE - STRATEGYM! of the large IT deals are calculated, based on the business out come. Vendors act as strategic business partners of the client and are responsible for the business outcome as well. However, this relationship has problems as well. The CIO often do not like to take the complete ownership of the deployment. They involve their management in the process. Even the SLAs are not well defined. Some of the CIOs do not link the solutions deployed with the business outcome which often leads to conflicts. TECH FOR GOVERNANCE 7/14 #REASON Is Traditional Security Enough? Organisations should look for a service that operates a global threat intelligence facility 34 July 07 2013 image by photos.com JOIN US FOR IDEAS CAFÉ Solving problems by talking! TO ATTEND THE EVENT S ec u r i t y | T E C H F O R G O V E R N A N C E 8/14 #REASON Attacks and malware are skyrocketing. Security threats TO ATTEND THE EVENT have become increasingly complex, sophisticated and targeted, conducted over multiple threat vectors in combination—and no organisation is immune. The AV-TEST Institute states that it now registers more than 200,000 new malicious programmes every day, with almost 100 million malicious programmes seen in 2012. The three vectors for malware entry into an organisation are email, web and endpoint. As traditional attack methods leveraging just one vector in isolation, such as emails with malicious attachments, have lost their effectiveness considerably, attackers have been forced to change tactics. Today, they are finding it more effective to use an exploit that blends email and web threat vectors. The goal is to proactively prevent threats and not play catch up to attackers. Consider a variety of security controls that include email, web and endpoint security solutions to be used in combination as one unified system in order to be able to defend against blended threats. The unified system should provide one centralised management console for administering and managing the security solutions, with one set of security policies enforced across all components. This will ensure that security is comprehensively enforced across email, web and endpoint security controls so that there are no gaps in protection. One further factor that organisations need to consider is the need to develop increasingly complex security policies to take into account the growing burden of corporate governance and regulatory requirements that demand that sensitive corporate data is accessed, processed and stored in a secure manner. Those policies need to be consistently applied and enforced across an ever wider range and number of computing devices and operating platforms to ensure the protection is uniformly applied. Having a centralised security console that automates reporting and simplifies policies will save IT teams time and the headache of dealing with compliance reporting and audits. It ultimately frees up needed time and resource which can be spent on being more proactive on security measures opposed to reactive when something bad happens. Explore cloud-based options for flexibility. One of the shortcomings of traditional security controls is that they were largely designed to protect on-premise users and applications. Organisations now wish to support the productivity gains and flexibility to work from anywhere that mobile technologies enable, yet few traditional security controls provided support for users accessing resources via mobile devices. By placing security controls into the cloud, access is afforded for all users, wherever they are, whenever they want and from whatever device they wish to use to connect to the resources that they require to use. This makes it essential that the system chosen provides support for a wide range of devices and July 07 2013 35 At the CEO Debate Integrated multi-layered security approach Don’t let compliance be your burden. YOU QUESTION… THEY ANSWER - THE SENIOR LEADERS OF TECHNOLOGY COMPANIES COME TOGETHER TO ANSWER YOUR QUESTIONS… Relying on traditional security measures to catch the bad guy in action or prevent being the victim of a breach doesn’t cut it in today’s threat landscape, and IT teams don’t have the time and resources to address each threat vector in isolation, nor should they have to. Integration, automation and flexibility are today’s security commandments maximising resource and workforce efficiency and effectiveness without worrying the finance department. Consider the following when designing and/or implementing your new take a security measures at work. T E C H F O R G O V E R N A N C E | S ec u r i t y 9/14 #REASON PARTICIPATE IN THE GREAT IDEAS CONTEST Innovate around great solutions and win prizes TO ATTEND THE EVENT regarding the latest threats and malicious operating systems, going beyond websites from sources world- wide, includthe traditional focus on Windows ing from their own customers and specialoperating systems. Additionally, ised sources. although traditional reactive antiAs new threats are encountered they can malware controls still have their place in guarding against known will be the gorwth of be blocked before they reach customers and, as countermeasures are developed, threats, cloud-based services can worldwide security these can be sent out to all customers of provide a higher level of proactive market in 2013 the service automatically as soon as they defense by providing protection are available. against new so-called zero day threats and advanced threats that use blended attack mechanisms and vectors of attack. — This article is printed with prior permission from Organisations should look for a service that www.infosecisland.com. For more features and opinions operates a global threat intelligence facility coveron information security and risk management, please ing both web and email security, collecting feeds refer to Infosec Island. 9% Reality Check Disclosures of cybersecurity breaches are constant and IP stolen is staggering W e are connecting digital intelligence to our homes, businesses, critical infrastructure and national defense at such staggering rates that we had to come up with methods of collecting "big data." Individuals now have the ability to access terabytes of information, millions of apps and thousands of devices that have the potential of activating critical processes at the touch of a screen. Security has been a continual afterthought even in areas as sensitive as our power grid. Even when security is responsibly deployed, breaches still happen, disclosing the weaknesses of current security solutions. There is no one-size-fits-all in cyber solutions. Instead, the best of the pieces are assembled to achieve the best possible security. Here are some good pieces of the security puzzle that when put together, offer resolution to the big problems faced today in cyberattacks. Securing the End Points Whether you want to secure your private conversations or a corporate database, you must first 36 July 07 2013 have a way to authenticate the human or machine initiating action. Sadly, this needs a lot of work. Fortunately, there is a lot of available technology to choose from. With the password being just about dead, companies are reaching for other ways to effectively authenticate and validate this all-important initial process: access. From biometric human authentication to encrypted nano-sensors offering machine location-based identifiers, we have the technologies to securely authenticate the start of just about anything. With the computing power and popularity of BYOD, the smart phone may be the go-to personal control device that will multiply security access privileges under a single authentication. We are now just beginning to deploy apps and chip sets supporting these authentication capabilities. When we communicate to a machine, the security beginning and end point is not a port or cable connected to some device. The points are often very complex microchips with coded processes within S ec u r i t y | T E C H F O R G O V E R N A N C E The most common solution of moving secured information over the Internet is through Virtual Private Networks (VPN). A VPN extends a private network across public networks like the Internet by establishing a virtual point-to-point connection through the use of dedicated connections or encryption. These techniques add security to the information flow but are expensive and still have security vulnerabilities. Realizing these costs and the security concerns with VPNs, a team at STTarx developed a method of truly protecting data-at-rest and data-inmotion and also masking transmissions. Their networks are stealthy and impenetrable and messaging is immune to illicit decryption. This technique offers an economic and secure method of passing data through the Internet. Curt Massey, the CEO of STTarx Shield, explains this unique process. "We never accepted the common wisdom that networks must always be vulnerable or that messaging must rely on increasingly complex and cumbersome encryption algorithms that would eventually be broken. We used a fundamentally different approach to solving both issues. Every pen tester for a period of years has walked away scratching their heads due to complete failure to either penetrate our networks or even capture our traffic. Those to whom we have given sample STTarx traffic have been completely unsuccessful in decrypting it. We enable other solutions to focus on protecting the internal network." Securing the Process Today we connect multiple levels of people, applications, software, hardware and networks to our enterprise, control systems and cloud computing. There are so many layers that we are beginning to lose control of what the business process and software logic action is sup- 10/14 #REASON posed to be doing, even though it is secured and authenticated. This is why recent exploit attacks have been directed without detection toward system process software, not just networks and databases. We need a method of real-time viewing, auditing and even blocking multiple simultaneous process actions. Rajeev Bhargava, CEO of Decision-Zone found this same problem when trying to debug software programs which led him to the unique use of graphical anomaly detection as a new method of intrusion detection security. This is how he explains it. "The conventional view of security is primarily aimed at securing an organization’s assets, including facilities, goods, IT infrastructure and information silos. However, the characteristics of the threat environment organisations are exposed to are changing. Whereas in the past solitary intruders sought entry into an organisation's network and facilities and created minor damage; nowadays these attacks originate from highly organised groups and are aimed at obtaining services or money by disrupting or diverting the victim’s normal business operations. Sometimes this is an authorised and authenticated insider. "Processes, by nature, consist of a number of tasks performed by different individuals, usually within different departments," said Bhargava, "making them vulnerable to mistakes, misunderstandings, miscommunications and abuse. A business process consists of a set of logically interrelated tasks, intended to generate an output beneficial to the organisation. A process aims to create higher-value output from lower-value input, at a cost that is lower than the increase in value of the generated product. These processes have extreme value to a company and often are the reason they have a competitive edge. — This article is printed with prior permission from www.infosecisland.com. For more features and opinions on information security and risk management, please refer to Infosec Island. July 07 2013 37 TO ATTEND THE EVENT Join us for the Manganiyar Night Securing Data in Motion The most common solution of moving secured information over the Internet is through Virtual Private Networks THE TRIBES OF RAJASTHAN WILL ENTICE YOU WITH THEIR MESMERIZING MUSIC themselves. These trusted computer chips like BYOD devices can become part of the solution in cybersecurity -- and part of the problem. Don Thompson, CEO of MerlinCryption explains the potential threat of microchip foul play in cybersecurity. "Embedding malicious code or 'back doors' into microchips is a growing trend in espionage," says Thompson, "The rogue chip conspiratorially communicates critical intelligence back to its criminal host. It is paramount to procure only tamper-proof USA-made chips to be used in developing the circuit board, then reinforce the device with robust encryption.” NEXT 11/14 HORIZONS #REASON image by photos.com JEFF SAMPLER, DISHAN KAMDAR, HARVEY KOEPPEL WE HAVE HEARD THEM ALL Get inspired by transformational speakers this year.” TO ATTEND THE EVENT Top IT-enabled Business Trends A look at some pivotal trends that loom large on the top-management agenda of CIOs By Jacques Bughin, Michael Chui, and James Manyika 38 July 07 2013 m a n a g e m ent | N E X T H O R I Z O N S July 07 2013 39 TO ATTEND THE EVENT Be a part of the SIT Innovation Workshop 2% 12/14 #REASON INNOVATE ISRAELI ISHSTYLE! T thing as a service. The creeping automation of hree years ago, we described some informaknowledge work, which affects the fastest-growing tion technology–enabled business trends employee segment worldwide, promises a new that were profoundly altering the business phase of corporate productivity. Finally, up to three landscape. The pace of technology change, billion new consumers, mostly in emerging marinnovation, and business adoption since kets, could soon become fully digital players, thanks then has been stunning. Consider that the world’s chiefly to mobile technologies. Our research sugstock of data is now doubling every 20 months; the gests that the collective economic impact (in the number of Internet-connected devices has reached applications that we examined) of information tech12 billion; and payments by mobile phone are hurnologies underlying these four trends could range tling toward the $1 trillion mark. from $10 trillion to $20 trillion annually in 2025. This progress both reflects the trends we The next three trends will be most familiar to described three years ago and is influencing their digital marketers, but their relevance is expanding shape. The article that follows updates our 2010 list. across the enterprise, starting with customer-experiIn addition to describing how several trends have ence, product, and channel management. The integrown in importance, we have added a few that gration of digital and physical experiences is are rapidly gathering momentum, while removing creating new ways for businesses to interact with those that have entered the mainstream. customers, by using digital information to augment The dramatic pace at which two trends have been individual experiences with products and services. advancing is transforming them into 21st-century Consumer demand is rising for products that are business “antes”: competitive necessities for most if free, intuitive, and radically user oriented. And the not all companies. rapid evolution of IT-enabled commerce is reducing Big data and advanced analytics have swiftly entry barriers and opening new revenue streams to moved from the frontier of our trends to a set of a range of individuals and companies. capabilities that need to be deeply embedded across Finally, consider the extent to which government, functions and operations, enabling managers to education, and health care—which often seem outhave a better basis for understanding markets and side the purview of business leaders—could benefit making business decisions. Meanwhile, social techfrom adopting digital technologies at the same level nologies are becoming a powerful social matrix—a as many industries have. key piece of organisational infrastructure that links Productivity gains could help address the imperaand engages employees, customers, and suppliers tive (created by aging populations) to do more with as never before. less, while technological innovation could improve Implicit in our earlier work, and explicit in this the quality and reach of many services. The embrace update, is a focus on information and communicaof digital technologies by these sectors is thus a trend tion technologies. Other forms of technology are of immense importance to business, which indirectly changing, too, of course, and as we’ve been updating finances many services and would benefit greatly this list, we’ve also been conducting new research on from the rising skills and improved health of citizens the most disruptive technologies of all types. Four everywhere. of the trends described here reflect IT disruptions elaborated in that separate but related research, which encompasses fields as wide-ranging as genomics and Joining the social matrix energy and materials science. Social technologies are much more than a conThe Internet of All Things, the linking of physical sumer phenomenon: they connect many organisaobjects with embedded sensors, is being exploited at tions internally and increasingly reach outside their breakneck pace, simultaneously creatborders. The social matrix also extends ing massive network effects and opporbeyond the cocreation of products and tunities. “The cloud,” with its ability to the organisational networks we examdeliver digital power at low cost and in ined in our 2010 article. Now it has small increments, is not only changing become the environment in which more the profile of corporate IT departments and more business is conducted. Many but also helping to spawn a range of organisations rely on distributed probwill be the growth new business models by shifting the lem solving, tapping the brain power of of global it spending economics of “rent versus buy” tradecustomers and experts from within and in 2013 offs for companies and consumers. The outside the company for breakthrough result is an acceleration of a trend we thinking. Pharmaceutical player identified in 2010: the delivery of anyBoehringer Ingelheim sponsored a N E X T H O R I Z O N S | m a n a g e m ent 13/14 #REASON Let’s get Social VAST NETWORKING OPPORTUNITIES AT THE 14TH ANNUAL CIO&LEADER CONFERENCE TO ATTEND THE EVENT competition on Kaggle (a platform for data-analysis contests) to predict the likelihood that a new drug molecule would cause genetic mutations. The winning team, from among nearly 9,000 competitors, combined experience in insurance, physics, and neuroscience, and its analysis beat existing predictive methods by more than 25 percent. In other research, we have described how searching for information, reading and responding to e-mails, and collaborating with colleagues take up about 60 percent of typical knowledge workers’ time—and how they could become up to 25 percent more productive through the use of social technologies. Global ITservices supplier Atos has pledged to become a “zero e-mail” company by 2014, aiming to boost employee productivity by replacing internal e-mail with a collaborative social-networking platform. Companies also are becoming more porous, able to reach across units speedily and to assemble teams with specialised knowledge. Kraft Foods, for example, has invested in a more powerful socialtechnology platform that supports microblogging, content tagging, and the creation and maintenance of communities of practice (such as pricing experts). Benefits include accelerated knowledge sharing, shorter product-development cycles, and faster competitive response times. Companies still have ample running room, though: just 10 percent of the executives we surveyed last year said their organisations were realising substantial value from the use of social technologies to connect all stakeholders: customers, employees, and business partners. Social features, meanwhile, can become part of any digital communication or transaction—embedded in products, markets, and business systems. Users can “like” things and may soon be able to register what they “want,” facilitating new levels of commercial engagement. Department-store chain Macy’s has used Facebook likes to decide on colors for upcoming apparel lines, while Wal-Mart Stores chooses its weekly toy specials through input from user panels. In broadcasting, Europe’s RTL Group is using social media to create viewer feedback loops for popular shows such as the X Factor. A steady stream of reactions from avid fans allows RTL to fine-tune episode plots. Indeed, our research suggests that when social perceptions and user experiences (both individual and collective) matter in product selection and satisfaction, the potential impact of social technologies on revenue streams can be pronounced.We are starting to see these effects in sectors ranging from automobiles to retailing as innovative companies mine social experiences to shape their products and services. 40 July 07 2013 Competing with ‘big data’ and advanced analytics Three years ago, we described new opportunities to experiment with and segment consumer markets using big data. As with the social matrix, we now see data and analytics as part of a new foundation for competitiveness. Global data volumes—surging from social Web sites, sensors, smartphones, and more—are doubling faster than every two years. The power of analytics is rising while costs are falling. Data visualisation, wireless communications, and cloud infrastructure are extending the power and reach of information. With abundant data from multiple touch points and new analytic tools, companies are getting better and better at customising products and services through the creation of ever-finer consumer microsegments. US-based Acxiom offers clients, from banks to auto companies, profiles of 500 million customers—each profile enriched by more than 1,500 data points gleaned from the analysis of up to 50 trillion transactions. Companies are learning to test and experiment using this type of data. They are borrowing from the pioneering efforts of companies such as Amazon.com or Google, continuously using what’s known as A/B testing not only to improve Web-site designs and experiences but also to raise real-world corporate performance. Many advanced marketing organisations are assembling data from real-time monitoring of blogs, news reports, and Tweets to detect subtle shifts in sentiment that can affect product and pricing strategy. Advanced analytic software allows machines to identify patterns hidden in massive data flows or documents. This machine “intelligence” means that a wider range of knowledge tasks may be automated at lower cost (see the fifth trend, below, for details). And as companies collect more data from operations, they may gain additional new revenue streams by selling sanitised information on spending patterns or physical activities to third parties ranging from economic forecasters to health-care companies. Despite the widespread recognition of big data’s potential, organisational and technological complexities, as well as the desire for perfection, often slow progress. Gaps between leaders and laggards are opening up as the former find new ways to test, learn, organise, and compete. For companies trying to keep pace, developing a big-data plan is becoming a critical new priority—one whose importance our colleagues likened, in a recent article, to the birth of strategic planning 40 years ago. Planning must extend beyond data strategy to encompass needed changes in organisation and culture, the design of analytic and visualisation m a n a g e m ent | N E X T H O R I Z O N S Tiny sensors and actuators, proliferating at astounding rates, are expected to explode in number over the next decade, potentially linking over 50 billion physical entities as costs plummet and networks become more pervasive. What we described as nascent three years ago is fast becoming ubiquitous, which gives managers unimagined possibilities to fine-tune processes and manage operations. Through FedEx’s SenseAware program, for example, customers place a small device the size of a mobile phone into packages. The device includes a global positioning system, as well as sensors to monitor temperature, light, humidity, barometric pressure, and more—critical to some biological products and sensitive electronics. The customer knows continuously not only where a product is but also whether ambient conditions have changed. These new datarich renditions of radio-frequency-identification (RFID) tags have major implications for companies managing complex supply chains. Companies are starting to use such technologies to run—not just monitor—complex operations, so that systems make autonomous decisions based on data the sensors report. Smart networks now use sensors to monitor vehicle flows and reprogram traffic signals accordingly or to confirm whether repairs have been made effectively in electric-power grids. New technologies are leading to what’s known as the “quantified self” movement, allowing people to become highly involved with their health care by using devices that monitor blood pressure and activity—even sleep patterns. Leading-edge ingestible sensors take this approach further, relaying information via smartphones to physicians, thereby providing new opportunities to manage health and disease. Offering anything as a service The buying and selling of services derived from physical products is a business-model shift that’s gaining steam. An attraction for buyers is the opportunity to replace big blocks of capital investment with more flexible and granular operating expenditures. A prominent example of this shift is the embrace of cloud-based IT services. Cosmetics maker Revlon, for example, now operates more — Jacques Bughin is a director in McKinsey’s Brussels office — Michael Chui is a principal with the McKinsey Global Institute (MGI) and is based in the San Francisco office — James Manyika is a director of MGI and is also based in the San Francisco office. — The article is printed with prior permission from McKinsey Quarterly. July 07 2013 41 14/14 #REASON TO ATTEND THE EVENT Welcome to the Fairmont, Jaipur Deploying the Internet of All Things than 500 of its IT applications in a private cloud managed by an external provider. It saved $70 million over two years, and when one data center in Venezuela was hit by a fire, the company was able to shift operations to New Jersey in two hours. Moves like this, which suggest that cloud-delivered IT can be reliable and resilient, create new possibilities for the provision of mission-critical IT through external assets and suppliers. This model is spreading beyond IT as a range of companies test ways to monetize underused assets by transforming them into services, benefitting corporate buyers that can sidestep owning them. Companies with trucking fleets, for instance, are creating new B2B businesses renting out idle vehicles by the day or the hour. And a growing number of companies with excess office space are finding that they can generate revenue by offering space for short-term uses. The Los Angeles Times has rented space to film crews, for example. Cloud-based online services are feeding the trend both by facilitating remote-work patterns that free up space and by connecting that space with organisations which need it. Other companies are seizing opportunities in consumer markets. Online services now allow rentals of everything from designer clothing and handbags to college textbooks. Home Depot rents out products from household tools to trucks. IT that can track usage and bill for services is what makes these models possible. While we and others have written about the importance of cloud-based IT services for some time, the potential impact of this trend is in its early stages. Companies have much to discover about the efficiencies and flexibility possible through reenvisioning their assets, whether that entails shifting from capital ownership to “expensed” services or assembling assets to play in this arena, as Amazon.com has done by offering server capacity to a range of businesses. Moreover, an understanding of what’s most amenable to being delivered as a service is still evolving—as are the attitudes and appetites of buyers. Thus, much of the disruption lies ahead. EXPERIENCE THE BEAUTIFUL MÉLANGE OF COLORS OF RAJASTHAN AND ULTRA-MODERN, LUXURIOUS AMBIENCE OF A SEVEN STAR tools frontline managers can use effectively, and the recruitment of scarce data scientists (which may require creative approaches, such as partnering with universities). Decisions about where corporate capabilities should reside, how external data will be merged with propriety information, and how to instill a culture of data-driven experimentation are becoming major leadership issues. IT MAY BE TIME TO TAKE YOUR HEAD OUT OF THE GROUND. photo credit: getty images 2012 - INDIA IS STILL HOME TO 41% OF THE WORLD'S POOREST. For India to truly change, we need to address this issue. PRADAN is powered by the belief that the best minds in the country need to work at the grassroots to change the face of poverty in India. Their teams have been working with endemically poor communities for 30 years with some amazing results. Their focus is to work with women and tribal communities across the poorest districts of India. They have introduced models, which have helped entire communities find livelihoods and emerge from poverty. They have touched over 1 million people, changing their lives in a range of ways – from ensuring food and livelihood, to creating choice and dignity. They pictured the change. And changed the picture. It may be time to take your head out of the ground. Donate now to help change the picture. For any further information on how you can help, please visit 30.pradan.net or send an email to [email protected]. You could choose to either make a personal donation or join hands with PRADAN as part of your CSR initiatives. PROFESSIONAL ASSISTANCE FOR DEVELOPMENT ACTION picture the change | change the picture 9.9 Media supports PRADAN. N O H O L D S B A R R E D | D an S p r i n g er DOSSIER Company: Responsys Established: 1998 Went Public: 20111 Partners: Adobe, Salesforce. com, CalmSea, IBM Coremetrics, Return Path, etc channel partners: SimpleFeed Velti The era of Relationships In an interaction with CIO&Leader, Dan Springer, Chairman and CEO, Responsys, talks about the importance of relationships and believes companies that succeed will be those who can create and maintain individual relationships at massive scale 46 July 07 2013 D a n S p r i n g e r | N O H O L D S B ARRE D How is the market for SaaS in India? What benefits and challenges do India CIOs see in SaaS? According to Gartner, the public cloud services market in India is expected to grow 36 percent in 2013 to total $443 million, up from $326 million in 2012. Agility, low cost of investment, quick implementation and being cost effective and efficient are some of the primary benefits associated with SaaS. Data security continues to be a primary concern amongst CIOs when it comes to deploying SaaS solutions. The other significant concerns with SaaS are latency issues, total dependency on the internet and integration with system applications. How can Indian enterprise technology decision makers leverage Responsys for enabling growth for their enterprises? Responsys is a leading provider of marketing cloud software and services that enable companies to deliver the right marketing to their customers across the digital channels of email, mobile, social, display and the web. Companies who are typically large enterprises leverage our technology to target their customers with offers and promotions that are highly relevant and personalised. We’ve found that applying an individualised, relationshipbased approach at massive scale drives increased revenue, improved customer engagement and higher long-term customer value for our clients. Our technology platform, called Interact Marketing Cloud, is a platform built for the relationship era of marketing and is architected around the customer. We start by building profiles of customers with rich data. We then help marketers design experiences that unfold over each customer’s lifetime. And finally, out of those individual experiences come personalised messages and offers. Can you share a few examples of how some of your top clients have benefited from associating with you? We help marketers manage their digital relationships and deliver the right marketing to their customers across email, mobile, social, display and the web. By partnering with us, our customers can see increased revenue, improved customer engagement and higher long-term customer value. For example, by working with us to layer display retargeting on top of their email reminder programme, Dollar Thrifty Automotive Group saw a 22 percent increase in revenue and 47x improvement in ROI. By cleaning its email list and creating a strategy with Responsys to reengage its subscribers, EPSON achieved a 25 percent increase in conversions. “We’re seeing incredible enthusiasm and excitement for cloud technology, particularly marketing cloud technology.” What are the top three trends in enterprise technology? The future of enterprise technology is absolutely in the cloud. According to Gartner Research, more than 60 percent of all enterprises will have adopted some form of cloud computing in 2013. We’re seeing incredible enthusiasm and excitement for cloud technology, particularly marketing cloud technology. In fact, we recently reported strong earnings on the backdrop of a rather sluggish quarter for traditional software companies, further indicating that cloud companies are positioned incredibly well. While “big data” is the buzzword, at Responsys we like to talk about the right data. With so much data being collected, it’s important for brands to understand what data is right for them and what data they can actually act on to achieve business goals. We’ve entered the relationship era, where the companies that succeed will be those who can create and maintain individual relationships at massive scale. To do this, they need technology that is architected completely around the customer and gives them the ability to reach millions of customers in personalised and relevant ways. What are Responsys’ plans for the Indian market? As Responsys continues to grow, we’re tapping into all global pools of talent. The office in Bangalore provides Responsys with access to local engineering talent in the region, who contribute to the development and delivery of product innovations for our customers. The reason why Responsys chose Bangalore for our Development Center is because of its proven reputation and huge pool of skilled and technologically savvy workers. At the Bangalore Development Center, we have an Engineering team that works on core product development, from technical design to implementation and delivery. Many key product features included in our releases are developed out of the office in Bangalore. We also have a Quality Assurance team and a Responsys Operations Center (Product Application, Network Operations, System Operations), which was established in 2012 and helps manage Responsys’s Global Data Centers and various other infrastructure management activities. In 2013, we plan to add product management functionality to the team in Bangalore so that we can improve capabilities across the product development cycle. July 07 2013 47 VIEWPOINT Steve Duplessie | [email protected] The Amazon Effect....Continued In this case I don’t believe Cisco can ultimately keep SDN from happening universally, but it sure as heck is going to slow down that train for a while. Eventually, if it does see the light of day as I suspect it will, Cisco’s core networking boondoggle will come under heavy fire - and it will be forced to adapt its business model in that sector, or abandon it - eventually. This article was posted on Computerworld this AM (by me). It made me think about other crazy business models that aren’t overtly logical - and how our behavior makes them take shape. Do you know how LinkedIn makes money? Headhunters. Because you are good enough to not only tell all the world about yourself, your experience, your job, your likes and hates, etc., you make it easier for headhunters to search the site to find you if you fit the bill for an opening. Do you think that the sudden “endorsements” feature of the site is REALLY about having people 48 July 07 2013 endorse you? No, it’s about having people tell the headhunters what other attributes they can tag you with and thus search you for. Headhunters pay for this function. It may make you feel nifty that Joan in accounting endorsed you for being a “snappy dresser” but in reality what is happening is your profile is being fine tuned such that the search function of the headhunter can be equally fine tuned. It’s brilliant. Now, having said that, there are often unintended consequences of a successful business model. In this example, how long will it be before HR departments bypass the headhunters altogether and simply do this for themselves? The richer the data set on you the person, the easier it is to hone in on what HR is looking for in an employee. As a more interesting example of how existing industry victors always react to new or pending movements, read what Big Switch’s CEO wrote today here http:// bigswitch.com/blog/2013/06/05/ illusratuib by raj verma I don’t believe Cisco can ultimately keep SDN from happening universally About the author: Steve Duplessie is the founder of and Senior Analyst at the Enterprise Strategy Group. Recognised worldwide as the leading independent authority on enterprise storage, Steve has also consistently been ranked as one of the most influential IT analysts. You can track Steve’s blog at http://www. thebiggertruth.com big-switch-steps-down-from-opendaylight-platinum-status regarding getting out of the open source SDN movement it essentially FOUNDED because Cisco has taken control. It shows the awesome power of the incumbent to derail many technology-led transformations that have the ability to disrupt the money flow. In this case I don’t believe Cisco can ultimately keep SDN from happening universally, but it sure as heck is going to slow down that train for a while. Eventually, if it does see the light of day as I suspect it will, Cisco’s core networking boondoggle will come under heavy fire - and it will be forced to adapt its business model in that sector, or abandon it eventually. In the meantime, it will keep pushing off the market.