Archive for the ‘research’ Category
Day two of Information On Demand.
Note to self: Bring a hot water boiler next time. Check bathroom for Bengali tiger. Pack a vaporizer. And bring some 5 Hour Energy Drinks.
Oh, and be sure to wear comfortable shoes.
Today, I missed the general session, as I was in my room preparing a presentation and also tuning in to the Apple webcast where CEO Tim Cook announced the new iPad Mini, among other products.
But I did make it down to the Business Analytics keynote, led by IBM Business Analytics general manager Les Rechan, and I was glad I did.
The session started with a motivating video featuring a number of IBM customers on the vanguard of using business analytics to improve their businesses. When Les came onstage, he first highlighted several of IBM’s BA “Champions,” clients from around the globe who were in the “Advanced” category of business analytics.
Les’ birds-eye view centered on the Analytics Quotient, a self-analyzing quiz IBM created and released for customers last year. About 70 percent of the 6,000+ respondents year-to-date indicated they are in the “novice” or “builder” categories, and only 30 percent in the “leader” or “master” categories.
Where IBM can help move the needle is through a variety of resources Les pointed out, including the Analytics Zone, as well as through enablement services and training.
He also highlighted a new book, “5 Keys To Business Analytics Program Success,” a book recently published that features a number of IBM business analytics customer success stories (written by them!).
Michelle Mylot, the Business Analytics team’s chief marketing officer, then came onstage and pointed out that those organizations that integrated analytics into the fabric of their businesses are the ones that drive the most impact.
She highlighted a number of key areas around which IBM’s business analytics team has been increasingly focused, including social network analyis, entity resolution, decision management, and operational analytics.
Doug Barton, whose interview I’m attaching below at the end of this post, came on stage and gave a brilliant presentation that should provide financial analysts everywhere (including CFOs and all their staffs) incentive to run directly to their nearest reseller and purchase Cognos Disclosure Management.
It’s difficult to describe a demo, but basically, Doug presented a scenario where a company was preparing to announce its earnings and, rather than operating from a plethora of disparate spreadsheets, he demonstrated how Cognos Disclosure Management could create a symphony of collaboration as a CFO prepared for a quarterly earnings call.
Isolated spreadsheets and PowerPoints became integrated narratives of the earnings statement, where an update in one part of the report would magically alter the performance graph in another.
Pure financial geek magic. Doug, take it away in our Q&A below.
I’m back from IBM Impact 2012…but my brain is still processing all the information I took in through all the interviews Scott and I conducted for ImpactTV and for all the sessions I attended…and I won’t mention all the cocktails in the evenings where I learned SO much from my industry peers.
I’ll be putting together a recap post of some of the major announcements, and I’ve still yet to transcribe my interview with Walter Isaacson, but first, I wanted to highlight an important new study from IBM on the security front.
For those of you who follow the Turbo blog, you know the issue of security (particularly cybersecurity) is one I take very seriously and that I follow closely, partially because of my longstanding interest in the topic, and partially because I recognize we live in an imperfect world using imperfect technology, created and used by imperfect humans.
But the promise and hope for security, fallible though it may sometimes be, is a worthy aspiration. There are ideas, assets, and often even lives at risk, and the more we move up the stack into an intellectual capital driven global economy, the more there is at stake and the more that will be needed to protect.
So, that’s a long way of saying expect to be hearing even more from me on this important topic.
Chief Security Officers: “We’ve Got Our CEO’s Attention”
To that end, now for the new information security study results. The new IBM study reveals a clear evolution in information security organizations and their leaders, with 25 percent of security chiefs surveyed shifting from a tech focus to one of a more strategic business leadership role.
In this first study of senior security executives, the IBM Center For Applied Insights interviewed more than 130 security leaders globally and discovered three types of leaders based on breach preparedness and overall security maturity.
Representing about a quarter of those interviewed, the “Influencer” senior security executives typically influenced business strategies of their firms and were more confident and prepared than their peers—the “Protectors” and “Responders.”
Overall, all security leaders today are under intense pressure, charged with protecting some of their firm’s most valuable assets – money, customer data, intellectual property and brand.
Nearly two-thirds of Chief Information Security Executives (CISOs) surveyed say their senior executives are paying more attention to security today than they were two years ago, with a series of high-profile hacking and data breaches convincing them of the key role that security has to play in the modern enterprise.
Emerging Security Issues: Mobile And A More Holistic Approach
More than half of respondents cited mobile security as a primary technology concern over the next two years. Nearly two-thirds of respondents expect information security spend to increase over the next two years and of those, 87 percent expect double-digit increases.
Rather than just reactively responding to security incidents, the CISO’s role is shifting more towards intelligent and holistic risk management– from fire-fighting to anticipating and mitigating fires before they start. Several characteristics emerged as notable features among the mature security practices of “Influencers” in a variety of organizations:
- Security seen as a business (versus technology) imperative: One of the chief attributes of a leading organization is having the attention of business leaders and their boards. Security is not an ad hoc topic, but rather a regular part of business discussions and, increasingly, the culture. In fact, 60 percent of the advanced organizations named security as a regular boardroom topic, compared to only 22 percent of the least advanced organizations. These leaders understand the need for more pervasive risk awareness – and are far more focused on enterprise-wide education, collaboration and communications. Forward-thinking security organizations are more likely to establish a security steering committee to encourage systemic approaches to security issues that span legal, business operations, finance, and human resources. Sixty-eight percent of advanced organizations had a risk committee, versus only 26percent in the least advanced group.
- Use of data-driven decision making and measurement: Leading organizations are twice as likely to use metrics to monitor progress, the assessment showed (59 percent v. 26 percent). Tracking user awareness, employee education, the ability to deal with future threats, and the integration of new technologies can help create a risk-aware culture. And automated monitoring of standardized metrics allows CISOs to dedicate more time to focusing on broader, more systemic risks.
- Shared budgetary responsibility with the C-suite: The assessment showed that within most organizations, CIOs typically have control over the information security budget. However, among highly ranked organizations, investment authority lies with business leaders more often. In the most advanced organizations, CEOs were just as likely as CIOs to be steering information security budgets. Lower ranking organizations often lacked a dedicated budget line item altogether, indicating a more tactical, fragmented approach to security. Seventy-one percent of advanced organizations had a dedicated security budget line item compared to 27 percent of the least mature group.
Recommendations to Evolve the Security Role in an Enterprise
To create a more confident and capable security organization, IBM recognizes that security leaders must construct an action plan based on their current capabilities and most pressing needs. The report offers prescriptive advice from its findings on how organizations can move forward based on their current maturity level.
For example, those “Responders” in the earliest stage of security maturity can move beyond their tactical focus by establishing a dedicated security leadership role (like a CISO); assembling a security and risk committee measuring progress; and automating routine security processes to devote more time and resources to security innovation.
About the Assessment
The IBM Center for Applied Insights study, “Finding a strategic voice: Insights from the 2012 IBM Chief Information Security Officer Assessment,” included organizations spanning a broad range of industries and seven countries.
During the first quarter of 2012, the Center conducted double-blind interviews with 138 senior business and IT executives responsible for information security in their enterprises. Nearly 20 percent of the respondents lead information security in enterprises with more than 10,000 employees; 55 percent are in enterprises with 1,000 to 9,999 employees.
Click here to access the full study.
I made it to my first session at IBM Impact 2012 earlier this afternoon here at the Venetian Hotel and Casino in Viva Las Vegas.
The session was a stage setter for the rest of the event, and I just HAD to share what I learned with the rest of the world.
Rahul Sahni, a market development advisor with IBM’s AIM and ICS organizations, shared a market view for the Application and Middleware Infrastructure market, which we know is changing underneath our feet.
Rahul’s presentation was excellent, hitting the highlights of both what is shaping the market, and what’s driving some substantial changes in it.
The Economic Shakeout
He set up his presentation with some macroeconomic data: Japan still coming out of recession, Europe still a wildcard with obvious volatility in the south, the US/Canada holding steady in the 3-4% GDP growth range, and the BRIC’s coming in for a gentle landing, some more softly than others.
There are some potential threats to business growth: In the developing markets, the currency devaluations. In the mature markets, the sovereign debt crises. And yet despite all this volatility, the storage and software infrastructure markets remain strong.
Mr. or Mrs. CIO, Can You Spare A Project?
Why? CIO plans require strong IT infrastructures. If you look at where IT execs are spending, the sweet spots include AIM middleware, where often one or several IT projects will include parts of the AIM middleware portfolio.
Becoming Agile For The Upturn
Of those, projects required Agile/OOD systems, process simplification, industry and/or government compliance, cost reduction mandates, the amount and availability of data, and finally, workforce mobility and productivity are the top six drivers. Ergo, the AIM market is expected to grow some 6% in 2012, and will grow to an estimated $1 billion opportunity in 2013.
Economic conditions are such that key projects have resulted in more demand for small IT initiatives with short term ROI and a need for greater productivity and efficiencies. Pie-in-the-sky projects with long-term prospects for growth have been mostly sidelined. Show me the money, and show it to me soon (meaning, the value that will be returned against the project).
The AIM Market Is Growing…and Changing
Of the three AIM market segments, there’s Application Infrastructure (growing at 8%), Business Process Managment (11%), and Connectivity and Integration (2%). In the first, key growth drivers are the enterprise need to provide transparency, reduce costs, and stay competitive.
For BPM, cloud adoption is now a key driver in BPM as smaller and medium-sized businesses’ processes become more complex and as BPM cloud solutions become more price-aggressive.
For Connectivity and Integration, on-premise integration can now be matched by cloud services in functionality and also aggressive pricing.
So, writ large, the AIM market is growing today because its products can help simplify IT complexity, and help organizations better understand, improve, and make more transparent their business processes.
Organizations also need to make the best use of what they already have in the way of IT investments, and AIM products provide the ability to integrate existing applications, infrastructure, and processes with new development initiatives. This becomes especially critical as we see continued activity in mergers, acquisitions, and divestitures. All to applications, infrastructures and processes have to be integrated somehow.
This Is Not Your Father’s Application And Integration Market
So what about some of these new arenas? Mobile platforms will most definitely continue to grow and evolve, with market data suggesting that enterprise investment in mobile application development will increase at the rate of 20-30 percent per annum in order to meet the rising demand for customer applications.
Customer facing industries rank highest with need to develop mobile enterprises, with virtual guns being held to their heads as they compete for customer-centricity in a growing but younger customer base.
Application Convergence Will Rule The IT World
Also noteworthy, over the next few years, the lines between the Web, hybrid and native apps will blur and mobile enterprise application platforms (MEAPs), portals, other web development approaches will converge into a new generation multichannel application development tool. Those organizations unprepared for this transition may soon find themselves on Application Island with no place to row back to.
Become Your Cloud: The Great Mobile Gold Landrush of 2012
It goes without saying that the cloud is inherently critical to this new environment. Cloud based development is lowering the cost of adoption and increasing the speed with which companies can roll out mobile solutions, and a significant portion of the IT opportunity associated with mobile enterprise initiatives will come not from the purchase of devices and network services — the bright and shiny objects that all your friends and family get so googly-eyed about — but from the associated software, consulting, system integration and security services.
The Future’s So Bright…
I’ll call it “the Great Mobile Gold Rush of 2012” — remember, we’re laying the tracks for a new foundation of computing. The excitement may be in the devices, but a little sleight of hand reveals the ridiculously gargantuan opportunity in the virtual picks and shovels required to make it all work.
To which point Rahul began to close his session, reassuring the business partners in attendance and beyond that this is a market IBM is committed to. WebSphere still makes up a substantial share of IBM Software revenues, and IBM’s 2015 roadmap reveals that 50% of segment profit is expected to come from IBM Software. (And no, we’re not feeling any pressure over here or anything!)
IBM’s four key growth initiatives against that 2015 roadmap reveal two obvious intersects with the AIM market, our growth markets, where much of the middleware layer is being laid for those future railroad tracks, and cloud computing, to which IBM has made massive investments in growth, organic and acquisition, over the past several years.
Throw in a little business analytics technology to help you understand your AIM infrastructure performance, and there’s plenty of upside in the AIM.
My takeaway: The AIM future’s so bright you gotta wear some of those Google augmented reality glasses, but if you can’t see your way through evolving with the convergence of the mobile enterprise and the cloud you’ll have few business processes left to worry about managing!
Anybody following the UEFA Champions League semi-finals this week?
If you’re a soccer fan, it’s been a “must-see” week, with Chelsea outing the world-class Barcelona team on a 2nd half lay-up by Fernando Torres in a match earlier this week, and Real Madrid losing to Bayern Munich last night in a heartbreaking 3-1 penalty shoot-out after Bayern had tied Real-Madrid 3-3 in the aggregate.
Bayern, a four-time champion of the Champions League, will now have reached the final for the second time in three seasons, and will take on Chelsea at Allianz Arena May 19.
Of course, if you’re more interested in the football that takes place on this side of the Atlantic (I happen to enjoy both!), then you’ll want to tune in to ESPN this evening at 8 PM EST for the first round of this year’s NFL draft.
The first five projections? Stanford QB Andrew Luck is expected to go to Indianapolis at #1. #2 is Baylor’s QB Robert Griffin III to the Redskins. #3 is offensive tackle Matt Kalil from USC, expected to head to the Vikings. #4 looks to be Alabama running back Trent Richardson, expected to be picked up by Cleveland. And bringing in the rear is LSU corner back Morris Claiborne, expected to be taken by the Tampa Bay Buccaneers. But this is all pure speculation, so watch tonight’s first round tidings to know for sure.
Meanwhile, IBM made an important announcement today in the healthcare research field. It announced that researchers from The State University of New York (SUNY) at Buffalo are using IBM analytics technology to study more than 2,000 genetic and environmental factors that may contribute to multiple sclerosis (MS) symptoms.
As part of the initiative, Researchers will tap into IBM’s analytics technology to develop algorithms for big data containing genomic datasets to uncover critical factors that speed up disease progression in MS patients. Insights gained from the research will be shared with hundreds of doctors to better tailor individual treatments to slow brain injury, physical disability and cognitive impairments caused by MS.
Using IBM analytics technology, SUNY Buffalo researchers can for the first time explore clinical and patient data to find hidden trends among MS patients by looking at factors such as gender, geography, ethnicity, diet, exercise, sun exposure, and living and working conditions. The big data including medical records, lab results, MRI scans and patient surveys, arrives in various formats and sizes, requiring researchers to spend days making it manageable before they can analyze it.
Using an IBM Netezza analytics appliance with software from IBM business partner, Revolution Analytics, researchers can now analyze all the disparate data in a matter of minutes instead of days, regardless of what type or size it is. The technology automatically consumes and analyzes the data, and makes the results available for further analysis. As a result, researchers can now focus their time on analyzing trends instead of managing data.
MS is a chronic neurological disease for which there is no cure. The disease is believed to be caused by a combination of genetic, environmental, infectious and autoimmune factors making treatment difficult. According to the National Multiple Sclerosis Society, there are approximately 400,000 people in the US with MS, and 200 people are diagnosed every week. Worldwide, MS is estimated to affect more than 2.1 million people.
You can learn more about IBM’s Big Data strategy and portfolio here.