Previously Microsoft tried to discourage customers from using virtual desktop infrastructure (VDI) on top of rival operating systems by applying complex licensing rules involving various TLAs such as RUR, VDA and CSL (which I’m not going to explain here, because they are, thankfully, no longer needed). The USL is far simpler - clear Windows licensing replacing translucent frosted glass, so to speak.
Technology has given your customers choices and digital predators the edge. Ask marketing, they will tell you about the decreasing effectiveness of traditional campaigns. Look at your business strategy and find plans to address new digital competitors that have become serious threats overnight. Across the board, Forrester finds high expectations that emerging technology will help firms stay competitive amidst these changes. But which ones should you pay attention to? Cloud, mobile, social, Read more
My January 2013 report “PaaS Market Dynamics in China, 2012 To 2017,” forecast that China’s platform-as-a-service (PaaS) market would remain in flux until 2015. But now I think it will take even longer for the cloud landscape in China to consolidate and stabilize, for three reasons:
1. The boundary between infrastructure-as-a-service (IaaS) and PaaS is breaking down.
2. Emerging technologies like Docker are having an impact on technology and mindsets.
3. China has emerging startups in both the IaaS and PaaS segments.
The startups mainly focus on differentiating the cloud user experience by automating various layers to deliver unique value to potential adopters of cloud solutions. They include:
QingCloud.Founded in 2012, QingCloud raised US$20 million in Series B funding in January 2014. Its IaaS offerings for public and virtual private cloud include computing (image and instances), network (VxNet, routing, elastic IP, and load balancing), storage (volume and snapshot), database (MySQL-based, master/slave synchronization support with auto-snapshot), security (group policy and SSH key pair login), and management features (web console to deploy, manage, and monitor resources), which are billed on a per-second basis.
My colleagues Sophia Vargas, Michael Yamnitsky, and I have just published a new Quick Take report, "HP Announces Innovative Tools That Will Bridge Physical And Digital Worlds." Sophia and Michael have written about 3D printing for CIOs previously, and all three of us are interested in how computing and printing technologies can inform the BT Agenda of technology managers.
Fresh off of the announcement that HP will split into two publicly owned companies, one of those new entities -- HP Inc, the personal computing and printing business -- announced its vision for the future with two new products that help users cross the divide between physical and digital. The Multi-Jet Fusion 3D printer represents HP's long-awaited entry into 3D printing, with disruptively improved speed and quality compared to existing market entries. The sprout desktop PC combines a 3D scanner with a touchscreen monitor, touchscreen display mat, and specialized software that allows users to scan real objects, then manipulate them easily in digital format.
In both cases, a video demonstration helps you to really grok what the product is about.
CNET posted a video tour of the Multi-Jet Fusion 3D printer on Youtube:
EY has released its Global Information Security Survey 2014. The survey, published every year, focuses on the issues facing information security pros for the coming year. Many of the trends identified in the report are trends that Forrester has seen evolve in the past two years. At the same time, these trends are accelerating. I am one analyst that is reluctant to paint information security with the fear, uncertainty, doubt (FUD) brush, but after reading the EY report I am not sure that FUD is inaccurate. We live in challenging times and the EY report validates this assertion. For example the research shows:
Attack power on the part of adversaries continues to grow. The capabilities and attack power of the adversary are on the rise. Criminal syndicates, hacktivists, and state-sponsored attackers top EY's respondents' list of top attack sources. This is not surprising based on the level of political instability in the world and the financial gains cybercrime can provide criminal groups derived from cybercrime.
Organizations are in battle with outdated weapons and strategies. Business today is using a set of outdated strategies and technologies to combat adversarial groups that are well financed and supported using some of the best offensive technologies available. These groups are well trained in the use of social engineering and technical cyberattack craft.
Organizations continue to see a dissolution of the perimeter. Mobility, outsourcing, cloud computing, and third-party consulting agreements continue to poke holes in companies' perimeters. All of these issues point to the need of a more flexible defense that uses a variety of smart detection and protection methods.
Previously, when CIOs and enterprise architecture professionals talked about “business-to-business” (B2B) commerce in China, most people thought of third-party B2B marketplaces like Alibaba.com or HC360.com. Very few companies use professional B2B solutions internally, instead relying on a combination of order management systems, customer relationship management, and third-party B2B marketplaces to trade with their business partners.
This is going to change. We have observed a few trends in the Chinese market that will become major drivers for the adoption of enterprise B2B solutions. These trends were further validated during the SAP summit last week in Shenzhen.
The legacy application architecture on the market won’t address the challenges of the age of the customer. Most of the companies currently doing business in China’s B2B market are small and medium-size companies with low IT systems maturity — many of them still exchange business information by emailing Excel files. These firms must rely on third-party marketplaces for business collaboration.
On Monday Microsoft officially announced the launch of two Azure Data Centers in Australia. This is big news for the many Australia-based organizations concerned about data sovereignty, as well as those who simply equate on-shore data residency with increased security and control.
Announced as part of TechEd 2014 in Sydney, Microsoft specifically called out Amazon Web Services (AWS) and Google as it’s key competition. In fact, Microsoft has gone to great lengths over the past year plus to consistently position these two companies as the only other viable longterm cloud providers. This is based on three cloud provider capabilities identified by Microsoft as critical: hyper-scale, enterprise-grade, and hybrid.
Overall it’s a good angle for Microsoft. All three players operate at hyper-scale as public cloud providers. All three also offer enterprise-grade services, (although this definition varies based on workload). Most importantly for Microsoft, neither AWS nor Google have a primary focus on enabling hybrid cloud services.
In contrast, all traditional large infrastructure vendors (Fujitsu, HP, IBM, VMware, etc.), system integrators (Dimension Data, NTT, etc.), and telco’s (Telstra) focus squarely on enterprise-grade services and hybrid cloud enablement. Rackspace, IBM and HP also have Australia-based data centers. But all these providers lack hyper-scale.
To bring a recent piece of research on content co-marketing to life, I created a mini-podcast (8 minutes) that includes excerpts from my interviews with marketing leaders. Give it a listen (if the Soundcloud player below doesn't show up or doesn't work for you, you can go straight to the Soundcloud page where it lives, here). Below I've included notes to the podcast, and a full transcript.
As the hub of our offline and online experiences, mobile interactions are a powerful catalyst for contextual marketing. The untapped opportunity in mobile for marketers will be to get an extremely granular understanding of their customers, then anticipate their expectations, and develop unique insights to power better marketing across all channels, not just mobile.
Few Marketers Make The Most Of The New Customer Data Gold Mine
Because smartphones are the hub of our offline and online experiences, they generate valuable insights for contextual data-driven marketing. However, the majority of marketers are not yet ready to exploit the convergence between mobile and big data.
Short Term: Engage Your Customers In Real Time In Their Mobile Moments
Harnessing and extracting actionable insights from this unprecedented wealth of customer data will enable marketers to serve customers in their mobile moments on a channel where they will increasingly spend the majority of their digital time.
Long Term: Power Better Marketing Initiatives Beyond The Mobile Channel
Mobile is more than simply another digital channel. Marketing leaders should combine mobile data with other sources of customer intelligence to get a deeper understanding of customers, anticipate their expectations, and act on these insights to improve all marketing initiatives.