SAP is the Latest AP Vendor to Highlight New App Development Tools Approach

Charlotte Dunlap

Charlotte Dunlap

Summary Bullets:

• SAP joins the steady stream of next-gen app development framework news via SAP Web IDE/SAPUI5

• SAP could better outline the line-of-business user’s new role in app development by emphasizing its framework’s codeless abilities

SAP is the latest among app platform vendors to highlight its app development framework approach to simplify mobile app development. During this week’s SAP TechEd && d-code developer conference and amidst all the hoopla around the newest version of SAP HANA, some mobile app development updates did surface. SAP demonstrated the simplified tools behind Web IDE (formerly SAP River RDE) coupled with the SAPUI5 framework, and the ability to push codeless development using Fiori’s drag and drop components. (Note, OpenUI5 is the open source version which provides capabilities that export to Apache Cordova). However, SAP seemed to miss the opportunity to target the IDE environment to a newfound enterprise audience that includes business users.

Read more of this post

Amazon Web Services Fires Up Its New Directory Service, Taking Aim at the Enterprise – and Microsoft

Amy Larsen DeCarlo

Amy Larsen DeCarlo

Summary Bullets:

  • AWS’ new Directory Service promises central IT a single system to authenticate users to both cloud-based and on-premises applications.
  • By integrating its Directory Service with Microsoft Active Directory, AWS makes its authentication solution a practical unified option for some heavy users of its cloud, but it is unlikely to supplant Microsoft anytime soon and its pricing model is flawed.

In a bit of a role reversal, Amazon Web Services is taking a direct shot at rival Microsoft in its pursuit of corporate clients. AWS is hoping that its new Directory Service will sweeten the appeal of its cloud to IT executives who have been put off by the complexity of post-cloud migration application management challenges. Specifically, AWS is playing up the fact that by working with Microsoft Active Directory, the company can offer business and government customers a unified mechanism via its AD Connector to authenticate users, add or move computer systems, and facilitate connections to printers and other enterprise resources both in the cloud and on-premises. The solution looks like an elegant one, but a complex pricing model could throw a wrench in the works. Read more of this post

The Old Guard: Out of the Frying Pan and into the Frying Pan

Steven Hill

Steven Hill

Summary Bullets:

  • The decision for HP to split into separate consumer and enterprise companies is long overdue, and done correctly it will allow both siblings to be more responsive to their respective markets.
  • By shedding low-margin business units IBM is doing the right things to allow them to continue as innovators without bogging themselves down with manufacturing considerations.

No other industry moves as fast as IT, and every vendor faces the challenge of evolving to remain current with the changing nature of this business. But the challenges for old-school industry stalwarts like IBM and HP are a little different, in part because they’re still simply perceived as “old-school” (irony intended), plus they have a legacy of products that they must continue to sell and support. Does this mean I give them a pass on everything they do? Not on your life – but I certainly admire the commitment it takes to recognize their own weaknesses and make the tough choices. Read more of this post

Big Surprise: A New Study Shows the Cost of Cyber Crime is Going Up

Paula Musich

Paula Musich

Summary Bullets:

  • With the cost of cyber crime going up along with the amount of time it takes to contain an attack, organizations should rethink their security spending priorities to focus more on incident detection and response.
  • Assessing your security posture and making appropriate adjustments can help lower cyber crime costs.

The 2014 Global Cost of Cyber Crime Report came out this week, and the news is not good. But that shouldn’t be a surprise, given that about once a week now there is yet another headline announcing the latest big breach. And they seem to get bigger: 40 million customers affected in the Target breach in late 2013, 56 million in the Home Depot breach in mid-2014. The study, conducted by Ponemon Institute and sponsored by HP Enterprise Security, found that the annual cost of cybercrime increased nearly 100% over the five years it has been conducted. The study looked at 257 large companies (with 1,000 or more endpoints) in seven countries, and it found that the average annual cost of a breach is $7.6 million, with a range of between $0.5 million up to $60.5 million. But what’s interesting is that the cost of cybercrime is higher for U.S. companies. A benchmark sample of U.S. companies found that the average cost per organization now stands at $12.7 million. Russian companies were added to the study this year, and they incurred the least cost – $3.3 million on average. Read more of this post

The Desktop is the New Mobile…or at Least it Should be

Brad Shimmin

Brad Shimmin

Summary Bullets:

• The ideal of a mobile-driven enterprise again dominated the conversation at this week’s Salesforce.com user conference with native iOS apps leading the charge.

• But wait – isn’t the good ol’ desktop browser in truth our most mobile, most consistent development mobile platform?

The ideal of a mobile-driven enterprise again dominated keynote and hallway conversations at this week’s Salesforce.com user conference, with iOS leading the charge. The goal of course is to build an engaging user experience using the low-level power that can only come from a fully native client application, written for each of the two dominant mobile platforms – i.e., Google Android and Apple iOS. The trouble of course is which rendition of those dominant platforms are we talking about? With iOS, we have a handful, thanks to its closed nature. In contrast, Android’s open nature has spawned more than 18,000 distinct Android devices currently running one or another of the many versions of Android itself (according to a recent Open Signal research report).

Read more of this post

Verizon – Striving to Enhance Its Edge in ICT Solutions

ITCB-HarishTaoriSummary Bullets:

  • Verizon has brought a management team from SIs and IT hardware/software vendors on board to help expedite its transformation to an ICT solutions provider.
  • Verizon has refined and enhanced its focus on enterprise cloud, IoT/M2M solutions, enterprise mobility and UcaaS, with security being the core of the network.

Verizon held its annual global analyst event this year in Boston, MA. This blog post summarizes some of the key takeaways and assesses the implications on the industry as well as enterprise buyers. Read more of this post

The Growing Role of Text Analytics in Voice of the Customer Strategies

Ken Landoline

Ken Landoline

Summary Bullets:

  • As customer care organizations recognize the importance of including ‘voice of the customer’ (VoC) tools in their contact center analytics toolboxes, the capture and analysis of unstructured data will grow in importance.
  • Because text analytics provides the ability to include large streams of input from a broad collection of unstructured data sources, it is a very complementary solution to other analysis tools such as speech analytics and post-call customer surveys.

In previous blogs I have commented on the growing importance of collecting, managing and using “big data” effectively to drive proactive efforts designed to improve overall customer service. Today many companies base their customer feedback analysis, or so-called VoC solutions, on a single data collection tool such as post-call surveys or speech analytics. While these tools can provide excellent insights into the customer’s thought process, emotions and purchase intentions, they are often limited by their focus on a single source of information or the fact that customer inputs are confined to a set of multiple choice questions posed to a customer. I am finding that as VoC campaigns mature, companies are beginning to realize that capturing the benefits of big data analytics requires broadening the collection of data to all the data that is available to them. This should include analysis of voice calls, web chats, responses to open-ended questions of customers and notes recorded by contact center agents and other front-line employees. Read more of this post

Mobility Buying Trends Vary by Industry and Size

Kathryn Weldon

Kathryn Weldon

Summary Bullets:

  • Mobility spending plans are trending up, with 73% of companies planning to increase mobility spending over the next 12 months, 25% planning to spend at the same rate, and only 2% planning to spend less.
  • Just how much companies plan to increase mobility budgets, however, varies by company size, region, and industry.

A recent Current Analysis survey, completed in August, asked 650 companies about their use of transformational services including cloud, collaboration, and mobility services. Mobility was not the highest priority for IT budgets, with cloud and IT security services ranking higher in strategic importance on a scale of 1 to 7, with “1” the highest and “7” the lowest ranking. Both big data and data center initiatives ranked about the same as mobility (averaging about a 4 out of 7), but mobility budgets were on the rise; over 70% of the companies surveyed plan to increase their spending over the next 12 months. Read more of this post

Prudence in the Wake of the FCC’s Ruling on Marriott Jamming WiFi

Mike Fratto

Mike Fratto

Summary Bullets:

  • The FCC’s ruling finding Marriott guilty of jamming a conference goer’s hotspot will have a profound impact on companies of all stripes.
  • Until there is clarification on when or if over-the-air WiFi management is acceptable, not using such management techniques would be prudent.

On October 3, the FCC found that Marriott International had jammed a personal hotspot in the Nashville Gaylord Opryland resort convention center. Marriott International countered, saying it “has a strong interest in ensuring that when our guests use our WiFi service, they will be protected from rogue wireless hotspots that can cause degraded service, insidious cyber-attacks and identity theft.” Marriott went on to say that many companies use containment features – on FCC approved devices, no less – to manage airspace, making it a common and accepted practice. Read more of this post

Unified Communications: An Oxymoron That Finally Makes Sense

Tim Banting

Tim Banting

Summary Bullets:

  • Customers must clearly define what they need from a UC solution in terms of easy-to-articulate user personas. This will help them avoid overspending on end-user licensing and meeting the needs of the majority of the business.
  • Customers should also look towards defining attributes that have longevity such as reliability and simplicity. Superfluous features offer little value to end users, especially when they can be at the expense of easy administration and management.

Why has it taken so long for UC to become more focused on areas such as user experience and ease of use? The UC industry has grown into an unwieldy mix of features and functions stemming from vendor acquisitions with little thought towards meeting the needs of the customer. However, this is changing as vendors look to simplify and consolidate their portfolios, recognizing that complying with a long list of features is not the basis for a market-leading solution. Customer approaches to procuring technology have also changed. Companies are involving many areas of the business such as heads of departments, HR directors, and facilities managers, rather than allowing IT departments to make buying decisions in splendid isolation. The new CIO looks towards the strategic intent of platforms: the long-term, long-reaching visions for the business as a whole, inclusive of the things that users are going to need today and are going to need five years from now. Therefore, CIOs and IT departments should know the fundamental and persistent requirements of the business. Read more of this post

Follow

Get every new post delivered to your Inbox.

Join 616 other followers