My colleagues Sophia Vargas, Michael Yamnitsky, and I have just published a new Quick Take report, "HP Announces Innovative Tools That Will Bridge Physical And Digital Worlds." Sophia and Michael have written about 3D printing for CIOs previously, and all three of us are interested in how computing and printing technologies can inform the BT Agenda of technology managers.
Fresh off of the announcement that HP will split into two publicly owned companies, one of those new entities -- HP Inc, the personal computing and printing business -- announced its vision for the future with two new products that help users cross the divide between physical and digital. The Multi-Jet Fusion 3D printer represents HP's long-awaited entry into 3D printing, with disruptively improved speed and quality compared to existing market entries. The sprout desktop PC combines a 3D scanner with a touchscreen monitor, touchscreen display mat, and specialized software that allows users to scan real objects, then manipulate them easily in digital format.
In both cases, a video demonstration helps you to really grok what the product is about.
CNET posted a video tour of the Multi-Jet Fusion 3D printer on Youtube:
EY will release its 2014 information security survey. The survey, published every year focuses on the issues facing information security pros for the coming year. Many of the trends identified in the report are trends that Forrester has seen evolve in the past two years. At the same time these trends are accelerating rate. I am one analyst that is reluctant to paint information security with the Fear, Uncertainty, Doubt (FUD) brush but after reading the EY report I am not sure that FUD is inaccurate. We live in challenging times and the EY report validates this assertion. For example the research shows:
Attack power on the part of adversaries continues to grow. The capabilities and attack power of the adversary are on the rise. Criminal syndicates hacktivists, and state sponsored attackers top EY's respondents list of top attack sources. This is not surprising based on the level of political instability in the world and the financial gains cybercrime can provide criminal groups derive from cybercrime.
Organizations are in battle with outdated weapons and strategies. Business today is using a set of outdated strategies and technologies to combat adversarial groups that are well financed and supported using some of the best offensive technologies available. These groups are well trained in the use of social engineering and technical cyberattack craft.
Organizations continue to see a dissolution of the perimeter. Mobility, outsourcing, cloud computing, and third-party consulting agreements continue to poke holes in companies' perimeters. All of these issues point to the need of a more flexible defense that uses a variety of smart detection and protection methods.
Previously, when CIOs and enterprise architecture professionals talked about “business-to-business” (B2B) commerce in China, most people thought of third-party B2B marketplaces like Alibaba.com or HC360.com. Very few companies use professional B2B solutions internally, instead relying on a combination of order management systems, customer relationship management, and third-party B2B marketplaces to trade with their business partners.
This is going to change. We have observed a few trends in the Chinese market that will become major drivers for the adoption of enterprise B2B solutions. These trends were further validated during the SAP summit last week in Shenzhen.
The legacy application architecture on the market won’t address the challenges of the age of the customer. Most of the companies currently doing business in China’s B2B market are small and medium-size companies with low IT systems maturity — many of them still exchange business information by emailing Excel files. These firms must rely on third-party marketplaces for business collaboration.
On Monday Microsoft officially announced the launch of two Azure Data Centers in Australia. This is big news for the many Australia-based organizations concerned about data sovereignty, as well as those who simply equate on-shore data residency with increased security and control.
Announced as part of TechEd 2014 in Sydney, Microsoft specifically called out Amazon Web Services (AWS) and Google as it’s key competition. In fact, Microsoft has gone to great lengths over the past year plus to consistently position these two companies as the only other viable longterm cloud providers. This is based on three cloud provider capabilities identified by Microsoft as critical: hyper-scale, enterprise-grade, and hybrid.
Overall it’s a good angle for Microsoft. All three players operate at hyper-scale as public cloud providers. All three also offer enterprise-grade services, (although this definition varies based on workload). Most importantly for Microsoft, neither AWS nor Google have a primary focus on enabling hybrid cloud services.
In contrast, all traditional large infrastructure vendors (Fujitsu, HP, IBM, VMware, etc.), system integrators (Dimension Data, NTT, etc.), and telco’s (Telstra) focus squarely on enterprise-grade services and hybrid cloud enablement. Rackspace, IBM and HP also have Australia-based data centers. But all these providers lack hyper-scale.
To bring a recent piece of research on content co-marketing to life, I created a mini-podcast (8 minutes) that includes excerpts from my interviews with marketing leaders. Give it a listen (if the Soundcloud player below doesn't show up or doesn't work for you, you can go straight to the Soundcloud page where it lives, here). Below I've included notes to the podcast, and a full transcript.
As the hub of our offline and online experiences, mobile interactions are a powerful catalyst for contextual marketing. The untapped opportunity in mobile for marketers will be to get an extremely granular understanding of their customers, then anticipate their expectations, and develop unique insights to power better marketing across all channels, not just mobile.
Few Marketers Make The Most Of The New Customer Data Gold Mine
Because smartphones are the hub of our offline and online experiences, they generate valuable insights for contextual data-driven marketing. However, the majority of marketers are not yet ready to exploit the convergence between mobile and big data.
Short Term: Engage Your Customers In Real Time In Their Mobile Moments
Harnessing and extracting actionable insights from this unprecedented wealth of customer data will enable marketers to serve customers in their mobile moments on a channel where they will increasingly spend the majority of their digital time.
Long Term: Power Better Marketing Initiatives Beyond The Mobile Channel
Mobile is more than simply another digital channel. Marketing leaders should combine mobile data with other sources of customer intelligence to get a deeper understanding of customers, anticipate their expectations, and act on these insights to improve all marketing initiatives.
The modern business world echoes with the sound of time-tested business models being shattered by digital upstarts, while the rate of disruption is accelerating. Organizations that will win in this world must hone their ability to deliver high-value experiences, based on high quality software with very short refresh cycles. Customers are driving this shift; every experience raises their expectations and their choices are no longer limited. Like trust, loyalty takes years to build and only a moment to lose. The threat is existential: Organizations need to drive innovation and disrupt their competitors or they will cease to exist.
Yesterday, Proofpoint announced it will acquire social risk and compliance (SRC) vendor Nexgate for approximately $35 million.
The Acquisition Signals The SRC Market Is Maturing
This acquisition points to a budding and rapidly evolving SRC market. With the proliferation of social media, organizations face a slew of emerging regulatory challenges, brand threats, and security vulnerabilities – just look at recent incidents with Cole Haan, Zarbee’s, US Airways, British Gas, among countless others, even including our own US military. While once a niche market helping financial services firms meet FINRA obligations, SRC solutions now offer more than just compliance support, helping organizations better manage today’s wide gamut of social risks with social threat detection, account protection, and risk monitoring.
Proofpoint Has To Prove The Sum Is Greater Than Its Parts
Blogged in collaboration with Samantha Ngo, Senior Research Associate, serving Customer Insights professionals.
Even if you have a clear idea of where you want to end up, the route you take to customer loyalty isn't always straightforward. Outlining a strategic plan helps you understand what you need to do, but a roadmap identifies how, when and with what resources you should tackle each step. Forrester believes there are six components to designing an effective loyalty roadmap:
Time frame: The expected completion of tasks and delivery of results.
Desired outcomes: Key performance indicators (KPIs)that help you benchmark the performance of your advancing strategy based on your maturity.
Strategic themes: A summary of the objectives an organization needs to advance its strategy.
Key steps: The specific tasks — pulled straight from the strategic plan — which an organization must complete to graduate to the next maturity level.
Dependencies: The people, process, and technology required to execute the key steps. Changes to the current approach may require acquiring new team members, implementing formal processes, or buying loyalty technology.
Investment level: Where and when the allocated loyalty budget will be spent.
On October 20 at TechEd, Microsoft quietly slipped in what looks like a potential game-changing announcement in the private/hybrid cloud world when they rolled out Microsoft Cloud Platform System (CPS), an integrated hardware/software system that combines an Azure-consistent on premise cloud with an optimized hardware stack from Dell.