The Fusion of Business and IT
The Fusion of Business and IT
The Fusion of Business and IT
Introduction | 2
API economy | 22
Ambient computing | 38
Dimensional marketing | 56
Software-defined everything | 74
Core renaissance | 92
Amplified intelligence | 108
Exponentials | 144
Introduction
I T’S probably fair to say that consumers don’t view insurance companies as technological pioneers
like Apple Inc. or Google. The relationship between an insurer and its policyholders is typically
infrequent, fleeting, and transactional. It does not help consumers find an amazing restaurant,
make a reservation at that restaurant, or get directions to the restaurant. The relationship is purely a
fleeting, financial interaction.
Because of this historical interaction model, insurers have not needed to be at the leading edge
of information technology (IT). In fact, at a time when many other businesses have migrated
from legacy systems to mobile and cloud solutions, insurers remain some of the largest users of
mainframe technology. But this is changing. A new wave of insight, or interactions, and value is
bringing insurers and their personal and commercial customers closer together.
Insurance, like many other industries, is facing sweeping changes driven by a confluence of
business and technology forces fueled by innovation. Insurance companies understand they likely
need to become more customer-focused, easier to do business with, more nimble, and increasingly
knowledge-rich. Insurers’ insatiable desire for more data to make better decisions and to reflect risk
accurately while simultaneously driving costs down never ends.
Leaders in the marketplace are inventing new ways to link real observations with identification
of risk—which is the heart of the game:
• Telematics monitors automobile speed, acceleration, and overall driving safety to provide drivers
and insurers insight into truly high-risk—and low-risk—behaviors.
• The Internet of Things (IoT) will likely soon provide even more insight to how we live our lives
in and around our homes.
• Wearable devices that track our physical activity and caloric intake can make us more aware of
the daily decisions we make and its impact to our health.
In short, the interconnectivity between insurance technology and consumers’ lives is increasing
rapidly.
To help make sense of it all, we offer Deloitte’s Sixth Technology Trends report, our annual
in-depth examination of eight current technology trends, including the use of application
programming interfaces to extend services and create new revenue streams; the dramatic impact
connectivity and analytics is having on digital marketing; and the evolving role of the chief
information office (CIO) to changing IT skills and delivery models.
2
Introduction
The theme for this year’s report is the fusion of business and IT, which is broadly inspired by a
fundamental transformation in the way C-Suite leaders and CIOs collaborate to leverage disruptive
change, chart business strategy, and pursue potentially transformative opportunities
An insurance focus: This version of the Technology Trends report highlights how each of these
eight current technology trends applies to and can impact insurance companies. Whether you are a
property and casualty (P&C) insurer with less than $100 million in premiums, or the largest global
life and annuity (L&A) insurer—these trends are likely to affect you. Your various stakeholders
—from internal leadership to external customers—will react to how your teams leverage and
implement the capabilities described by these trends.
Each of the technology trends sections includes an “Insurance Perspective,” our view on how
the industry is grappling which each emerging trend. In some cases, insurance is a progressive,
thoughtful leader. In others, the business case and application to insurance is still evolving.
Either way, it’s an exciting time to be part of the insurance technology sector. We hope this
document delivers insight as to where we see insurance technology evolving and offers practical
applications for you and your organizations.
Best,
Anthony Abbattista Arun Prasad John Matley
Insurance Technology Principal Senior Manager
Consulting Leader Deloitte Consulting LLP Deloitte Consulting LLP
Deloitte Consulting LLP [email protected] [email protected]
[email protected]
3
CIO as chief integration officer
CIO as chief
integration officer
A new charter for IT
5
Tech Trends 2015: The fusion of business and IT
6
CIO as chief integration officer
cio
Source: a Martin Gill, Predictions 2014: The Year Of Digital Business, Forrester Research, Inc., December 19, 2013.
7
Tech Trends 2015: The fusion of business and IT
can become part of the foundation of this • Collaborate to solve tough business
transformation—setting up a holistic view of problems. Another manifestation of
the IT balance sheet, a common language for “integration” involves tapping into new
essential conversations with the business, and ecosystems for ideas, talent, and potential
a renewed commitment to agile execution of solutions. Existing relationships with
the newly aligned mission. These capabilities vendors and partners are useful on this
are necessary given the rapidly evolving front. Also consider exploring opportunities
technology landscape. to collaborate with nontraditional players
such as start-ups, incubators, academia,
Harness emerging technologies and venture capital firms. Salim Ismail,
Singularity University’s founding executive
and scientific breakthroughs director, encourages organizations to try to
to spur innovation scale at exponential speed by “leveraging
One of the most important integration the world around them”—tapping into
duties is to link the potential of tomorrow diverse thinking, assets, and entities.7
to the realities of today. Breakthroughs are An approach for evaluating new technology
happening not just in IT but in the fields of might be the most important legacy a CIO
science: materials science, medical science, can leave: institutional muscle memory for
manufacturing science, and others. The sifting opportunities from shiny objects,
Exponentials at the end of this report shine rapidly vetting and prototyping new ideas,
a light on some of the advances, describing and optimizing for return on assets. The
potentially profound disruption to business, only constant among continual technology
government, and society. advances is change. Providing focus and clarity
to that turmoil is the final integration CIOs
• Create a deliberate mechanism for
should aspire to—moving from potential to
scanning and experimentation. Define
confidence, and from possibility to reality.
processes for understanding the “what,”
distilling to the “so what,” and guiding
the business on the “now what.” As Become a business leader
Peter Drucker, the founder of modern The past several years have seen new
management, says, “innovation is work”— leadership roles cropping up across industries:
and much more a function of the importing chief digital officer, chief data officer, chief
and exporting of ideas than eureka growth officer, chief science officer, chief
moments of new greenfield ideas.5 marketing technology officer, and chief
analytics officer, to name a few. Each role is
• Build a culture that encourages failure. deeply informed by technology advances,
Within and outside of IT, projects with and their scope often overlaps not only with
uncharted technologies and unproven the CIO’s role but between their respective
effects inherently involve risk. To think charters. These new positions reflect
big, start small, and scale quickly, burgeoning opportunity and unmet needs.
development teams need CIO support Sometimes, these needs are unmet because the
and encouragement. The expression CIO hasn’t elevated his or her role to take on
“failing fast” is not about universal new strategic endeavors. The intent to do so
acceptance and celebrating failure. Rather, may be there, but progress can be hampered
it emphasizes learning through iteration, by credibility gaps rooted in a lack of progress
with experiments that are designed to yield toward a new vision, or undermined by
measurable results—as quickly as possible.6 historical reputational baggage.
8
CIO as chief integration officer
• Actively engage with business peers to framed. IT can be positioned not just as
influence their view of the CIO role. For a delivery center but as a partner in the
organizations without these new roles, company’s new journey. IT has a necessarily
CIOs should consider explicitly stating their cross-discipline, cross-functional, cross-
intent to tackle the additional complexity. business unit purview. CIOs acting as chief
CIOs should recognize that IT may have a integration officers can serve as the glue
hard time advancing their stations without linking the various initiatives together—
a positive track record for delivering core IT advocating platforms instead of point
services predictably, reliably, and efficiently. solutions, services instead of brittle point-
to-point interfaces, and IT services for
• Serve as the connective tissue to all things design, architecture, and integration—while
technology. Where new roles have already also endeavoring to provide solutions that
been defined and filled, CIOs should are ready for prime time through security,
proactively engage with them to understand scalability, and reliability.
what objectives and outcomes are being
9
Tech Trends 2015: The fusion of business and IT
The insurance company CIO naturally Insurance has, and will continue to be, a
resides in a conflicted position. In a highly competitive and saturated market. The
traditionally risk-adverse industry, separating insurance CIO as chief integration officer
one’s organization from the technological recognizes that the intersection of diverse
status quo brings internal and external perspectives and experience can be used to
challenges. As users of technology, insurers are outperform the competition.
typically viewed as “laggards” and “followers”
when compared with companies in more Data continues to be king
technologically progressive industries, such
The insurance CIO and their team typically
as IT and consumer products. In spite of this
hold the keys to the data kingdom because
less-than-stellar starting point, the insurance
they are the guardians of often-underutilized
CIO has an opportunity to leverage emerging
corporate assets in the form of operational,
capabilities as a rallying point to drive
competitive, and financial data. Insurance
measurable business outcomes.
CIOs, system architects, and data scientists
have an opportunity to turn data into use cases
—creating insight rather than supporting it.
A knowledgeable workforce Given the proliferation and affordability of
The insurance CIO often leads a workforce big-data environments and visualization tools,
that understands the core business and there is little excuse to not have a sandbox
operations more comprehensively and environment that nurtures the curious spirit
completely than their business counterparts. —a place where “What if,” “I wonder how,” and
The focus over the past 20 years of automating “I wonder what” are easily tested and vetted
rating and straight-through-processing against the context of data that doesn’t lie.
has given the average IT employee a deep The insurance CIO as chief integration
understanding of the underlying business officer can create an environment where data,
and its key drivers. The intimate, hands-on technology, and people become interactive,
experience has resulted in a workforce that is collaborative, and accretive.
critical to balancing the business’s needs and
desires with reality. Unlimited transparency
To fully tap into the knowledge of the
IT workforce, insurers should continue
and foresight
to embrace creative approaches. Creating Due to regulatory and reporting needs, the
venues and time for innovation with their linkage between sales (premiums) and costs
business colleagues can unleash creativity (losses) are inexorably tied in an insurance
that would otherwise be untapped. Insurers company. Decades of investment in financial
have embraced more traditional Silicon management have resulted in a tightly knit,
Valley concepts like app-a-thons, innovation well-documented flow of debits and credits
challenges, and crowdsourcing with within the insurance company. As a result,
universities and other institutions to drive the insurance CIO can see most capital
more proactive idea development. expenditures, as well as the connectivity
10
CIO as chief integration officer
11
Tech Trends 2015: The fusion of business and IT
12
CIO as chief integration officer
saw production times for the targeted SOC profile of IT leadership within the company
products improve for one full quarter, in some and the critical role these leaders can play in
cases for almost two. “That was huge for us,” driving enterprise innovation efforts.
said Stevenson. “The SOC organization set The OneClaim system also forms the
high expectations for us, just as we did for foundation for digital initiatives, from
them. In the wake of our shared success, their mobile member services to the potential
view of IT has gone from one of ‘get out of my for augmenting adjustors, inspectors, and
way’ to ‘I never go anywhere without my IT underwriters with wearables, cognitive
guys.’” analytics, or crowdsourcing approaches.
IT is spurring discussions about the “art of
From claims to innovation the possible” with the business. OneClaim
is one example of how AIG’s IT leadership
Like many of its global peers, AIG faces
is helping define the business’s vision for
complex challenges and opportunities as the
digital, analytics, and emerging technologies,
digital economy flexes its muscles. At AIG, IT
integrating between business and IT silos,
is viewed not just as a foundational element
between lines of business, and between the
of the organization, but also as a strategic
operating complexities of today and the
driver as AIG continues its transformation
industry dynamics of tomorrow.
to a unified, global business. AIG’s CEO,
Peter Hancock, is taking steps to integrate the
company’s IT leaders more deeply into how its Digital mixology
businesses are leveraging technology. Shortly Like many food and beverage companies,
after assuming his post, Hancock appointed Brown-Forman organizes itself by product
a new corporate CIO who reports directly to lines. Business units own their respective
Hancock and chairs the company’s innovation global brands. Historically, they worked
committee. Previously, the top IT role reported with separate creative agencies to drive their
to the chief administration officer. individual marketing strategies. IT supported
AIG’s claim processing system, OneClaim™, corporate systems and sales tools but was not
is emblematic of the more integrated role IT typically enlisted for customer engagement or
leaders at the company can play. Peter Beyda, brand positioning activities. But with digital
the company’s CIO for claims, is replacing upending the marketing agenda, Brown-
AIG’s many independent claims systems with a Forman’s CIO and CMO saw an opportunity to
centralized one that operates on a global scale. reimagine how their teams worked together.
The mandate is to be as global as possible while Over the last decade, the company
being as local as necessary. Standardized data recognized a need to transform its IT and
and processes yield operational efficiencies marketing groups to stay ahead of emerging
and centralized analytics across products technologies and shifting consumer patterns.
and geographies. However, IT also responds In the early 2000s, Brown-Forman’s separate
to the fast-paced needs of the business. In IT and marketing teams built the company’s
China, for example, package solutions were initial website but continued to conduct
used to quickly enter the market ahead of the customer relationship management (CRM)
OneClaim deployment—reconciling data in through snail mail. As social media began
the background to maintain global consistency to explode at the turn of the decade, Brown-
and visibility. AIG has deployed OneClaim Forman’s marketing team recognized that
in 20 countries and anticipates a full global closely collaborating with IT could be the
rollout by 2017. The project is raising the winning ingredient for high-impact, agile
13
Tech Trends 2015: The fusion of business and IT
marketing. While the external marketing platform and open-source tools to recreate the
agencies that Brown-Forman had contracted social streaming display, promptly realizing
with for years were valuable in delivering cost savings and creating a repeatable product
creative assets and designs, marketing now that could be tweaked for other markets
needed support in new areas such as managing and brands.
websites and delivering digital campaigns. Fast-forward to today. Marketing and
Who better to team with than the IT IT are teaming to provide Brown-Forman
organization down the hall? with a single customer view through a new
IT and marketing hit the ground running: CRM platform. Being able to share customer
training, learning, and meeting with insight, digital assets, and new engagement
companies such as Facebook and Twitter. It techniques globally across brands is viewed
was the beginning of the company’s Media as a competitive differentiator. The initiative’s
and Digital group, which now reports to accomplishments over the next few years will
both the CMO and IT leadership. And more be contingent upon business inputs from the
importantly, it was the creation of a single team marketing team and innovation from IT to
that brought together advantages from both cover technology gaps.
worlds. IT excelled at managing large-scale, The “one team” mentality between IT and
complex initiatives, while marketing brought marketing has put Brown-Forman on a path
customer knowledge and brand depth. Their toward its future-state customer view. Along
collaboration led to the development of new the way, the organization has reaped numerous
roles, such as that of digital program manager, benefits. For one, assets created by creative
who helped instill structure, consistency, and agencies can be reused by Brown-Forman’s
scale to drive repeatable processes throughout teams through its scalable and repeatable
the organization. platforms. Moreover, smaller brands that
As the teams worked together, new ideas otherwise may not have had the budget to run
were bootstrapped and brought to light. Take, their own digital campaign can now piggyback
for example, the Woodford Reserve Twitter onto efforts created for the larger brands. The
Wall campaign, which originally required relationship fostered by IT and marketing
heavy investment dollars each year with a has led to measurable return on investment
third party. The close interaction between (ROI)—and a redefined company culture that
marketing and IT led to the question: “Why is not inhibited by the silos of department or
can’t we do this ourselves?” Within a week, brand verticals.
a joint IT-marketing team had used a cloud
14
CIO as chief integration officer
My take
Pat Gelsinger, CEO
VMware
I meet with CIOs every week, hundreds each year. I VMware adopted this approach with the development
meet with them to learn about their journeys and to of EVO:RAIL, VMware’s first hyper-converged
support them as they pursue their goals. The roles infrastructure appliance and a scalable, software-
these individuals play in their companies are evolving defined data-center building block that provides
rapidly. Though some remain stuck in a “keep the the infrastructure needed to support a variety of IT
lights on and stick to the budget” mind-set, many environments. To create this product, we put together
now embrace the role of service provider: They build a small team of developers with a highly creative team
and support burgeoning portfolios of IT services. leader at the helm. We also provided strong top-down
Still others are emerging as strategists and decision support throughout the project. The results were, by
makers—a logical step for individuals who, after all, any definition, a success: Nine months after the first
know more about technology than anyone else on the line of code was written, we took EVO:RAIL to market.
CEO’s staff. Increasingly, these forward-thinking CIOs
are applying their business and technology acumen to Clearly, rapid-fire development will not work
monetize IT assets, drive innovation, and create value with every project. Yet there is a noticeable shift
throughout the enterprise. underway toward the deployment of more
agile development techniques. Likewise,
CIOs are adopting a variety of tactics to expand and companies are increasingly using
redefine their roles. We’re seeing some establish application program interfaces to drive
distinct teams within IT dedicated solely to innovating, new revenue streams. Others are
while others collaborate with internal line-of-business taking steps to modernize their
experts within the confines of existing IT infrastructure cores to fuel the development
to create business value. Notably, we’ve also seen of new services and offerings.
companies set up entirely new organizational Their efforts are driven largely
frameworks in which emerging technology–based by the need to keep pace with
leadership roles such as the chief digital officer innovative competitors. At
report to and collaborate with the CIO, who, in turn, VMware, we are working to
assumes the role of strategist and integrator. enhance the user experience.
What’s driving this evolution? Simply put, disruptive Having become accustomed
technologies. Mobile, cloud, analytics, and a host of to the intuitive experiences they
other solutions are enabling radical changes in the enjoy with smartphones and tablets,
way companies develop and market new products our customers expect us to provide
and services. Today, the Internet and cloud can comparable interfaces and experiences.
offer start-ups the infrastructure they need to create To meet this expectation, we are taking a
new applications and potentially reach billions of markedly different approach to development and
customers—all at a low cost. design, one that emphasizes both art and technology.
Our CIO has assembled development teams composed
Moreover, the ability to innovate rapidly and of artists who intuit the experiences and capabilities
affordably is not the exclusive purview of tech start- users want, and hard-core technologists who translate
ups. Most companies with traditional business models the artists’ designs into interfaces, customer platforms,
probably already have a few radical developers on and other user experience systems. These two groups
staff—they’re the ones who made the system break bring different skill sets to the task at hand, but each
down over the weekend by “trying something out.” is equally critical to our success.
When organized into small entrepreneurial teams
and given sufficient guidance, CIO sponsorship, and As CIOs redefine and grow their roles to meet the
a few cloud-based development tools, these creative rapidly evolving demands of business and technology,
individuals can focus their energies on projects that unorthodox approaches with strong top-down
deliver highly disruptive value. support will help fuel the innovation companies need
to succeed in the new competitive landscape.
15
Tech Trends 2015: The fusion of business and IT
My take
Stephen Gillett
Business and technology C-suite executive
CIOs can play a vital role in any business Acting on lessons I learned in previous roles, we took
transformation, but doing so typically requires that a “tiger team” approach and dedicated resources to
they first build a solid foundation of IT knowledge trend sensing, experimentation, and rapid prototyping.
and establish a reputation for dependably keeping This allowed us to explore what was happening on
the operation running. Over the course of my career, the edge of our industry—across processes, tools,
I’ve held a range of positions within IT, working my technology, and talent—and bring it back to the
way up the ranks, which helped me gain valuable core. CIOs can lead similar charges in their respective
experience across many IT fundamentals. As CIO organizations as long as their goals and perspectives
at Starbucks, I took my first step outside of the remain anchored by business and customer needs.
traditional boundaries of IT by launching a digital They should also be prepared to advocate for these
ventures unit. In addition to leveraging ongoing digital initiatives and educate others on the value such
efforts, this group nurtured and executed new ideas projects can bring to the business.
that historically fell outside the charters of more
traditional departments. I joined Best Buy in My advice to CIOs is to identify where you want to go
2012 as the president of digital marketing and then take incremental steps toward realizing that
and operations, and applied some vision. If you are the captain of a ship at sea, likely
of the lessons I had learned about the worst thing you can do is turn on its center 180
engaging digital marketing and IT degrees—you’ll capsize. Making corrections to the
together to adjust to changing rudder more slightly gives the boat time to adjust—
customer needs. and gives you time to chart new destinations. Pick
one or two projects you know are huge thorns in the
My past experiences prepared sides of your customers or your employees, and fix
me for the responsibilities I had those first. We started out at Symantec by improving
in my most recent role as COO mailbox sizes, creating new IT support experiences,
of Symantec. When we talked and fixing cell phone reception on campus. We
about business transformation at moved on to improving VPN quality and refreshing
Symantec, we talked about more end-user computing standards by embracing “bring
than just developing new product your own device,” while simultaneously building
versions with better features than momentum to complete an ERP implementation. By
those offered by our competitors. True solving small problems first, we were able to build up
transformation was about the customer: the organizational IT currency we needed to spend on
We wanted to deliver more rewarding bigger problems and initiatives.
experiences that reflected the informed, peer-
influenced way the customer was increasingly When CIOs ask me about how they can get a seat at
making purchasing decisions. Organizational silos can the table for big transformation efforts, I ask them
complicate customer-centric missions by giving rise about the quality of their IT organizations. Would
to unnecessary technical complexity and misaligned your business units rate you an A for the quality of
or overlapping executive charters. Because of this, we their IT experience? If you try to skip straight to digital
worked to remove existing silos and prevent new ones innovation but aren’t delivering on the fundamentals,
from developing. Both the CIO and CMO reported to you shouldn’t be surprised at the lack of patience
me as COO, as did executives who own data, brand, and support you may find within your company. A
digital, and other critical domains. Our shared mission sign that you have built up your currency sufficiently
was to bring together whatever strategies, assets, is when you are pulled into meetings that have
insights, and technologies were necessary to surpass nothing to do with your role as CIO because people
our customers’ expectations and develop integrated “just want your thinking on this”—which means a
go-to-market systems and customer programs. door is opening for you to have a larger stake in
company strategy.
16
CIO as chief integration officer
Cyber implications
I N many industries, board members, C-suite executives, and line-of-business presidents did not grow
up in the world of IT. The CIO owns a crucial part of the business, albeit one in which the extended
leadership team may not be particularly well versed. But with breaches becoming increasingly frequent
across industries, senior stakeholders are asking pointed questions of their CIOs—and expecting that
their organizations be kept safe and secure.
CIOs who emphasize cyber risk and privacy, and those who can explain IT’s priorities in terms of
governance and risk management priorities that speak to the board’s concerns, can help create strong
linkages between IT, the other functions, and the lines of business. No organization is hacker-proof, and
cyber attacks are inextricably linked to the IT footprint.8 Often, CIOs are considered at least partially to
blame for incidents. Strengthening cyber security is another step CIOs can take toward becoming chief
integration officers in a space where leadership is desperately needed.
Part of the journey is taking a proactive view of information and technology risk—particularly as
it relates to strategic business initiatives. Projects that are important from a growth and performance
perspective may also subject the organization to high levels of cyber risk. In the haste to achieve top-
level goals, timeframes for these projects are often compressed. Unfortunately, many shops treat security
and privacy as compliance tasks—required hoops to jump through to clear project stage gates. Security
analysts are put in the difficult position of enforcing standards against hypothetical controls and policies,
forcing an antagonistic relationship with developers and business sponsors trying to drive new solutions.
As CIOs look to integrate the business and IT, as well as to integrate the development and operations
teams within IT, they should make the chief information security officer and his or her team active
participants throughout the project life cycle—from planning and design through implementation,
testing, and deployment.
The CIO and his or her extended IT department are in a rare position to orchestrate awareness of
and appropriate responses to cyber threats. With an integrated view of project objectives and technology
implications, conversations can be rooted in risk and return. Instead of taking extreme positions to
protect against imaginable risk, organizations should aim for probable and acceptable risk—with
the CIO helping business units, legal, finance, sales, marketing, and executive sponsors understand
exposures, trade-offs, and impacts. Organizational mind-sets may need to evolve, as risk tolerance is
rooted in human judgment and perceptions about possible outcomes. Leadership should approach
risk issues as overarching business concerns, not simply as project-level timeline and cost-and-benefit
matters. CIOs can force the discussion and help champion the requisite integrated response.
In doing so, chief integration officers can combat a growing fallacy that having a mature approach
to cyber security is incompatible with rapid innovation and experimentation. That might be true
with a compliance-heavy, reactive mind-set. But by embedding cyber defense as a discipline, and by
continuously orchestrating cyber security decisions as part of a broader risk management competency,
cyber security can become a value driver—directly linked to shareholder value.
17
Tech Trends 2015: The fusion of business and IT
There are concrete steps aspiring chief But organizational change dynamics will
integration officers can take to realize their likely be the biggest challenge. Even so, it’s
potential. Start with taking stock of IT’s worth it—not only for improving tactical
current political capital, reputation, and departmental efficiency and efficacy,
maturity. Stakeholder by stakeholder, reflect but also to raise the IT department’s
on their priorities, objectives, and outcomes, performance and reputation.
and understand how IT is involved in realizing
their mission. Then consider the following: • All together now. Engage directly with
line-of-business and functional leaders
• Line of sight. Visibility into the balance to help direct their priorities, goals, and
sheet of IT is a requirement—not just the dependencies toward IT. Solicit feedback on
inventory but the strategic positioning, risk how to reimagine your IT vision, operating,
profile, and ROI of the asset pool. Consider and delivery model. Create a cadence of
budgets, programs, and projects; hardware scheduled sit-downs to understand evolving
and software; vendor relationships and needs, and provide transparency on
contracts; the talent pool, organizational progress toward IT’s new ambitions.
structure, and operating model; and
business partner and other ecosystem • Ecosystem. Knock down organizational
influencers. Compare stakeholder priorities boundaries wherever you can. Tap into your
and the business’s broader goals with where employees’ collective ideas, passions, and
time and resources are being directed, interests. Create crowd-based competitions
and make potentially hard choices to to harness external experience for both
bring IT’s assets into alignment with the bounded and open-ended problems. Foster
business. Invest in tools and processes to new relationships with incubators, start-
make this line of sight systemic and not a ups, and labs with an eye to obtaining not
point-in-time study—allowing for ongoing just ideas but access to talent. Set explicit
monitoring of balance-sheet performance expectations with technology vendors
to support a living IT strategy. and services partners to bring, shape, and
potentially share risk in new ideas and
• Mind the store. Invest in the underlying offerings. Finally, consider if cross-industry
capabilities of IT so that the lights are consortia or intra-industry collaborations
not only kept on but continuously are feasible. Integrate the minds, cycles,
improving. Many potential areas of and capital of a broad range of players to
investment live under the DevOps amplify returns.
banner: environment provisioning and
deployment, requirements management • Show, don’t tell. As new ideas are
and traceability, continuous integration being explored, thinking should eclipse
and build, testing automation, release constraints based on previous expectations
and configuration management, system or legacy technologies. Interactive demos
monitoring, business activity monitoring, and prototypes can spark new ways of
issue and incident management, and others. thinking, turning explanatory briefings
Tools for automating and integrating into hands-on discovery. They also lend
individual capabilities continue to mature.
18
CIO as chief integration officer
themselves better to helping people grasp commoditized services and offerings, but
the potential complexities and delivery consider adjusting budgeting, procurement,
implications of new and emerging and contracting principles to encourage a
techniques. The goal should be to bring the subset of strategic partners to put skin in
art of the possible to the business, informed the game for higher-value, riskier efforts.
by the realm of the feasible. Evolve sourcing strategies to consider
“innovators of record” with a longer-term
• Industrialize innovation. Consider an commitment to cultivating a living backlog
innovation funnel with layers of ideation, of projects and initiatives.
prototyping, and incubating that narrow
down the potential field. Ecosystems can • Talent. CIOs are only as good as their
play an important role throughout— teams. The changes required to become
especially at the intersections of academia, a chief integration officer represent some
start-ups, vendors, partners, government, seismic shifts from traditional IT: new
and other corporate entities. Align third- skills, new capabilities and disciplines,
party incentives with your organization’s new ways of organizing, and new ways of
goals, helping to identify, shape, and scale working. Define the new standard for the
initiatives. Consider coinvestment and risk- IT workers of the future, and create talent
sharing models where outsiders fund and development programs to recruit, retain,
potentially run some of your endeavors. and develop them.
Relentlessly drive price concessions for
19
Tech Trends 2015: The fusion of business and IT
Bottom line
T ODAY’S CIOs have an opportunity to be the beating heart of change in a world being
reconfigured by technology. Every industry in every geography across every function will likely
be affected. CIOs can drive tomorrow’s possibilities from today’s realities, effectively linking business
strategies to IT priorities. And they can serve as the lynchpin for digital, analytics, and innovation
efforts that affect every corner of the business and are anything but independent, isolated endeavors.
Chief integration officers can look to control the collisions of these potentially competing priorities
and harness their energies for holistic, strategic, and sustainable results.
Authors
Khalid Kark, director, Deloitte LLP
20
CIO as chief integration officer
Endnotes
1. Harvard Business Review Analytic Services, the-best-of-peter-drucker/, accessed Janu-
The digital dividend: First-mover advantage, ary 16, 2015; Peter Drucker, Innovation and
September 2014, http://www.verizonen- Entrepreneurship (HarperBusiness, 2006).
terprise.com/resources/insights/hbr/. 6. Rachel Gillett, “What the hype behind embrac-
2. Claudio Da Rold and Frances Karamouzis, ing failure is really about,” Fast Company,
Digital business acceleration elevates the September 8, 2014, http://www.fastcompany.
need for an adaptive, pace-layered sourcing com/3035310/hit-the-ground-running/what-
strategy, Gartner Inc., April 17, 2014. the-hype-behind-embracing-failure-is-
3. Deloitte Consulting LLP, Tech Trends 2014: really-all-about, accessed January 16, 2015.
Inspiring disruption, 2014, chapter 1. 7. Salim Ismail, Exponential Organizations: Why
4. Deloitte Consulting LLP, Tech Trends 2014: New Organizations Are Ten Times Better, Faster,
Inspiring disruption, 2014, chapter 10. and Cheaper Than Yours (and What to Do
About It) (Diversion Books, October 18, 2014).
5. Steve Denning, “The best of Peter Drucker,”
Forbes, July 29, 2014, http://www.forbes. 8. Deloitte Consulting LLP, Tech Trends 2013:
com/sites/stevedenning/2014/07/29/ Elements of postdigital, 2013, chapter 9.
21
API economy
API economy
From systems to business services
23
Tech Trends 2015: The fusion of business and IT
fuel the new API economy. The question is: What we’re seeing is disruption and, in
Is your organization ready to compete in this many cases, the democratization of industry.
open, vibrant, and Darwinian free market? Entrenched players in financial services
are exploring open banking platforms that
Déjà vu or brave new world? unbundle payment, credit, investment, loyalty,
and loan services to compete with new
The API revolution is upon us. Public APIs
entrants such as PayPal, Billtrust, Tilt, and
have doubled in the past 18 months, and more
Amazon that are riding API-driven services
than 10,000 have been published to date.4 The
into the payment industry. Netflix receives
revolution is also pervasive: Outside of high
more than 5 billion daily requests to its public
tech, we have seen a spectrum of industries
APIs.5 The volume is a factor in both the
embrace APIs—from telecommunications
rise in usage of the company’s services and
and media to finance, travel and tourism, and
its valuation.6 Many in the travel industry,
real estate. And it’s not just in the commercial
including British Airways, Expedia, TripIt,
sector. States and nations are making
and Yahoo Travel, have embraced APIs and
budget, public works, crime, legal, and other
are opening them up to outside developers.7
agency data and services available through
As Spencer Rascoff, CEO of Zillow, points out:
initiatives such as the US Food and Drug
“When data is readily available and free in a
Administration’s openFDA API program.
24
API economy
particular market, whether it is real estate or assets, goods, and services previously untapped
stocks, good things happen for consumers.”8 by new business models. And new tools and
Platforms and standards that orchestrate disciplines for API management have evolved
connected and/or intelligent devices—from to help realize the potential.
raw materials to shop-room machinery, from
HVACs to transportation fleets—are the early Managing the transformation
battlegrounds in the Internet of Things (IoT).9
Openness, agility, flexibility, and scalability
APIs are the backbone of the opportunity.
are moving from good hygiene to life-
Whoever manages—and monetizes—the
and-death priorities. Tenets of modern
underlying services of the IoT could be poised
APIs are becoming enterprise mandates:
to reshape industries. Raine Bergstrom, general
Write loosely coupled, stateless, cacheable,
manager of Intel Services, whose purview
uniform interfaces and expect them to be
includes IoT services and API management,
reused, potentially by players outside of
believes businesses will either adopt IoT or
the organization.
likely get left behind. “APIs are one of the
Technology teams striving for speed
fundamental building blocks on which the
and quality are finally investing in an API
Internet of Things will succeed,” he says. “We
management backbone—that is, a platform to:
see our customers gaining efficiencies and cost
savings with the Internet of Things by applying • Create, govern, and deploy APIs:
APIs.” versioning, discoverability, and clarity of
Future-looking scenarios involving scope and purpose
smartphones, tablets, social outlets, wearables,
embedded sensors, and connected devices • Secure, monitor, and optimize usage:
will have inherent internal and external access control, security policy enforcement,
dependencies in underlying data and services. routing, caching, throttling (rate limits and
APIs can add features, reach, and context quotas), instrumentation, and analytics
to new products and services, or become
products and services themselves. • Market, support, and monetize assets:
Amid the fervor, a reality remains: APIs manage sales, pricing, metering, billing, and
are far from new developments. In fact, they key or token provisioning
have been around since the beginning of
Many incumbent technology companies
structured programming. So what’s different
have recognized that API management
now, and why is there so much industry energy
has “crossed the chasm” and acquired the
and investor excitement around APIs? The
capabilities to remain competitive in the new
conversation has expanded from a technical
world: Intel acquired Mashery and Aepona;
need to a business priority. Jyoti Bansal,
CA Technologies acquired Layer 7; and SAP
founder and CEO of AppDynamics, believes
is partnering with Apigee, which has also
that APIs can help companies innovate faster
received funding from Accenture.
and lead to new products and new customers.
But the value of tools and disciplines is
Bansal says, “APIs started as enablers for things
limited to the extent that the APIs they help
companies wanted to do, but their thinking is
build and manage deliver business value.
now evolving to the next level. APIs themselves
IT organizations should have their own
are becoming the product or the service
priorities—improving interfaces or data
companies deliver.” The innovation agenda
encapsulations that are frequently used today
within and across many sectors is rich with
or that could be reused tomorrow. Technology
API opportunities. Think of them as indirect
leaders should avoid “gold-plated plumbing”
digital channels that provide access to IP,
exercises isolated within IT to avoid flashbacks
25
Tech Trends 2015: The fusion of business and IT
to well-intentioned but unsuccessful SOA poorly designed code that was not built for
initiatives from the last decade. reuse or scale. Second, security holes may
The shift to “product management” may emerge that were previously lying dormant in
pose the biggest hurdle. Tools to manage legacy technical debt. Systems were built for
pricing, provisioning, metering, and billing the players on the field; no one expected the
are backbone elements—essential, but only fans to rush the field and start playing as well—
as good as the strategy being deployed on the or for the folks watching at home to suddenly
foundation. Developing disciplines for product be involved. Finally, additional use cases
marketing and product engineering are likely should be well thought out. API designs and
uncharted territories. Pricing, positioning, decisions about whether to refactor or to start
conversion, and monetization plans are again, which are potentially tough choices,
important elements. Will offerings be à la carte should be made based on a firm understanding
or sold as a bundle? Charged per use, per of the facts in play.
subscription window, or on enterprise terms? Mitigating potential legal liabilities is
Does a freemium model make sense? What is another reason to control scope. Open
the roadmap for upgrades and new features, source and API usage are the subject of
services, and offerings? These decisions ongoing litigation in the United States
and others may seem like overkill for early and other countries. Legal and regulatory
experimentation, but be prepared to mature rulings concerning IP protection, copyright
capabilities as your thinking on the API enforcement, and fair use will likely have
economy evolves. a lasting impact on the API economy.
Understanding what you have used to create
Mind the gap APIs, what you are exposing, and how your
data and services will be consumed are
Culture and institutional inertia may also
important factors.
be hurdles to the API economy. Pushing to
One of the most important rationales
share IP and assets could meet resistance
for focus is to enable a company to follow
unless a company has clearly articulated the
the mantra of Daniel Jacobson, vice
business value of APIs. Treating them like
president of Edge Engineering at Netflix
products can help short-circuit the resistance.
(API and Playback): “Act fast, react fast.”10
By targeting a particular audience with specific
And enable those around you to do the
needs, companies can build a business case
same—both external partners and internal
and set priorities for and limits to the exercise.
development teams. Investing in the mindset
Moreover, this “outside-in” perspective can
and foundational elements of APIs can give
help keep the focus on the customer’s or
a company a competitive edge. However,
consumer’s point of view, rather than on
there is no inherent value in the underlying
internal complexities and organizational or
platform or individual services if they’re not
technology silos.
being used. Companies should commit to
Scope should be controlled for far more
building a marketplace to trade and settle
than the typical reasons. First, whether meant
discrete, understandable, and valuable APIs
for internal or external consumption, APIs may
and to accelerate their reaping the API
have the unintended consequence of exposing
economy’s dividends.
26
API economy
27
Tech Trends 2015: The fusion of business and IT
Footnotes
i
Pitney Bowes, Business Insight and Duck Creek Technologies Form Partnership to Deliver Enhanced Policy Administration Solution,
May 24, 2010, http://news.pb.com/press-releases/pitney-bowes-business-insight-and-duck-creek-technologies-partnership-to-
deliver-enhanced-policy-administration-solution.htm, accessed May 12, 2015.
ii
R.L. Polk, “VINtelligence Web Service”, https://vintelligence.polk.com/vintel/resources/vintelligenceWebService.html, accessed
May 12, 2015.
iii
Oklahoma Department of Public Safety, “Oklahoma Compulsory Insurance Verification System: Web Service & Database
Manual”, http://digitalprairie.ok.gov/cdm/singleitem/collection/stgovpub/id/6521/rec/1, accessed May 12, 2015.
iv
Select Quote Insurance Services, “How we help”, http://www.selectquote.com/how_we_help.aspx, accessed May 12, 2015.
v
EZLynx, “About”, https://www.ezlynx.com/about.html, accessed May 12, 2015.
28
API economy
Fueling the second Web boom API-based services, spawning new services,
acquisitions, and ideas. As some organizations
APIs have played an integral role in some
matured, they revised their API policies to
of the biggest cloud and Web success stories of
meet evolving business demands. Twitter, for
the past two decades. For example, Salesforce.
example, shifted its focus from acquiring users
com, which launched in 2000, was a pioneer in
to curating and monetizing user experiences.
the software-as-a-service space, using Web-
This shift ultimately led to the shuttering of
based APIs to help customers tailor Salesforce
some of its public APIs, as the company aimed
services to their businesses, integrate into their
to more directly control its content.
core systems, and jump-start efforts to develop
new solutions and offerings.11 Moreover,
Salesforce has consistently used platforms APIs on demand
and APIs to fuel innovation and broaden In 2008, Netflix, a media streaming service
its portfolio of service offerings, which now with more than 50 million subscribers,15
includes, among others, iForce.com, Heroku, introduced its first public API. At the time
Chatter, Analytics, and Salesforce1. public, supported APIs were still relatively
In 2005, Google introduced the Google rare—developers were still repurposing RSS
Maps API,12 a free service that made it possible feeds and using more rudimentary methods
for developers to embed Google Maps and for custom development. The Netflix release
create mashups with other data streams. In provided the company a prime opportunity to
2013, the company reported that more than a see what public developers would and could
million active sites and applications were using do with a new development tool. Netflix
the Maps API.13 Such success not only made vice president of Edge Engineering, Daniel
APIs standard for other mapping services, Jacobson, has described the API launch as
but helped other Web-based companies a more formal way to “broker data between
understand how offering an API could internal services and public developers.”16 The
translate into widespread adoption. approach worked: External developers went
In 2007, Facebook introduced the Facebook on to use the API for many different purposes,
Platform, which featured an API at its core creating applications and services that let
that allowed developers to build third-party subscribers organize, watch, and review Netflix
apps. Importantly, it also provided widespread offerings in new ways.
access to social data.14 The APIs also extended In the years since, Netflix has gone from
Facebook’s reach by giving rise to thousands offering streaming services on a small number
of third-party applications and strategic of devices to supporting its growing subscriber
integrations with other companies. base on more than 1,000 different devices.17 As
By the late 2000s, streamlined API the company evolved to meet market demands,
development processes made it possible for the API became the mechanism by which
Web-based start-ups like Flickr, Foursquare, it supported growing and varied developer
Instagram, and Twitter to introduce APIs requests. Though Netflix initially used the API
within six months of their sites’ launches. exclusively for public requests, by mid-2014,
Likewise, as development became increasingly the tool was processing five billion private,
standardized, public developers were able to internal requests daily (via devices used to
rapidly create innovative ways to use these stream content) versus two million daily public
29
Tech Trends 2015: The fusion of business and IT
requests.18 During this same period, revenues The Hub acts as a single common entry
from the company’s streaming services point into federal, state, and third-party data
eclipsed those of its DVD-by-mail channel, a sources without actually storing any data. As
shift driven in large part by Netflix’s presence an example of how the Hub works, under the
across the wide spectrum of devices, from set- ACA, states are required to verify enrollee
top boxes to gaming consoles to smartphones eligibility for insurance affordability programs.
and tablets.19 The Hub connects the state-based insurance
Today, roughly 99.97 percent of Netflix exchanges to federal systems across almost a
API traffic is between services and devices. dozen different agencies to provide near-real-
What was once seen as a tool for reaching new time verification services, including Social
audiences and doing new things is now being Security number validation, income and tax
used tactically to “enable the overall business filing checks, and confirmation of immigration
strategy to be better.”20 status, among others. State exchanges also use
In June 2014, the company announced that the Hub as a single entry point for submitting
in order to satisfy a growing global member enrollment reports to multiple federal agencies.
base and a growing number of devices, it The intent of the Hub’s technical
planned to discontinue its public API program. architecture is to include scalable and secure
Critics have pointed to this decision as another Web services that external systems invoke
example of large technology companies via APIs. This system is designed to provide
derailing the trend toward increased access near-real-time exchange of information, which
by rebuilding walls and declining external enables states to make benefits eligibility
developer input.21 However, as early as 2012, determinations in minutes instead of in days
Jacobson had stated, “The more I talk to people and weeks with the previous batch-based
about APIs, the clearer it is that public APIs are process and point-to-point connections.
waning in popularity and business opportunity Moreover, with a growing repository of data
and that the internal use case is the wave of and transactional services, the Hub can
the future.”22 Like any other market, the API accelerate the development of new products,
economy will continue to evolve with leading solutions, and offerings. And with common
companies taking dynamic, but deliberate APIs, states are able to share and reuse assets,
approaches to managing, propagating, and reducing implementation overhead and
monetizing their intellectual property. solution cost. The FDSH can also help agencies
pay down technical debt by standardizing and
Empowering the simplifying integration, which has historically
been one of the most complex factors in both
Beltway—and beyond project execution and ongoing maintenance.
On March 23, 2010, President Barack
Obama signed into law the Affordable Care
Act (ACA), which reforms both the US
health care and health insurance industries.
To facilitate ACA implementation, the
government created the Federal Data Services
Hub, a platform that provides a secure way
for IT systems from multiple federal and state
agencies and issuers to exchange verification,
reporting, and enrollment data.
30
API economy
Our take
Ross Mason, founder and vice president, product strategy
Uri Sarid, chief technology officer
MuleSoft
Over many years, companies have built up masses of CIO has a critical role to play in all this, potentially
valuable data about their customers, products, supply as the evangelist for the new thinking, and certainly
chains, operations, and more, but they’re not always as the caretaker of the architecture, platform, and
good at making it available in useful ways. That’s a governance that should surround APIs.
missed opportunity at best, and a fatal error at worst.
Within today’s digital ecosystems, business is driven The first step for CIOs to take toward designing that
by getting information to the right people at the right next-generation connected ecosystem is to prepare
time. Staying competitive is not so much about how their talent to think about it in the appropriate way.
many applications you own or how many developers Set up a developer program and educate staff about
you employ. It’s about how effectively you trade on APIs. Switch the mindset so that IT thinks not just
the insights and services across your balance sheet. about building and testing and runtimes, but about
delivering the data—the assets of value. Consider
Until recently, and for some CIOs still today, a new role: the cross-functional project manager
integration was seen as a necessary headache. But who can weave together various systems into a
by using APIs to drive innovation from the inside compelling new business offering.
out, CIOs are turning integration into a competitive
advantage. It all comes down to leverage: taking the We typically see organizations take two
things you already do well and bringing them to the approaches to implementing APIs.
broadest possible audience. Think: Which of your The first is to build a new product
assets could be reused, repurposed, or revalued— offering and imagine it from the
inside your organization or outside? As traditional ground up, with an API serving
business models decline, APIs can be a vehicle to spur data, media, and assets. The
growth, and even create new paths to revenue. second is to build an internal
discipline for creating APIs
Viewing APIs in this way requires a shift in thinking. strategically rather than on a
The new integration mindset focuses less on just project-by-project basis. Put a
connecting applications than on exposing information team together to build the initial
within and beyond your organizational boundaries. It’s APIs, create definitions for what
concerned less with how IT runs, and more with how APIs mean to your organization,
the business runs. and define common traits so you’re
not reinventing the wheel each time.
The commercial potential of the API economy really This method typically requires some
emerges when the CEO champions it and the board adjustment, since teams are used to
gets involved. Customer experience, global expansion, building tactically. But ultimately, it forces an
omnichannel engagement, and regulatory compliance organization to look at what assets really matter
are heart-of-the-business issues, and businesses and creates value by opening up data sets, giving IT an
can do all of them more effectively by exposing, opportunity to help create new products and services.
orchestrating, and monetizing services through APIs. In this way, APIs become the essential catalyst for IT
innovation in a digital economy.
In the past, technical interfaces dominated discussions
about integration and service-oriented architecture
(SOA). But services, treated as products, are what
really open up a business’s cross-disciplinary, cross-
enterprise, cross-functional capabilities. Obviously, the
31
Tech Trends 2015: The fusion of business and IT
Cyber implications
A PIs expose data, services, and transactions—creating assets to be shared and reused. The upside is
the ability to harness internal and external constituents’ creative energy to build new products and
offerings. The downside is the expansion of critical channels that need to be protected—channels that
may provide direct access to sensitive IP that may not otherwise be at risk. Cyber risk considerations
should be at the heart of integration and API strategies. An API built with security in mind can be a
more solid cornerstone of every application it enables; done poorly, it can multiply application risks.
Scope of control—who is allowed to access an API, what they are allowed to do with it, and how they
are allowed to do it—is a leading concern. At the highest level, managing this concern translates into
API-level authentication and access management—controlling who can see, manage, and call underlying
services. More tactical concerns focus on the protocol, message structure, and underlying payload—
protecting against seemingly valid requests from injected malicious code into underlying core systems.
Routing, throttling, and load balancing have cyber considerations as well—denials of service (where
a server is flooded with empty requests to cripple its capability to conduct normal operations) can be
directed at APIs as easily as they can target websites.
Just like infrastructure and network traffic can be monitored to understand normal operations, API
management tools can be used to baseline typical service calls. System event monitoring should be
extended to the API layer, allowing unexpected interface calls to be flagged for investigation. Depending
on the nature of the underlying business data and transactions, responses may need to be prepared in
case the underlying APIs are compromised—for example, moving a retailer’s online order processing to
local backup systems.
Another implication of the API economy is that undiscovered vulnerabilities might be exposed
through the services layer. Some organizations have tiered security protocols that require different
levels of certification depending on the system’s usage patterns. An application developed for internal,
offline, back-office operations may not have passed the same rigorous inspections that public-facing
e-commerce solutions are put through. If those back-office systems are exposed via APIs to the front
end, back doors and exploitable design patterns may be inadvertently exposed. Similarly, private
customer, product, or market data could be unintentionally shared, potentially breaching country or
industry regulations.
It raises significant questions: Can you protect what is being opened up? Can you trust what’s coming
in? Can you control what is going out? Integration points can become a company’s crown jewels,
especially as the API economy takes off and digital becomes central to more business models. Sharing
assets will likely strain cyber responses built around the expectation of a bounded, constrained world.
New controls and tools will likely be needed to protect unbounded potential use cases while providing
end-to-end effectiveness—according to what may be formal commitments in contractual service-level
agreements. The technical problems are complex but solvable—as long as cyber risk is a foundational
consideration when API efforts are launched.
32
API economy
33
Tech Trends 2015: The fusion of business and IT
trumps the extra complexity. Companies ready yourself for a sustained campaign
should plan big, but start small. Ideally, they to drive awareness, subscriptions, and
should use open, well-documented services support. Beyond readying the core
to accelerate time to prototype. Expecting APIs and surrounding management
constant change and speedy execution services, companies shouldn’t forget
is part of the shift to the API economy. about the required ancillary components:
Enterprises can use their first endeavors to documentation, code samples, testing
anchor the new “business as usual.” and certification tools, support models,
monitoring, maintenance, and upkeep.
• Build it so they will come. If you are Incentives and attempts to influence
trying to launch external-facing APIs or stakeholders should be tied to the target
platforms for the first time, you should audiences and framed accordingly.
34
API economy
Bottom line
W E’RE on the cusp of the API economy—coming from the controlled collision of revamped IT
delivery and organizational models, renewed investment around technical debt (to not just
understand it, but actively remedy it), and disruptive technologies such as cognitive computing,24
multidimensional marketing,25 and the Internet of Things. Enterprises can make some concrete
investments to be at the ready. But as important as an API management layer may be, the bigger
opportunity is to help educate, provoke, and harvest how business services and their underlying APIs
may reshape how work gets done and how organizations compete. This opportunity represents the
micro and macro versions of the same vision: moving from systems through data to the new reality
of the API economy.
Authors
George Collins, principal, Deloitte Consulting LLP
35
Tech Trends 2015: The fusion of business and IT
Endnotes
1. Electronic data interchange (EDI); 12. Google, The world is your JavaScript-
service-oriented architecture (SOA). enabled oyster, June 29, 2005, http://
2. Deloitte University Press, Tech Trends 2014: googleblog.blogspot.com/2005/06/
Inspiring disruption, February 6, 2014, world-is-your-javascript-enabled_29.
http://dupress.com/periodical/trends/tech- html, accessed October 6, 2014.
trends-2014/, accessed November 10, 2014. 13. Google, A fresh new look for the Maps
3. Ibid. API, for all one million sites, May 15, 2013,
http://googlegeodevelopers.blogspot.
4. See ProgrammableWeb, http://www. com/2013/05/a-fresh-new-look-for-maps-
programmableweb.com/category/ api-for-all.html, accessed October 6, 2014.
all/apis?order=field_popularity.
14. Facebook, Facebook Platform launches,
5. Daniel Jacobson and Sangeeta Naray- May 27, 2007, http://web.archive.org/
anan, Netflix API: Top 10 lessons learned (so web/20110522075406/http:/developers.
far), July 24, 2014, Slideshare, http:// facebook.com/blog/post/21, October 6, 2014.
www.slideshare.net/danieljacobson/
top-10-lessons-learned-from-the-netflix-api- 15. Netflix, “Q2 14 letter to shareholders,” July 21,
oscon-2014?utm_content=buffer90883&utm_ 2014, http://files.shareholder.com/downloads/
medium=social&utm_source=twitter. NFLX/3530109523x0x769749/8bc987c9-
com&utm_campaign=buffer, ac- 70a3-48af-9339-bdad1393e322/
cessed November 10, 2014. July2014EarningsLetter_7.21.14_final.
pdf, accessed October 8, 2014.
6. Thomas H. Davenport and Bala Iyer, “Move
beyond enterprise IT to an API strategy,” 16. Daniel Jacobson, Top 10 lessons learned from
Harvard Business Review, August 6, 2013, the Neflix API—OSCON 2014, July 24, 2014,
https://hbr.org/2013/08/move-beyond-enter- Slideshare, http://www.slideshare.net/danielja-
prise-it-to-a/, accessed November 10, 2014. cobson/top-10-lessons-learned-from-the-netf-
lix-api-oscon-2014, accessed October 8, 2014.
7. See ProgrammableWeb, http://www.
programmableweb.com/category/ 17. Ibid.
travel/apis?category=19965. 18. Ibid.
8. Alex Howard, “Welcome to data transpar- 19. Netflix, “Form 10-K annual report,” Febru-
ency in real estate, where possibilities and ary 3, 2014, http://ir.netflix.com/secfiling.
challenges await,” TechRepublic, April 30, cfm?filingID=1065280-14-6&CIK=1065280,
2014, http://www.techrepublic.com/article/ accessed December 17, 2014.
welcome-to-data-transparency-in-real- 20. Daniel Jacobson, “The evolution of
estate-where-possibilities-and-challenges- your API and its value,” October 18,
await/, accessed November 10, 2014. 2013, YouTube, https://www.youtube.
9. Deloitte University Press, Tech Trends 2015: com/watch?v=oseed51WcFE, ac-
The fusion of business and IT, February 3, 2015. cessed October 8, 2014.
10. Daniel Jacobson and Sangeeta Narayanan, 21. Megan Garber, “Even non-nerds should
Netflix API: Top 10 lessons learned (so far). care that Netflix broke up with develop-
11. Kin Lane, History of APIs, June ers,” Atlantic, June 17, 2014, http://www.
2013, https://s3.amazonaws.com/ theatlantic.com/technology/archive/2014/06/
kinlane-productions/whitepapers/ even-non-nerds-should-care-that-netflix-
API+Evangelist+-+History+of+APis. just-broke-up-with-developers/372926/,
pdf, accessed October 6, 2014. accessed December 17, 2014.
36
API economy
37
Ambient computing
Ambient computing
Putting the Internet of Things to work
T HE Internet of Things (IoT) is maturing some only vaguely understand its full potential.
from its awkward adolescent phase. More To realize that potential, organizations should
than 15 years ago, Kevin Ashton purportedly look beyond physical “things” and the role of
coined the term he describes as the potential sensors, machines, and other devices as signals
of machines and other devices to supplant and actuators. Important developments, no
humans as the primary means of collecting, doubt, but only part of the puzzle. Innovation
processing, and interpreting the data that make comes from bringing together the parts to
up the Internet. Even in its earliest days, its do something of value differently—seeing,
potential was grounded in business context; understanding, and reacting to the world
Ashton’s reference to the Internet of Things around them on their own or alongside their
was in a presentation to a global consumer human counterparts.
products company pitching RFID-driven Ambient computing is about embracing
supply chain transformation.1 And the idea of this backdrop of sensing and potential action-
the IoT has existed for decades in the minds taking with an ecosystem of things that can
of science fiction writers—from the starship respond to what’s actually happening in
Enterprise to The Jetsons. the business—not just static, pre-defined
Cut to 2015. The Internet of Things is workflows, control scripts, and operating
pulling up alongside cloud and big data as procedures. That requires capabilities to:
a rallying cry for looming, seismic IT shifts.
• Integrate information flow between varying
Although rooted more in reality than hype,
types of devices from a wide range of
these shifts are waiting for simple, compelling
global manufacturers with proprietary data
scenarios to turn potential into business
and technologies
impact. Companies are exploring the IoT, but
39
Tech Trends 2015: The fusion of business and IT
40
Ambient computing
Source: a Deloitte Development LLC, The Internet of Things Ecosystem: Unlocking the business value of connected devices, 2014,
http://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/internet-of-things-iot-enterprise-value-report.html,
accessed January 7, 2015.
41
Tech Trends 2015: The fusion of business and IT
fuel burn, terrain, and other traffic. The gains management practices that allow sharing and
include faster-rolling trains, preemptive provide strategies for sensing and storing the
maintenance cycles, and the ability to expedite torrent of new information coming from the
the staging and loading of cargo.4 newly connected landscape. Objects can create
The GE example highlights the need for terabytes of data every day that then need to
cooperation and communication among be processed and staged to become the basis
a wide range of devices, vendors, and for decision making. Architectural patterns
players—from partners to competitors, from are emerging with varying philosophies:
customers to adjacent parties (for example, embedding intelligence at the edge (on or
telecommunication carriers and mobile near virtually every device), in the network,
providers). The power of ambient computing is using a cloud broker, or back at the enterprise
partially driven by Metcalfe’s Law, which posits hub. One size may not fit all for a given
that the value of a network is the square of the organization. Use cases and expected business
number of participants in it. Many of the more outcomes should anchor the right answer.
compelling potential scenarios spill across The final piece of the puzzle might be the
organizational boundaries, either between most important: how to put the intelligent
departments within a company, or through nodes and derived insights to work. Again,
cooperation with external parties. Blurry options vary. Centralized efforts seek to apply
boundaries can fragment sponsorship, diffuse process management engines to automate
investment commitments, and constrain sensing, decision making, and responses
ambitions. They can also lead to isolationism across the network. Another approach is
and incrementalism because the effort is decentralized automation, which embeds rules
bounded by what an organization directly engines at the endpoints and allows individual
controls rather than by the broader analytics, nodes to take action.
integration, and orchestration capabilities In many cases, though, ambient
that will be required for more sophisticated computing is a sophisticated enabler of
forays into ambient computing. Ecosystems amplified intelligence5 in which applications
will likely need to evolve and promote or visualizations empower humans to act
industry standards, encourage sharing through differently. The machine age may be upon
consortia, and move away from proprietary us—decoupling our awareness of the world
inclinations by mandating open, standards- from mankind’s dependency on consciously
based products from third parties. observing and recording what is happening.
Ambient computing involves more than But machine automation only sets the stage.
rolling out more complete and automated Real impact, business or civic, will come from
ways to collect information about real-world combining data and relevant sensors, things,
behavior. It also turns to historical and social and people so lives can be lived better, work
data to detect patterns, predict behaviors, can be performed differently, and the rules of
and drive improvements. Data disciplines competition can be rewired.
are essential, including master data and core
42
Ambient computing
43
Tech Trends 2015: The fusion of business and IT
Similarly, the IoT is stretching telematics device can track the temperature, wind speed,
beyond devices that monitor driving behaviors and mechanical vibrations as they affect the
to devices that promote safe, low-risk driving house, as well as humidity, which could cause
habits. The ability to provide active feedback mold in the walls. Based on these recordings,
to drivers—when they are speeding, braking the device can identify conditions that “have
too hard, cornering aggressively, or displaying led to damage or destruction of the building”
other high-risk driving behaviors—has or can “forecast the possibility of future
the potential to change driving behaviors damage or destruction.”iv With real-time data,
materially. The result: safer drivers, lower insurers not only have the ability to prevent
frequencies and severities of accidents, and claims, but also streamline claims processing
ultimately a reduced loss ratio for insurers (not and better detect and manage fraud.
to mention lower premiums for policyholders).
The implications of ambient computing on Better data = Better decisions
the insurance industry stretch beyond simply
For decades, insurance companies have
personal life experiences. Applications in
craved data. Their thesis: The more data
commercial lines include high-tech sensors in
procured, the better chance of predicting
agricultural fields to provide farmers with data
the likelihood and severity of losses.v The
on crop health, soil condition, environmental
emergence of the IoT, telematics, and external
conditions, and pest infestations. Access to
data sources has only increased insurers’
this data provides insurers with an opportunity
appetite for data. In just a few short years,
to become business partners with their
insurance companies have started to capitalize
agricultural clients by offering services that
on the IoT by embracing the real-life and real-
better analyze data to help farmers improve
time output generated from these technologies.
productivity while gaining a more accurate
Now the questions are: When do insurers
picture of the risk exposure.
begin driving the design and sales of these
smart devices? Who will be the first to partner
Controlling losses with a product like Google Nest to inform the
IoT capabilities are providing insurers data collection process? Who will take the
with more sophisticated ways to control concept of, for example, Progressive’s Snapshot
underwriting losses. For example, the average telematics program and expand it across
cooking fire claim damage is around $30,000iii personal and commercial lines?
and even if provided with the best possible
Footnotes
customer experience, it’s simply a claim that i
Richard Evans, “Google adds car insurance to price
no homeowner ever wants to experience. To comparison service”, The Telegraph, September 10, 2012,
lower the average cost per claim and help http://www.telegraph.co.uk/finance/personalfinance/
insurance/motorinsurance/9533097/Google-adds-car-
homeowners reduce the impact of household insurance-to-price-comparison-service.html, accessed May
fires, insurers have begun partnering with 12, 2015.
ii
Google, “Compare Auto Insurance”, https://www.google.
home security and monitoring services to com/compare/autoinsurance/form?p=home, accessed May
“wire” homes to prevent fires before they have 12, 2015.
iii
“ Nationwide: Average Cooking Fire Claim Tops
the opportunity to cause significant damage. $30,000”, Insurance Journal, October 9, 2012, http://www.
Additionally, the IoT has the potential to insurancejournal.com/news/national/2012/10/09/266014.
htm, accessed May 12, 2015.
provide insurers with more accurate and more iv
Ajith Sankaran, “Internet of Things: A bane or boon for the
timely data to prevent losses. For example, insurance sector?”, The Future of Commerce, October 8,
USAA has a patent for a data recorder that 2014, http://www.the-future-of-commerce.com/2014/10/08/
internet-of-things-a-bane-or-boon-for-insurance-sector/,
can be installed in homes for observation. The accessed May 12, 2015.
v
Stuart Rose, “Analytics And The Analytical Insurer”, Society
of Actuaries, October 2013, https://www.soa.org/News-and-
Publications/Newsletters/Compact/2013/october/Analytics-
And-The-Analytical-Insurer.aspx, accessed May 12, 2015.
44
Ambient computing
From meters to networks visibility into usage for any given residence or
commercial location.
ComEd, an Exelon company that provides
ComEd is also developing a suite of services
electricity to 3.8 million customers in
that will make it possible for customers to view
Northern Illinois,6 is in the midst of a $2.6
their own energy usage (including itemized
billion smart grid project to modernize aging
energy costs per appliance). The goal of these
infrastructure and install smart meters for all
services is to help individuals proactively
of its customers by 2018.7 The primary goals
regulate their own power consumption and
of this undertaking are to enhance operational
achieve greater efficiency during periods of
efficiency and to provide customers with the
peak power usage.
information and tools to better manage their
As the smart grid project progresses,
energy consumption and costs. Featuring
ComEd leaders remain strategic and flexible.
advanced meter infrastructure (AMI), the
When opportunities to accommodate future
new meters reduce electricity theft and
technological advances emerge, they adapt
consumption on inactive meters, reduce the
their approaches accordingly. For example,
number of estimated electric bills, minimize
when it installed a network of AMI access
energy loss, and reduce the need for manual
points, the company decided to place the
meter reading. Numerous operational
network physically higher than needed at the
efficiencies and benefits are emerging. For
time. Why? Because doing so could make it
example, on Chicago’s south side, AMI meter
possible to repurpose the existing residential
reading has increased the percentage of meters
mesh network, should the opportunity ever
read from 60 percent to 98 percent. Last year,
arise. And one year later, the company is
ComEd was given the green light by the Illinois
piloting new LED streetlights powered by the
Commerce Commission to accelerate its smart
repurposed mesh network.
meter installation program, thus making it
With ambient computing advancing more
possible to complete the project three years
rapidly each year, ComEd’s leaders are keeping
ahead of schedule.8
their options open and the new smart grid
The smart grid effort will also improve
system as flexible as possible in order to take
ComEd’s ability to maintain its overall
advantage of new improvements, devices, and
infrastructure. Real-time visibility into
opportunities that may emerge.
transformers, feeders, and meters will help
the company detect, isolate, and resolve
maintenance incidents more efficiently. Home sweet conscious home
Other smart grid components will improve The makers at Nest Labs view embedded
communications among field services sensors and connectivity as a means to an end,
technicians, operators, and even customers. not as ends unto themselves. Their vision is
Analytics, residing atop integration and one of a “conscious home” that emphasizes
event processing layers, will form an integral comfort, safety, and energy savings. Many
part of the company’s ambient computing products in the broader Internet of Things
platform. Security and privacy capabilities space focus on raw technology features.
will help protect against attacks to critical However, Maxime Veron, Nest’s head of
infrastructure by providing the company product marketing, downplays the technology
with remote access to individual meters and aspects of Nest’s offerings, noting: “The
45
Tech Trends 2015: The fusion of business and IT
fact that your device is connected does not experiences. Nest Labs, acquired by Google in
automatically make it a better product.” 2014, has kept the majority of its development
A case in point is the Nest Learning in-house, believing that applying the same
Thermostat—a next-generation wall standards and rigor to its design process
thermostat that uses occupancy sensors, from beginning to end—including hardware,
on-device learning, cloud-based analytics, and software, external data inputs, sensors, and app
Web services to learn an occupant’s schedule development—will ultimately result in a more
and integrate into his or her life. The company powerful experience for customers inhabiting a
designs customer experiences that focus on “conscious home.”
usability from the point of installation: The
thermostat features snap connectors for wiring, No more circling the block
includes a carpenter’s level built into the base
Many of us have had a parking experience
of the unit to ease finishing, and comes with
so bad that we avoid the area in the future,
a multi-head screwdriver to help installers
opting for restaurants or stores that do not
more easily replace legacy hardware. The
require a frustrating parking lot tour. And
thermostat’s operation similarly evokes the
because parking tickets and meter fees are
qualities of ambient computing in that the
often considerable sources of revenue for
complexity of sensing, learning from occupant
cities overseeing public parking and for
behavior, and self-tuning settings remains
organizations that own parking lots and
largely invisible to the user. Veron notes, “We
structures, opportunities to address commuter
don’t want to give you something to program.”
frustration, pollution, and lost sales revenue
Nest Labs is looking beyond any single
through better parking regulations may be
device toward broader platforms and services.
mismanaged or ignored altogether. Enter
The company launched a partner program to
Streetline, Inc., a San Francisco Bay-area
allow third-party products to interact with
company that helps to solve parking-
Nest products. The goal is to create more
related challenges from the ground up
intuitive ways to learn about and respond
(literally) through its mesh networking
to specific user behavior and preferences.
technology, real-time data, and platform of
For example, your car can alert the Nest
parking applications.
Thermostat to begin cooling your home at a
The Streetline approach is composed of
certain point during your evening commute.
three layers. First, when deploying its platform
Upon your arrival, the house is comfortable,
in a new location, Streetline installs sensors
but you haven’t wasted energy cooling it all day
which determine space occupancy or vacancy
long. Nest Labs’ second product, Nest Protect,
in individual parking spaces. The second
is a smoke and carbon monoxide alarm that
layer is a middleware learning platform that
can send a message to a mobile device about
merges real-time and historical sensor data
what it has detected, turn off heating by a gas
to determine the validity of a parking event
furnace when it detects a possible CO leak (if
(a true arrival or departure) and relays the
the customer has a Nest Thermostat as well),
current status of each space to the system’s
and link to the company’s Dropcam video
backend. An inference engine weeds out false
camera to save a clip of what was happening
positives such as a garbage can left in a space,
when the alarm initiated.
or a driver pulling into a parking spot for a
These scenarios involve not just
moment and then leaving. Finally, there is
connectivity and interoperability, but also
the application layer that includes a variety
advanced levels of orchestration and analytics,
of mobile and Web-based tools that deliver
as well as sophisticated but simple user
up-to-the-minute parking information to
46
Ambient computing
commuters, business owners, city officials, and What began as a desire to make life a
parking enforcement officers in or near the little easier for motorists in the congested
deployment area. streets of San Francisco is quickly becoming
Streetline’s Parker™ app guides motorists a foundational layer for the emergence
to open parking spaces, which can decrease of smarter cities and the Internet of
driving times, the number of miles traveled, Things worldwide.
and motorist frustration. Through integration
with leading mobile payment providers, the Products to platforms
Parker app enables drivers to “feed” parking
Bosch Group knows a thing or two about
meters electronically—without the hassle
disruptive technologies and their business
of searching for quarters. Furthermore,
potential. As the world’s third-largest private
motorists can add time to their meter remotely
company, it manufactures a wide range of
before time expires to avoid parking tickets.
products, from consumer goods to industrial
ParkerMap™ makes it possible for companies
equipment, including some of the building
to create online maps of available parking
blocks of ambient computing—shipping
spaces in a given area, along with lot hours
roughly 1 billion microelectromechnical
and parking rates. Using the ParkerData™
systems (MEMS) sensors in 2014. Recognizing
Availability API, cities can publish parking
the potential of the Internet of Things (IoT),
information on dynamic signage, strategically
its vision has been embedding connectivity
placed around a city. Combined, these different
and intelligence in products across its 350-plus
methods of way-finding help consumers find
business units.
parking more quickly, increasing parking space
In 2008, the company launched Bosch
turnover—and thereby potentially driving
Software Innovations (Bosch SI), a business
increases in foot traffic and sales among local
unit dedicated to pioneering IoT and
merchants. In fact, studies have revealed
ambient computing solutions for industrial
that smart parking systems can improve the
environments. “We are trying to bring
local economy, as evidenced by a 12 percent
130 years of manufacturing experience to
increase in merchant sales tax revenue in
connectivity,” says Troy Foster, Bosch SI CTO
one of Streetline’s customer cities.9 Moreover,
Americas. Bosch SI approaches its mission
the cities, universities, and companies that
from an enterprise software perspective—
own parking in a given area can get access to
looking beyond the device to enable the
information about utilization and consumer
kind of business intelligence, processes, and
trends, as well as recommendations for better
decision making that drive value from data.
parking policies and pricing. Law enforcement
To that end, Bosch SI’s IoT platform
also has access to similar information, helping
is composed of four primary software
enforcement officers increase their productivity
components: a machine-to-machine layer,
and efficiency by as much 150 percent.10
business process management, business rules
Streetline’s products are deployed in
management, and an analytics engine. The
40 locations globally, and the company is
IoT system was designed to accommodate
currently exploring ways to increase the
growing data volumes as sensors get smaller
pace of adoption through new use cases,
and cheaper, spurring wider deployment.
sponsorships, and a monetized API. It is
Configurable rules allow evolving, actionable
also exploring the capture of new data types
insights to be deployed.
including ground surface temperature, noise
For example, Bosch SI is currently
level, air quality, and water pressure, to name
developing preventative maintenance
a few.
47
Tech Trends 2015: The fusion of business and IT
solutions that leverage IoT predictive analytics for example, perform. Traditionally, they only
capabilities to analyze system and performance got that information when the car was in for
data generated by sensors embedded in maintenance. Now sensors and telematics can
industrial equipment. The goal is to predict convey that data directly to the manufacturers.
equipment failures and perform maintenance Using similar technology, Bosch helps
proactively to address potential issues. Costs insurance companies move to usage-based
mount quickly when a manufacturing line coverage models instead of using hypothetical
goes down or mining equipment in a remote approximations of risk.
location fails; preventing incidents can save Beyond improving existing products and
customers considerable sums of money. processes and helping manufacturers work
Other examples include improved visibility more efficiently, the IoT is enabling new
of deployed equipment in the field—from business models. “We are looking at many
factory equipment to vending machines. different pieces including smart homes, micro
Bosch SI also helps automobile manufacturers grids, and usage-based car insurance, to name
and their suppliers refine and improve a few,” Foster says. “Many business ideas and
their products. To do that, they need data models that were considered prohibitively
from cars in operation to understand how expensive or unrealistic are viable now thanks
components such as a transmission system, to advances in IoT.”
48
Ambient computing
My take
49
Tech Trends 2015: The fusion of business and IT
Cyber implications
Enabling the Internet of Things requires a number of logical and physical layers, working seamlessly
together. Device sensors, communication chips, and networks are only the beginning. The additional
services in ambient computing add even more layers: integration, orchestration, analytics, event
processing, and rules engines. Finally, there is the business layer—the people and processes bringing
business scenarios to life. Between each layer is a seam, and there are cyber security risks within each
layer and in each seam.
One of the more obvious cyber security implications is an explosion of potential vulnerabilities,
often in objects that historically lacked connectivity and embedded intelligence. For example,
machinery, facilities, fleets, and employees may now include multiple sensors and signals, all of which
can potentially be compromised. CIOs can take steps to keep assets safe by considering cyber logistics
before placing them in the IT environment. Ideally, manufacturing and distribution processes have
the appropriate controls. Where they don’t, securing devices can require risky, potentially disruptive
retrofitting. Such precautionary steps may be complicated by the fact that physical access to connected
devices may be difficult to secure, which leaves the door open to new threat vectors. What’s more,
in order to protect against machines being maliciously prompted to act against the interests of the
organization or its constituencies, IT leaders should be extra cautious when ambient computing
scenarios move from signal detection to actuation—a state in which devices automatically make
decisions and take actions on behalf of the company.
Taking a broad approach to securing ambient computing requires moving from compliance to
proactive risk management. Continuously measuring activities against a baseline of expected behavior
can help detect anomalies by providing visibility across layers and into seams. For example, a connected
piece of construction equipment has a fairly exhaustive set of expected behaviors, such as its location,
hours of operation, average speed, and what data it reports. Detecting anything outside of anticipated
norms can trigger a range of responses, from simply logging a potential issue to sending a remote kill
signal that renders the equipment useless.
Over time, security standards will develop, but in the near term we should expect them to be
potentially as effective (or, more fittingly, ineffective) as those surrounding the Web. More elegant
approaches may eventually emerge to manage the interaction points across layers, similar to how
a secured mesh network handles access, interoperability, and monitoring across physical and
logical components.
Meanwhile, privacy concerns over tracking, data ownership, and the creation of derivative data
using advanced analytics persist. There are also a host of unresolved legal questions around liability.
For example, if a self-driving car is involved in an accident, who is at fault? The device manufacturer?
The coder of the algorithm? The human “operator”? Stifling progress is the wrong answer, but full
transparency will likely be needed while companies and regulators lay the foundation for a safe, secure,
and accepted ambient-computing tomorrow.
Finally, advanced design and engineering of feedback environments will likely be required to
help humans work better with machines, and machines work better with humans. Monitoring the
performance and reliability of ambient systems is likely to be an ongoing challenge requiring the
design of more relevant human and machine interfaces, the implementation of effective automation
algorithms, and the provisioning of helpful decision aids to augment the performance of humans and
machines working together—in ways that result in hybrid (human and technical) secure, vigilant, and
resilient attributes.
50
Ambient computing
51
Tech Trends 2015: The fusion of business and IT
52
Ambient computing
Bottom line
A MBIENT computing shouldn’t be looked at as just a natural extension of mobile and the initial
focus on the capabilities of smartphones, tablets, and wearables—though some similarities
hold. In those cases, true business value came from translating technical features into doing
things differently—or doing fundamentally different things. Since ambient computing is adding
connectivity and intelligence to objects and parts of the world that were previously “dark,” there is
less of a danger of seeing the opportunities only through the lens of today’s existing processes and
problems. However, the expansive possibilities and wide-ranging impact of compelling scenarios in
industries such as retail, manufacturing, health care, and the public sector make realizing tomorrow’s
potential difficult. But not impossible. Depending on the scenario, the benefits could be in efficiency
or innovation, or even a balance of cost reduction and revenue generation. Business leaders should
elevate discussions from the “Internet of Things” to the power of ambient computing by finding a
concrete business problem to explore, measurably proving the value, and laying the foundation to
leverage the new machine age for true business disruption.
Authors
Andy Daecher, principal, Deloitte Consulting LLP
53
Tech Trends 2015: The fusion of business and IT
Endnotes
1. Kevin Ashton, “That ‘Internet of Things’ 11. Object Management Group (OMG), “OMG
thing,” RFID Journal, June 22, 2009, and the IIOT,” http://www.omg.org/hot-topics/
http://www.rfidjournal.com/articles/ iot-standards.htm, accessed January 9, 2015.
view?4986, accessed November 12, 2014. 12. Industrial Internet Consortium, http://www.
2. Karen A. Frenkel, “12 obstacles to the Internet iiconsortium.org/, accessed January 9, 2015.
of Things,” CIO Insight, July 30, 2014, http:// 13. Food and Agricultural Organization of the
www.cioinsight.com/it-strategy/infrastructure/ United Nations, Mitigation of food wastage: So-
slideshows/12-obstacles-to-the-internet-of- cietal costs and benefits, 2014, http://www.fao.
things.html, accessed November 12, 2014. org/3/a-i3989e.pdf, accessed January 9, 2015.
3. Cisco Systems, Inc., Embracing the Internet of 14. Clint Witchalls, “The Internet of Things
Everything to capture your share of $14.4 tril- business index,” Economist, October 29,
lion, February 12, 2013, http://www.cisco.com/ 2013, http://www.economistinsights.
web/about/ac79/docs/innov/IoE_Economy. com/analysis/internet-things-business-
pdf, accessed November 12, 2014. index, accessed November 12, 2014.
4. Jon Gertner, “Behind GE’s vision for 15. Nick Jones, The Internet of Things will
the industrial Internet Of Things,” Fast demand new application architectures, skills
Company, June 18, 2014, http://www. and tools, Gartner, Inc., April 1, 2014.
fastcompany.com/3031272/can-jeff-
immelt-really-make-the-world-1-better, 16. Jungah Lee, “Samsung hunts for next hit with
accessed November 10, 2014. Internet push as phones fade” Bloomberg,
November 17, 2014, http://www.bloomberg.
5. Deloitte University Press, Tech Trends 2015: com/news/2014-11-16/samsung-hunts-
The fusion of business and IT, February 3, 2015. next-hit-with-internet-push-as-phones-fade.
6. ComEd, Company profile: A company shaped html, accessed December 2, 2014.
by customers and employees, https://www. 17. General Electric (GE), Industrial Internet:
comed.com/about-us/company-information/ Pushing the boundaries of minds and
Pages/default.aspx, accessed January 9, 2015. machines, November 26, 2012. http://www.
7. ComEd, Smart grid program supports more ge.com/docs/chapters/Industrial_Internet.
than 2,800 jobs in 2013, press release, April pdf, accessed November 12, 2014.
3, 2014, https://www.comed.com/news- 18. Including reduced costs, increased revenues,
room/Pages/newsroomreleases_04032014. and changes in market share; Cisco Systems,
pdf, accessed January 9, 2015. Inc., Embracing the Internet of Everything
8. ComEd, ComEd receives approval to ac- to capture your share of $14.4 trillion.
celerate smart meter installation, benefits, 19. Rowan Curran, Brief: Bringing interoper-
press release, June 11, 2014, https://www. ability to the Internet Of Things, For-
comed.com/newsroom/Pages/newsroomre- rester Research, Inc., July 24, 2014.
leases_06112014.pdf, accessed January 9, 2015.
20. Deloitte Consulting LLP, Tech Trends 2013:
9. Streetline, Success Story: Ellicott City, Maryland, Elements of postdigital, 2013, chapter 5.
http://www.streetline.com/success-story-elli-
cott-city-maryland/, accessed January 13, 2015. 21. Stephen Lawson, “Why Internet of Things
‘standards’ got more confusing in 2014,”
10. Streetline, Becoming a smart city, http:// PCWorld, December 24, 2014, http://www.
www.streetline.com/downloads/Smart-City- pcworld.com/article/2863572/iot-groups-
Whitepaper.pdf, accessed January 9, 2015. are-like-an-orchestra-tuning-up-the-music-
starts-in-2016.html, accessed January 9, 2015.
54
Ambient computing
55
Dimensional marketing
Dimensional
marketing
New rules for the digital age
57
Tech Trends 2015: The fusion of business and IT
58
Dimensional marketing
marketing will help make marketing better, the use of standalone tools in areas such as
faster, and more cost-effective while better campaign automation and bid management
aligning marketers with the marketplace, not systems—indicative of the trend to understand
to mention enterprise objectives, through individuals versus broad segments.
richer, more reliable metrics.”7 And a recent
Teradata survey found that 78 percent of Channel orchestration is
marketers feel pressure to become more data- multidimensional: The
driven, with 45 percent agreeing that data is technology revolution
the most underutilized asset in the marketing Channels and customer touchpoints
organization.8 Real-time analysis can drive are constantly multiplying. Marketers now
adjustments and improvements to marketing own or manage the marketing platforms,
campaigns and promotions. Intelligence architecture, and integration required to
gives us the technical capability to close the provide a consistent experience across
loop and measure real business results by channels. Although marketing has evolved
providing multiple ways to interpret and make from broadcast to interactivity and now finally
use of data. Better targeting and visibility to digital, many organizational capabilities
across the full customer life cycle enhances still remain in silos. With dimensional
brand
manufa
ment ctu
rin
lop rketing g
ve ma
research & development
de
h&
arc
pric
manufacturing
rese
ing
pricing
se rv
sales
es
sa l
ice
&
fulfillment
pp
su
or
t
e nt
marketing f u lfil l m
59
Tech Trends 2015: The fusion of business and IT
marketing, traditional, digital, customer, and • Channels: offline and online and across
enabling business systems are converging paid, earned, and owned media
into one integrated offering that operates
simultaneously in harmony. This harmony • Context: based on the individual’s behavior,
demands platforms that are deliberately preferences, location, and other cues
designed to accommodate multiple devices and
touchpoints. Contextual architecture should • Campaigns: pricing, promotions, and offers
provide data, images, video, and transactions tailored to an individual in a specific point
dynamically—and be based not just on who in time
the customers are, but where they are, what
they’ve done, and what they’re likely to • Content: internally and externally sourced,
want next. with increasing focus on social media and
video, and optimized for mobile
A digital platform divided CIOs should be prepared for a sizeable
The stage is set for technology and increase in marketing technology initiatives—
analytics to play a more impactful role akin to the wave of automation in the worlds
in this new world—delivering seamless, of finance and supply chain. Marketing’s
contextual, and hyper-targeted customer and expanded scope will likely require changes
prospect experiences, and helping marketing far beyond traditional marketing systems,
departments repatriate duties from agencies with integration into CRM and ERP systems
through their own capabilities for automation, in areas such as pricing, inventory, order
precision, and efficiency. CMOs, working in management, and product R&D. And, as
partnership with CIOs, should command analytics, mobile, social, and the Web become
a richer, data-driven, targeted repertoire marketing’s digital battleground, CIOs should
of campaigns, promotions, and properties expect aggressive pushes in these areas. These
across multiple channels for varied customer forays could affect the organization’s enterprise
types and objectives. Customer awareness, strategy in each domain. CIOs should not
acquisition, conversion, and retention settle for being responsive, informed parties as
are top priorities and require attention the revolution unfolds; they should be seen as a
and investment.9 strategist and act as a catalyst.
Organization-wide platforms to target,
provision, deploy, and measure digital assets
are needed and should be integrated across:
60
Dimensional marketing
Marketing has evolved significantly in the To begin with, insurers should embrace the
last half-decade, and the nature of marketing reality that regardless of their sales model, they
for insurance is further complicated by the are in a consumer business. The marketing
relationship between insurers, intermediaries, levers of the past no longer work the same
and, ultimately, policyholders and the limited way. It is not enough to run 30-second TV
ongoing engagement with their end consumers. commercials, send direct mail, or give captive
Many insurance companies are seeing agents logo files and collateral materials. The
the value of fully leveraging these consumer front office of marketing has been recast
relationships, regardless of their go-to-market around the dimensions of connectivity and
model. This increasing value is core for those engagement—whether for the broker, the
companies, which are direct-to-consumer indirect consumer, or the direct consumer. At
sellers. However, for companies that sell the same time, marketing’s back office has
through brokers and agents, the potential been transformed by new technologies, such
impact of direct-to-consumer marketing is as telematics, and fueled by the enhanced data
even greater. Traditional models of sales and and analytics layer on top of the telematics
marketing are transforming into different platform. Within insurance, we know so
paradigms of engagement. A three-way much more about the consumer and can tailor
business-to-consumer-to-business model product and price accordingly.
of marketing, centered on the way insurers So what can this mean to insurers?
create more preference and relevance for the Regardless of the sales approach, whether
brand through agents to the consumers, is direct or led by a broker or another
emerging. Insurers can bring more value to intermediary, insurance companies can
intermediaries by making it easier to write and increase development of direct channels: lead
sell policies to customers. And insurers can management, sales, servicing, and retention.
also partner with agents to sell personalized And all of these extend to agents as much as
and relevant products to specific, individual they do to direct consumer sales.
consumers.
What can all of this mean for the chief
marketing officer? And the CIO? Is it
enough to focus marketing efforts on brand
recognition, but leave the customer in the
hands of a broker? When do capabilities go
beyond just doing the job, and go to building
deeper, trusted relationships? What is the
role of brand today, and more importantly,
what is the role of marketing in an insurance
organization?
61
Tech Trends 2015: The fusion of business and IT
Footnote
Automatic Labs, https://www.automatic.com/, accessed
i
62
Dimensional marketing
63
Tech Trends 2015: The fusion of business and IT
automated, programmatic media buying and it has been ever since,” says Gerd Schenkel,
and placement. Instead of relying on static, Executive Director, Telstra Digital. One of
predefined customer segments, algorithms the other changes facing the industry was the
make decisions on media buying and increase of digital channels and service options
placement based on real-time information— for customers. “Our customers’ digital choices
blending audience analysis, campaign continue to increase, so we needed to make
management, pricing optimization, and sure we were offering digital solutions our
dynamic budget allocation. customers valued.”
Rocket Fuel also provides ways to link Telstra’s multifaceted approach for creating
channels across a full customer lifecycle. a high-quality online experience for customers
A telecommunications customer using the leverages data, digital tools, and dimensional
platform can drive placement of banner ads marketing techniques to transform customer
timed to coincide with delivery of direct mail engagement, service, and the traditional
offers, or send a text-based offer to speak to a vendor-customer relationship. The first
live customer service representative if a high- step—one that is ongoing—was to learn more
value customer visits the company’s website about what customers wanted in a digital
multiple times in a day. experience: specifically, how operational data
John Nardone, Rocket Fuel executive vice can be turned into insights in ways customers
president and general manager, says, “The goal find not just acceptable, but valuable. An
needs to be relevance, not personalization.” example comes from smartphone users: As
Consumers may not respond to something customers continue to consume more and
simply addressed to them, but they will more data, it is important to be transparent
likely respond to something relevant to their with customers about their usage to help
lives, tastes, and desires. In a time of generic prevent bill shock. Through digital channels,
junk mail, spam, and ubiquitous banner ads, Telstra is in a position to proactively approach
understanding who each consumer is, what customers with early warnings of potential
motivates them, and what their unique needs billing implications, as well as to trigger offers
are matters more than ever. Rocket Fuel’s tailored to their individual needs. Doing this
platform helps to drive contextual interactions yielded a valuable insight: With dimensional
across channels—online and off. marketing, traditional boundaries between
marketing, sales, and service are disappearing.
Digital first Almost every customer touchpoint presents
opportunities to market, sell, and provide
Six years ago, Telstra, Australia’s largest
service. When service improves, customer
telecommunications and information services
satisfaction typically rises. Sales will
provider, needed to find a new strategy to
likely follow.
remain competitive. In 2010, Telstra was
On the service front, Telstra is taking a
facing declining revenues and narrowing profit
similar proactive, data-centric approach. By
margins. The overall market was changing,
tracking and analyzing customer support data,
with customers dropping fixed-line services.
Telstra discovered that customers often require
The internal and external environment was
additional support with billing and similar
shifting: the company had completed a multi-
inquiries that depend on the company’s legacy
year privatization, competition was rising, and
back-end systems. Telstra is now routinely
non-traditional competitors in the digital space
measuring current and expected customer
were emerging.
experiences, resolving issues, and proactively
“The company decided that focusing on
contacting the customer.
customers should be our number-one priority,
64
Dimensional marketing
In sales, Telstra has launched the ability event. This would allow a Telstra representative
to push tailored offers to customers using to see a customer’s history, usage, service
the company website. It has also deployed issues, preferences, past interactions—and,
several algorithms to proactively offer online with permission, even social media activity
customers live chat with a sales representative and a photograph. This broad, detailed view of
if it appears that they need help. The company the customer should help the company provide
plans to extend this capability to its service a more consistent experience and better satisfy
pages. A similar focus has been placed on customer needs. For example, rather than
connectivity. Telstra’s “CrowdSupport®”11 greeting customers with a generic “How may
community and “Mobile Insider” program are I help you?,” having such data readily available
activating influencers and advocates, soliciting could allow employees to greet them and
more than 200,000 pieces of user-created provide an update on what is being done to
content for servicing, product demonstrations, address their specific concerns.
and broader brand promotion. Schenkel says that, though Telstra is still
Telstra’s most recent initiative, “Digital in the early stages of its digital journey, its
First,” will build a digital ecosystem designed to initiatives have already begun to pay off.
elevate customer engagement by empowering “They’ve delivered significant value. What’s
both the customer and the company. The more, Telstra customers continue to be
ecosystem aims to consolidate customer data happier with their online experiences, with all
into a single, detailed profile available for any key digital satisfaction measures improving
interaction across online and offline channels: considerably in 2014.”
website, call center, retail store, or a service
65
Tech Trends 2015: The fusion of business and IT
My take
Ann Lewnes, chief marketing officer,
Adobe
Over the past few years, data and visibility into data Increasingly, companies are using marketing to drive
have, in large part, transformed virtually everything digital strategies. Moreover, the expanding scope of
about marketing. In this new customer-focused, dimensional marketing is driving increased connectivity
data-driven environment, marketing is mission- among various enterprise groups. For example, at
critical: Adobe’s overall success is partly contingent on Adobe, marketing and IT are collaborating in ways
marketing’s ability to deliver personalized, engaging that move the entire company forward. Historically,
experiences across all channels. these two groups were isolated from each other;
marketing bought its own technology and software
The need to create such experiences has led us and kept them relatively siloed, apart from the core.
to develop an even deeper understanding of our Today, marketing’s systems integrate into corporate
customers, and to construct advanced platforms for systems. If you want to develop a comprehensive,
creating, deploying, and measuring dynamic content. data-driven view of customers, you need access to
Along the way, we’ve also pursued opportunities to customer data in CRM, financial databases, and other
leverage technology to improve marketing’s systems. And, while marketing has its own group that
back office, as well as to evolve our conducts Web analytics and insights, we rely on IT
relationships with traditional agencies. to provide integration, data platforms, visualization,
and security.
Roughly 95 percent of Adobe’s
customers visit our website, It is critical to team with the CIO and the broader IT
which translates to more than organization. Luckily, Adobe’s IT organization very
650 million unique visits each much wants to support marketing’s strategies and
month. A variety of applications efforts, which has helped the relationship between our
make it possible for us to know two groups evolve into one of shared responsibility.
who these customers are,
what they do during each visit, Digital marketing has fundamentally transformed the
and—through integration with way we think about marketing’s mission and the way
social channels—whom they are we work to fulfill it. It took us a long time to get to
connected with. We have applied where we are today, and the journey was not without
personalization and behavioral challenges. Along the way, we had to retool the
targeting capabilities, which help us organization and reskill our people. But now we’ve
provide more engaging experiences arrived at a good place, and we have instilled a strong
based on individual preferences. We have sense of confidence and motivation throughout the
also layered in predictive and econometric marketing organization. Though in the past we may
modeling capabilities, opening the door for assessing have been somewhat of an organizational outlier,
the ROI of our marketing campaigns. Whereas 10 today we are proud to have our identity woven
years ago, marketing may have been perceived as throughout the fabric of the Adobe organization.
something intangible or unquantifiable, we now
have hard evidence of our contribution to the
company’s success.
66
Dimensional marketing
Cyber implications
D IGITAL has changed the scope, rules, and tools of marketing. At the center are customers and the
digital exhaust they leave as they work, shop, and play. This can be valuable information to drive
the new dimensions of marketing: connectivity, engagement, and insight. But it also creates security and
privacy risks.
“Fair and limited use” is the starting point—for data you’ve collected, for data individuals have
chosen to share, for derived data, and for data acquired from third-party partners or services. There
are questions of what a company has permission to do with data. Laws differ across geographies and
industries, informed by both consumer protection statutes and broader regulatory and compliance laws.
Liability is not dependent on being the source of or retaining data; controls need to extend to feeds
being scanned for analytics purposes and data/services being invoked to augment transactions. This is
especially critical, as creating composites of information may turn what were individually innocuous bits
of data into legally binding personally identifiable information (PII).
Privacy concerns may limit the degree of personalization used for offerings and outreach even
when within the bounds of the law. Even if the information is publicly available, customers may cry
“Big Brother” if it seems that an inappropriate amount of personal information has been gleaned or
a threshold level of intimacy has been breached. Derived data can provide insights into individual
behavior, preferences, and tendencies, which in the hands of marketers and product managers is
invaluable. In the context of cyber security, these insights can also help organizations identify potential
risks. Organizations should clearly communicate to customers the policies and boundaries that govern
what data is being collected and how it will be used.
Public policies, privacy awareness programs, and end-user license agreements are a good start.
But they need to be joined with explicit governance and controls to guide, monitor, and police usage.
User, system, and data-level credentials and entitlements can be used to manage trust and appropriate
access to raw transactions and data. Security and privacy controls can be embedded within content,
integration, and data layers—moving the mechanics into the background so that CMOs and marketing
departments inherit leading practices. The CISO and CIO can bake cyber security into the fabric of how
new services are delivered, and put some level of policy and controls in place.
Finally, understanding your organization’s threat beacon can help direct limited cyber security
resources toward the more likely vectors of attack. Dimensional marketing expands the pool of
potentially valuable customer information. Organizations that are pivoting their core business into
digital assets and offerings only complicate the matter. Core product IP and the digital supply chain
come into play as digital marketing becomes inseparable from ordering, provisioning, fulfillment,
billing, and servicing digital goods and services.
Asset and rights management may be new problems marketing has not traditionally had to deal
with, but the root issues are related to the implications described above. Organizations should get ready
for the radical shift in the digital marketing landscape, or security and privacy concerns may slow or
undermine their efforts.
67
Tech Trends 2015: The fusion of business and IT
68
Dimensional marketing
• Social activation. Social media topped the can create meaningful, authentic social
list in a recent survey of digital advertisers’ campaigns. In short, social activation
spend and priorities.14 Organizations should inspire individuals to carry out
need to move from passive listening and the organization’s missions in their own
impersonal social broadcasting to social words, on their own turf, and on their
activation:15 Social activation entails precise own terms. Companies should build and
targeting of influencers, development of nurture perceptions, instead of focusing on
contextual outreach based on tangible, empty metrics such as volume or unfocused
measurable outcomes, and cultivation of sentiment.
a global social content supply chain that
69
Tech Trends 2015: The fusion of business and IT
Bottom line
G ARTNER’S 2014 CEO survey found that “CEOs rank digital marketing as the No. 1 most
important tech-enabled capability for investment over the next five years.”16 And with
marketing’s expanded scope likely including the integration of marketing systems with CRM
and ERP systems in areas such as pricing, inventory, order management, and product R&D, IT’s
mission, if they choose to accept it, is to help drive the vision, prioritization, and realization of
dimensional marketing. IT can potentially use its mission as a Trojan horse to reinvent delivery
models, technology platforms, and IT’s reputation across the business. Who better than the CMO to
help change the brand perception of the CIO? And who else but the CIO can help deliver analytics,
mobile, social, and Web while maintaining the enterprise “ilities”—security, reliability, scalability,
maintainability, and interoperability? The stage is set. It is time for the next wave of leaders to deliver.
70
Dimensional marketing
Authors
Mike Brinker, Deloitte Digital leader, Deloitte Consulting LLP
Singer is a principal at Deloitte Consulting LLP and leads the Digital Agency
offering within Deloitte Digital. With over 18 years of experience, he
brings a powerful combination of creative intuition mixed with marketing
know-how and technological acumen. Singer helps clients transform
their brand into modern multidimensional marketers with an integrated
focus on customer experience, data and insights, design, content creation,
media, production, and technology-based engagement platforms.
71
Tech Trends 2015: The fusion of business and IT
Endnotes
1. Philip Kotler and Kevin Miller, Market- 9. David Card, “What’s needed from market-
ing Management, 14th Edition (New ing clouds, part II,” Gigaom, August 31,
Jersey: Prentice Hall, 2014). 2014, http://gigaom.com/2014/08/31/
2. Internet Live Stats, http://www.internetlivestats. whats-needed-from-marketing-clouds-
com/internet-users/, accessed January 6, 2015. part-ii/, accessed January 6, 2015.
3. Pew Research Internet Project, “Mobile 10. See Anthony Ha, “BuzzFeed says new ‘flight
technology fact sheet,” http://www.pewin- mode’ campaign shows ‘The consumerization
ternet.org/fact-sheets/mobile-technology- of B2B marketing,’” TechCrunch, June 23,
fact-sheet/, accessed January 6, 2015. 2013, http://techcrunch.com/2013/06/23/
buzzfeed-flight-mode/, and Graham Gil-
4. Gene Phifer, Hype cycle for Web comput- len, “The consumerization effect: Is your
ing, 2014, Gartner, Inc., July 23, 2014. company ready for B2C buying in the B2B
5. Deloitte LLP, The omnichannel opportunity: world?,” Pragmatic Marketing, http://www.
Unlocking the power of the connected consumer, pragmaticmarketing.com/resources/the-con-
February 2014, http://www2.deloitte.com/con- sumerization-effect, accessed January 10, 2015.
tent/dam/Deloitte/uk/Documents/consumer- 11. CrowdSupport is a registered trade mark
business/unlocking-the-power-of-the-connect- of Telstra Corporation Limited.
ed-consumer.pdf, accessed January 6, 2015.
12. Deloitte Consulting LLP, Tech Trends
6. Deloitte Consulting LLP, Tech Trends 2014: In- 2015: The fusion of business and IT,
spiring disruption, chapter 7, February 6, 2014, chapter 3, February 3, 2015.
http://dupress.com/periodical/trends/tech-
trends-2014/, accessed November 10, 2014. 13. Deloitte Consulting LLP, Tech Trends 2014: In-
spiring disruption, chapter 5, February 6, 2014,
7. Adam Sarner and Jake Sorofman, http://dupress.com/periodical/trends/tech-
Hype cycle for digital marketing, trends-2014/, accessed November 10, 2014.
2014, Gartner, Inc., July 2, 2014.
14. David Card, “Sector roadmap: Marketing-
8. Teradata, 2013 Teradata data-driven marketing technology platforms,” Gigaom, August 27,
survey, global, August 5, 2013, http://assets. 2014, http://research.gigaom.com/report/
teradata.com/resourceCenter/downloads/ sector-roadmap-marketing-technology-
TeradataApplications/Survey/Teradata%20 platforms/, accessed January 6, 2015.
-%20Data-Driven%20Marketing%20
Survey%202013%20Full%20Report%20WP. 15. Deloitte Consulting LLP, Tech
pdf?processed=1, accessed January 6, 2015. Trends 2014, chapter 7.
16. Jennifer S. Beck, 2014 CEO Survey
Points to Digital Marketing’s Growing
Impact, Gartner, Inc., April 9, 2014.
72
Dimensional marketing
73
Software-defined everything
Software-defined
everything
Breaking virtualization’s final frontier
75
Tech Trends 2015: The fusion of business and IT
drive the physical movement of bits, software together support 58 percent of all workloads in
drives the data plane (the path along which 2017, more than double the number installed
bits move) and, more importantly, the control directly on physical servers.”2 This is where
plane, which routes traffic and manages the companies should focus their software-defined
required network configuration to optimize the everything efforts.
path. The physical connectivity layer becomes Yet, as you determine scope, it is important
programmable, allowing network managers— to recognize that SDDC cannot and should not
or, if appropriate, even applications—to be extended to all IT assets. Applications may
provision, deploy, and tune network resources have deep dependencies on legacy hardware.
dynamically, based on system needs. Likewise, platforms may have hooks into third-
SDN also helps manage changing party services that will complicate migrations,
connectivity needs for an increasingly complex or complexities across the stack may turn
collection of applications and end-user devices. remediation efforts into value eroders. Be
Traditional network design is optimized for deliberate about what is and is not in scope.
fixed patterns, often in a hierarchical scheme Try to link underlying infrastructure activities
that assumes predictable volume between to a broader strategy on application and
well-defined end points operating on finite delivery model modernization.
bandwidth. That was acceptable in the early
days of distributed computing and the Web. Show me the value
Today, however, many organizations must
A recent Computer Economics study found
support real-time integration across multiple
that data center operations and infrastructure
servers, services, clouds, and data stores,
consume 18 percent of IT spending, on
enable mobile devices initiating requests
average.3 Lowering total cost of ownership by
from anywhere in the world, and process
reducing hardware and redeploying supporting
huge and expanding volumes of internal and
labor is the primary goal for many SDDC
external data, which can cause traffic spikes.
efforts. Savings come from the retirement of
SDN helps manage that complexity by using
gear (servers, racks, disk and tape, routers
micro-segmenting, workload monitoring,
and switches), the shrinking of data center
programmable forwarding, and automated
footprints (lowering power consumption,
switch configuration for dynamic optimization
cooling, and, potentially, facility costs), and
and scaling.
the subsequent lowering of ongoing recurring
maintenance costs.
Software-defined everything Moving beyond pure operational concerns
The network is not the only thing being and cost outlays can deliver additional benefits.
reimagined. Software-defined storage (SDS) The new solution stack should become the
represents logical storage arrays that can be strategic backbone for new initiatives around
dynamically defined, provisioned, managed, cloud, digital, and analytics. Even without
optimized, and shared. Coupled with systemic changes to the way systems are built
compute and network virtualization, entire and run, projects should see gains through
operating environments can be abstracted and faster environment readiness, the ability
automated. The software-defined data center to engineer advanced scalability, and the
(SDDC) is also becoming a reality. A Forrester elimination of power/connectivity constraints
report estimates that “static virtual servers, that may have traditionally lowered team
private clouds, and hosted private clouds will ambitions. Leading IT departments are
76
Software-defined everything
Software-defined savingsa
A Deloitte analysis of normalized data from software-defined data center Company profile
(SDDC) business cases for Fortune 50 clients revealed that moving eligible
systems to an SDDC can reduce spending on those systems by approximately revenue $25+ billion
20 percent. These savings can be realized with current technology offerings
and may increase over time as new products emerge and tools mature. Not technology spend $5+ billion
every system is suited for migration; ideal candidates are those without tight employees 150,000+
integration to legacy infrastructure or bespoke platforms.
reimagining themselves by adopting agile marketing, ambient computing, and the other
methodologies to fuel experimentation and trends featured in this report.
prototyping, creating disciplines around
architecture and design, and embracing From IT to profit
DevOps.4 These efforts, when paired with
Business executives should not dismiss
platform-as-a-service solutions, provide a
software-defined everything as a tactical
strong foundation for reusing shared services
technical concern. Infrastructure is the supply
and resources. They can also help make
chain and logistics network of IT. It can be
the overall operating environment more
a costly, complex, bottleneck—or, if done
responsive and dynamic, which is critical
well, a strategic weapon. SDDC offers ways to
as organizations launch digital and other
remove recurring costs. Organizations should
innovative plays and pursue opportunities
consider modernizing their data centers and
related to the API economy, dimensional
77
Tech Trends 2015: The fusion of business and IT
operating footprints, if for no other reason a platform for growth. Initially, first movers
than to optimize their total cost of ownership. will likely benefit from greater efficiencies. Yet,
They should also pursue opportunities to soon thereafter, they should be able to use their
build a foundation for tomorrow’s business virtualized, elastic tools to reshape the ways
by reimagining how technology is developed their companies work (within IT, and more
and maintained and by providing the tools importantly, in the field), engage customers,
for disruptive digital, cloud, analytics, and and perhaps even design core products
other offerings. It’s not just about the cloud; and offerings.
it’s about removing constraints and becoming
78
Software-defined everything
Many insurance companies are focusing on picture of risk exposures for underwriting
core application transformation and adoption and providing newer business opportunities
of the latest technologies to rapidly penetrate through sale of innovative products and
new markets and address changing customer services.
behaviors. Amidst this focus on customer These discretionary investments are not the
experience and growth plans, it is easy to only driver of IT cost. In fact, infrastructure
overlook investments in the modernization spend represents almost 45 percent of the IT
of the infrastructure layer, which is often spend.ii Infrastructure is the supply chain and
a bottleneck in the rapid delivery of new logistics network of IT. CIOs should stress
capabilities to assist business growth. The the need to eliminate recurring infrastructure
latest developments in IT operations allow costs to fund the ability to implement leverage
virtualization and automation of almost disruptive trends like digital and analytics.
all components of the infrastructure layer, This is where the concepts of software-
enabling IT infrastructure as a competitive defined everything (SDE) and the software
differentiator for the business. defined data center (SDDC) enter the
equation. SDE is utilizing software to define
Case for change for management and control of the infrastructure
components (e.g., network, storage, computing,
global insurers etc.) SDDC refers to a data center where
Global insurers are experiencing limited control of data center is fully automated by
growth opportunities in saturated markets software. By leveraging these concepts, CIOs
such as the United States and Europe, but these can focus on modernizing the infrastructure
same insurers are expecting significant growth stack while reducing the total cost of
in Asia Pacific and Latin America countries ownership and reallocating IT budgets to
as a result of a maturing society with greater support business growth.
need for protection against losses. Customer
behaviors are changing and insurance
SDE in action
companies should move fast to keep pace with
customer expectations. The insurance industry is already in
Insurance is an information-driven the process of redesigning their complex
industry. It relies heavily on IT. The insurance application landscape to meet rapidly growing
industry is the highest spender of IT on a per market needs. IT-as-a-service is a top agenda
employee basis,i and often the main driver of item for many CIOs to provide competitive
high IT spend is the co-existence of legacy service to business through a scalable IT
and modern platforms and continued use infrastructure and lower IT costs. And some
of mainframe legacy systems to run the core insurance companies are beginning to plan
applications. and invest in SDDCs.
To reduce this redundant spend pattern, For example, a major P&C insurer was
insurance CIOs have focused on application strategically expanding into international
transformation—legacy modernization of core markets. The insurer had siloed operations
applications, and leveraging advancements in more than 10 countries and initiated a
in digital technologies and big data. This is program to consolidate infrastructure and
all driving toward an increasingly accurate build next generation, state-of-the-art data
79
Tech Trends 2015: The fusion of business and IT
centers. These centers were designed to take reduce the time it takes to create and deploy IT
advantage of the capabilities proposed for applications. This enables businesses to enter
decades: highly virtualized platforms to enable into new geographies and emerging markets
the insurer to absorb organic growth while rapidly to offset the lack of growth in highly
delivering agility to the business. As a result, penetrated countries.
this now-global insurer is positioned for its
next wave of transformation by virtualizing A continued evolution of SDE
the entire infrastructure stack and moving to a
With progress comes additional challenges.
SDDC with further reductions in total cost of
Advances in connectivity and technical
ownership.
capabilities have resulted in significant
Another leading global insurer has
cybersecurity implications. These risks
identified the need for SDDC as an enabler
have been met with increasing regulatory
to build a sustainable analytics platform. The
pressure on cross-country storage of data.
insurer is embedding analytics throughout its
With virtualization of infrastructure, global
business operations, and the challenge to IT
insurers will continue to evolve to track data
was to shorten the timeline from conceptual
storage locations across the network of data
design of an analytics use case to deployment
centers globally and stay compliant with local
of the new service in production. The platform
regulations.
requires significant storage for structured and
For the insurance industry, the expanding
unstructured data and computing power to
opportunities of SDE also present unique
support the analytics engine. Their solution:
challenges. Insurance companies traditionally
software-defined storage paired with platform-
run on a siloed mix of legacy and modern
as-a-service to help the insurer test and deploy
platforms. Not all applications are viable
new ideas quickly and drive better data-based
options to migrate to a software-defined
insights in areas such as customer analytics,
infrastructure environment. Insurers have
product pricing, and claims fraud analysis.
traditionally focused on a specific value
chain instead of an end-to-end insurance
Benefits of SDE platform. Therefore, migration to SDE requires
Through SDE, the total cost of thoughtful analysis and identification of
infrastructure ownership can be reduced due appropriate platforms that unlock the business
to improved server utilization and capacity, value without creating additional complexity.
and through a reduction in data center energy
consumption. SDE provides an opportunity SDDC and insurers: A decision
to build a technology platform for tomorrow’s
SDDC is not a tactical solution, but
business by providing a strong foundation for
a strategic asset that has the potential to
reuse and faster scaling of shared resources at
develop a cost effective, scalable, and agile IT
the infrastructure layer.
infrastructure. Insurers investing in SDDC
With the automation of the entire
are changing the fundamental way in which
infrastructure stack, the siloed management
their typical IT operations are executed and
operations that historically created delays can
delivered. How rapidly insurers evolve to adopt
be eliminated. The multiple approvals and
SDDC and begin realizing its economic, speed
handover processes from commissioning to
and agility benefits is for CIOs to consider.
deployment of applications can be avoided and
application deployment time can be reduced Footnotes
from days or months to minutes. i
Shreya Futela, Disha Gupta, Linda Hall, “IT Key Metrics
SDDC, coupled with the accelerated Data 2015: Index of Published Documents and Metrics”,
Gartner, December 15, 2014, https://www.gartner.com/
“DevOps” software development process, can doc/2933817/it-key-metrics-data-, accessed May 12, 2015.
ii
ibid
80
Software-defined everything
81
Tech Trends 2015: The fusion of business and IT
To reduce costs, bolster innovation, and development teams wanted to get from idea
accelerate time to market, IntrinsiQ partnered to release in days, but environments often
with PaaS provider Apprenda. Apprenda’s took months to procure and “rack and stack”
platform provided back-end functions via traditional methods. Moreover, the scope
including multi-tenancy, provisioning, of eBay Inc.’s business had grown far beyond
deployment, and, perhaps most importantly, online auctions to include offline commerce,
security. IntrinsiQ continued to focus on payment solutions, and mobile commerce—all
developing oncology applications, as well as domains in which reliability and performance
incorporating the new private cloud offering are essential.
into its IT delivery and support models. The company decided to make
The division of duties achieved the infrastructure a competitive differentiator
needed results. The company’s oncology by investing in an SDDC to drive agility for
software specialists were able to work at innovation and efficiency throughout its
high productivity levels by focusing on the operations while simultaneously creating a
application functionality and leveraging the foundation for future growth. The company
PaaS software’s out-of-the-box management kicked off its SDDC efforts by tackling agility
tools. IntrinsiQ was able to collapse its through the construction of a private cloud.
development schedule and reduce its costs: The The first step to this process was one of
new customer-facing, cloud-based application standardization. Standardizing network design,
hit the market 18 months earlier than planned. hardware SKUs, and procedures helped create
Additionally, the cloud-based solution has homogeneity in infrastructure that helped set
made IntrinsiQ more affordable for smaller the foundation for automation and efficiency.
oncology clinics—expanding the company’s Historically, the company had procured
potential market. servers, storage, and network equipment on
demand when each team or project requested
The backbone of global infrastructure. Cloud solutions, on the
other hand, made it possible to decouple the
connected commerce acquisition of compute, storage, and network
Each day, eBay Inc. enables millions of resources from the provisioning cycles.
commerce and payments transactions. eBay This allowed for better partnership with the
Marketplaces connects more than 155 million vendor ecosystem through disciplined supply-
users around the world who, in 2014 alone, chain practices, and enabled on-demand
transacted $83 billion in gross merchandise provisioning for teams and projects that
volume. And PayPal’s 162 million users required infrastructure. Today, engineers are
transacted more than $228 billion in total able to provision a virtual host in less than a
payment volume just last year.8 For eBay Inc., minute and register, provision, and deploy an
scale is not optional: It is the foundation of all application in less than 10 minutes via an easy-
its operations and a critical component of the to-use portal.
company’s future plans. The infrastructure team took an end-to-
Over the last decade, eBay Inc.’s platform end approach to automation, all the way from
and infrastructure group recognized that as hardware arriving at the data center dock to
the company grew, its infrastructure needs a developer deploying an application on a
were also growing. The company’s IT footprint cluster of virtual machines. Automation of
now included hundreds of thousands of on-boarding, bootstrapping, infrastructure
assets across multiple data centers. Product lifecycle, imaging, resource allocation,
82
Software-defined everything
repair, metering, and chargeback were core company’s network operating centers (NOCs),
to building on-demand infrastructure with for example, advanced analytics are now
economic efficiency. applied to the 2,000,000 metrics gathered
Compute on demand was only the every second from infrastructure, telemetry,
beginning of eBay Inc.’s SDDC strategy. Next, and application platforms. Traditionally, the
the company tackled higher-order functions company’s “mission control” was surrounded
like load balancing, object storage, databases- by 157 charts displayed on half a dozen large
as-a-service, configuration management, screens that provided real-time visibility into
and application management. By creating a that carefully curated subset of metrics and
portfolio of internal cloud computing services, indicators engineers deemed most critical to
the company was able to add software-defined system stability. These same seven screens can
capabilities and automate bigger pieces of now cover more than 5,000 potential scenarios
its software development infrastructure. The by only displaying those signals that deviate
infrastructure team now provides product from the norm, thus making the detection of
teams with the software-enabled tools they potential issues much easier than before. And,
need to work more like artists and less with software-defined options to segment,
like mechanics. provision, and deploy new instances, engineers
Beyond creating agility, the software- can take action in less time than it would have
defined initiative has also helped drive previously taken them to determine which
enforceable standards. From hardware of the screens to look at. Through its SDDC
engineering to OS images to control plane initiative, the company is now able to direct its
configuration, standardization has become an energy toward prevention rather than reaction,
essential part of eBay Inc.’s strategy to scale. making it possible for developers to focus
The development culture has shifted away on eBay Inc.’s core disciplines rather than on
from one in which people ask for special kinds operational plumbing.
of infrastructure. Now, they are learning how
to build products for standard infrastructure Next-generation infrastructure
that comes bundled with all the tools needed
Since joining Little Rock-based Acxiom,
to provision, develop, deploy, and monitor
a global enterprise data, analytics, and
applications, though all stages of development.
SaaS company, in 2013, Dennis Self, senior
IT still receives (and supports) occasional
vice president and CIO, has made it his
special requests, but the use of container
mission to lead the organization into the
technologies helps it manage these outliers.
new world of software-defined everything.
These technologies provide engineers with a
“Historically, we’ve propagated physical,
“developer class of service” where they are able
dedicated infrastructure to support the
to innovate freely as they would in a start-up—
marketing databases we provide customers,”
but within components that will easily fit into
he says. “With next-gen technologies, there
the broader environment. Moreover, knowing
are opportunities to improve our time
beforehand which commodity will be provided
to deliver, increase utilization levels, and
has helped both development and operations
reduce the overall investment required for
become more efficient.
implementation and operational activities.”
eBay Inc. is working to bring software-
In early 2014, Self ’s team began working
defined automation to every aspect of
to virtualize that infrastructure—including
its infrastructure and operations. In the
the network and compute environments. The
83
Tech Trends 2015: The fusion of business and IT
84
Software-defined everything
My take
Greg Lavender,
Managing director, Cloud Architecture and Infrastructure Engineering,
Office of the CTO
Citi
At Citi, the IT services we provide to our customers to applications teams through streamlined, highly
are built on top of thousands of physical and virtual automated release and lifecycle management
systems deployed globally. Citi infrastructure supports processes. The results so far are measurable in terms
a highly regulated, highly secure, highly demanding of both client satisfaction and simplifying maintenance
transactional workload. Because of these demands, and operations scope. The final objective is to achieve
performance, scale, and reliability—delivered as ongoing cloud economics with respect to the cost
efficiently as possible—are essential to our global of IT services to our businesses. More aggressive
business operations. The business organizations also standardization, re-architecting, and re-platforming
task IT with supporting innovation by providing the IT to lower-cost infrastructure and services is helping
vision, engineering, and operations for new services, reduce technical debt, and will also help lower IT
solutions, and offerings. Our investments in software- labor costs. At the same time, the consumption of
defined data centers are helping on both fronts. IT services is increasing year over year, so keeping
costs under control by adopting more agile services
With 21 global data centers and system architectures allows our businesses to grow while keeping IT costs
ranging from scale-up mainframes and storage manageable. Our new CitiCloud platform-as-a-service
frames to scale-out commodity servers and storage, capabilities—which feature new technologies such
dealing effectively with large-scale IT complexity is as NoSQL/NewSQL and big data solutions along
mission-critical to our business partners. We became with other rapid delivery technology stacks—help
early adopters of server virtualization by introducing accelerate delivery and time to market advantages.
automation to provisioning several years ago, and Packaging higher-level components and providing
we manage thousands of virtual machines across them to application teams accelerates the adoption
our data centers. The next step was to virtualize the of new technologies as well. Moreover, because the
network, which we accomplished by moving to a new technology components have strict compliance,
new two-tier spine-and-leaf IP network fabric similar security, and DevOps standards to meet, offering more
to what public cloud providers have deployed. That tech stacks as part of platform-as-a-service provides
new physical network architecture has enabled our stronger reliability and security guarantees.
software-defined virtual networking overlays and
our next generation software-defined commodity By introducing commodity infrastructure underneath
storage fabrics. We still maintain a large traditional our software-defined architectures, we have
fiber channel storage environment, but many new been able to incrementally reduce unit costs
services are being deployed on the new architecture, without compromising reliability, availability, and
such as big data, NoSQL and NewSQl data services, scale. Resiliency standards continue to be met
grid computing, virtual desktop infrastructure, and our through tighter controls and automation, and our
private cloud services. responsiveness—measured by how quickly we realize
new opportunities and deliver new capabilities to the
Currently, we are engaged in three key objectives to business—is increasing.
create a secure global private cloud. The first objective
focuses on achieving “cloud scale” services. As we Focusing IT on these three objectives—cloud scale,
move beyond IT as separate compute, network, and cloud speed, and cloud economics—has enabled
storage silos to a scale-out cloud service model, we Citi to meet our biggest challenge thus far: fostering
are building capabilities for end-to-end systems scaled organizational behavior and cultural changes that go
horizontally and elastically within our data centers— along with advances in technology. We are confident
and potentially in the not-too-distant future, hybrid that our software-defined data center infrastructure
cloud services. The second objective is about achieving investments will continue to be a key market
cloud speed of delivery by accelerating environment differentiator—for IT, our businesses, our employees,
provisioning, speeding up the deployment of updates our institutional business clients, and our consumer
and new capabilities, and delivering productivity gains banking customers.
85
Tech Trends 2015: The fusion of business and IT
Cyber implications
R ISK should be a foundational consideration as servers, storage, networks, and data centers are
replatformed. The new infrastructure stack is becoming software-defined, deeply integrated across
components, and potentially provisioned through the cloud. Traditional security controls, preventive
measures, and compliance initiatives have been challenged from the outset because the technology stack
they sit on top of was inherently designed as an open, insecure platform. To have an effective software-
defined technology stack, key concepts around things like access, logging and monitoring, encryption,
and asset management need to be reassessed, and, if necessary, enhanced if they are to be relevant. There
are new layers of complexity, new degrees of volatility, and a growing dependence on assets that may not
be fully within your control. The risk profile expands as critical infrastructure and sensitive information
is distributed to new and different players. Though software-defined infrastructure introduces risks, it
also creates opportunity to address some of the more mundane but significant challenges in day-to-day
security operations.
Security components that integrate into the software-defined stack may be different from what
you own today—especially considering federated ownership, access, and oversight of pieces of the
highly integrated stack. Existing tools may need to be updated or new tools procured that are built
specifically for highly virtual or cloud-based assets. Governance and policy controls will likely need to be
modernized. Trust zones should be considered: envelopes that can manage groups of virtual components
for policy definition and updates across virtual blocks, virtual machines, and hypervisors. Changes
outside of controls can be automatically denied and the extended stack can be continuously monitored
for incident detection and policy enforcement.
Just as importantly, revamped cyber security components should be designed to be consistent with
the broader adoption of real-time DevOps. Moves to software-defined infrastructure are often not
just about cost reduction and efficiency gains; they can set the stage for more streamlined, responsive
IT capabilities, and help address some of today’s more mundane but persistent challenges in security
operations. Governance, policy engines, and control points should be designed accordingly—preferably
baked into new delivery models at the point of inception. Security and controls considerations can
be built into automated approaches to building management, configuration management, asset
awareness, deployment, and system automation—allowing risk management to become muscle memory.
Requirements and testing automation can also include security and privacy coverage, creating a core
discipline aligned with cyber security strategies.
Similarly, standard policies, security elements, and control points can be embedded into new
environment templates as they are defined. Leading organizations co-opt infrastructure modernization
with a push for highly standardized physical and logical configurations. Standards that are clearly
defined, consistently rolled out, and tightly enforced can be a boon for cyber security. Vulnerabilities
abound in unpatched, noncompliant operating systems, applications, and services. Eliminating variances
and proactively securing newly defined templates can reduce potential threats and provide a more
accurate view of your risk profile.
86
Software-defined everything
87
Tech Trends 2015: The fusion of business and IT
88
Software-defined everything
Bottom line
I N mature IT organizations, moving eligible systems to an SDDC can reduce spending on those
systems by approximately 20 percent, which frees up budget needed to pursue higher-order
endeavors.9 These demonstrated returns can help spur the initial investment required to fulfill
virtualization’s potential by jump-starting shifts from physical to logical assets and lowering total
cost of ownership. With operational costs diminishing and efficiencies increasing, companies will be
able to create more scalable, responsive IT organizations that can launch innovative new endeavors
quickly and remove performance barriers from existing business approaches. In doing so, they can
fundamentally reshape the underlying backbone of IT and business.
Authors
Ranjit Bawa, principal, Deloitte Consulting LLP
Clark is a director with Deloitte Consulting LLP and leads the Cloud
Implementation capability within the Technology Strategy & Architecture
practice. He has more than 30 years of experience assisting clients with
large-scale information technology. His core competencies are IT strategy,
enterprise architecture, and infrastructure and networking. Clark has
pioneered many of Deloitte’s investments in cloud technologies, including
the development and delivery of Deloitte’s Cloud ServiceFabric™.
89
Tech Trends 2015: The fusion of business and IT
Endnotes
1. Deloitte Consulting LLP, Depth Percep- 6. Rob Wilson, “Cisco asks, ‘New applications are
tion: A dozen technology trends shaping knocking—is your data center “open” for busi-
business and IT in 2010, June 15, 2010. ness?,’” SDX Central, October 17, 2014, https://
2. Dave Bartoletti, Strategic Benchmarks www.sdncentral.com/companies/featured-
2014: Server virtualization, Forrester video-cisco-opflex-data-center/2014/10/.
Research Inc., March 6, 2014. 7. Stephanie Mann, “At IntrinsiQ, private PaaS
3. Computer Economics, IT spending and staffing bolsters software for oncology clinicians,”
benchmarks 2014/2015, chapter 2, June 2014. TechTarget, http://searchcloudapplications.
techtarget.com/feature/At-IntrinsiQ-private-
4. Deloitte Consulting LLP, Tech Trends 2014: PaaS-bolsters-software-for-oncology-clini-
Inspiring disruption, chapter 10, February 6, cians; Appendra, AmerisourceBergen
2014, http://dupress.com/periodical/trends/ Speciality Group: Saving community
tech-trends-2014/, accessed January 14, 2015. oncology, http://apprenda.com/thank-you/
5. Matthew Mardin, Cisco preparing its data- amerisourcebergen-case-study/.
centers for the next generation of virtualiza- 8. All statistics as of Q4 2014.
tion and hybrid cloud with its Application
Centric Infrastructure, IDC, May 2014. 9. Deloitte Consulting LLP pro-
prietary research, 2014.
90
Software-defined everything
91
Core renaissance
Core renaissance
Revitalizing the heart of IT
93
Tech Trends 2015: The fusion of business and IT
94
Core renaissance
95
Tech Trends 2015: The fusion of business and IT
96
Core renaissance
Core renaissance is a salient, timely topic Additionally, the use of third parties to handle
for the insurance industry. Looking internally, fewer core business lines can also simplify the
in both the L&A and P&C sectors, insurers architecture.
are looking for ways to increase efficiency
and reduce costs; looking externally, a more
advanced and simplified platform is critical to
Eliminating the decisions
achieving growth and agility. of the past…
Each insurer’s story is slightly different;
The heart of the business however, the large majority of the industry is
grappling with a fragmented and redundant
Policy, billing, and claims represent the
portfolio of core systems. The portfolio’s
“heart,” or core, of the insurance business.
complexity drives a need for consolidation.
Given the investment patterns of the past, the
A leading financial services company’s
highly fragmented nature of the industry’s
portfolio of more than 20 policy
products, and the new capabilities available in
administration systems revealed thousands
the marketplace, these core systems represents
of interfaces to non-core systems and
the greatest opportunity to truly transform
utilization that ranged from a few thousand
how insurers manage their business.
policies to well over a million policies. Each
Many insurers are now even more focused
system, regardless of utilization level, required
on meeting internal and external customers’
licensing, monitoring, storage, disaster
expectations for a highly evolved, digital
recovery, interfaces, and the associated
customer experience. This is a significant
knowledge to support operational capabilities.
influence on P&C carriers’ willingness to
The cost to “keep the lights on” in this
undertake the momentous task of pursing an
environment was well above industry peers.
advanced core business platform. Similarly,
In addition, many in-house support resources
the increasing sophistication and importance
were nearing retirement, and strategic
of advanced and predictive analytics is one
investments, such as customer and distribution
of the most frequently cited reasons by P&C
self-service, were unnecessarily complicated
companies for cleaning up the current data
and expensive.
environment, and laying the foundation to
To transform this unsustainable
better capture, manage and gain insights from
environment, a simplification of the company’s
data. These two trends are enabled by the
core technology platforms was deemed a
proliferation of highly configurable software
necessity if IT and business agility were to be
package options that have been tried and
achieved. When the simplified core system
tested in P&C companies over the last several
strategy is fully realized, the company expects
years.
to benefit by increasing policy servicing
Although the package system solutions
efficiency through a simplified user experience.
in the L&A sector are less evolved, the need
Additionally, the reduction in technology
is great as these insurers seek to develop
complexity will translate to reduced technical
more advanced and varied products. While
risk and a reduction in IT “run the business”
a single platform is not necessarily the end-
costs. The simpler environment will provide
state, a significant reduction in complexity is
opportunities to reduce the cost and
necessary. In designing their new platforms of
turnaround time of business driven strategic
the future, some L&A insurers are launching
investments.
new products in new, separate environments,
while gradually retiring legacy assets.
97
Tech Trends 2015: The fusion of business and IT
98
Core renaissance
99
Tech Trends 2015: The fusion of business and IT
100
Core renaissance
requirements in these and other critical areas. virtualize much of the needed infrastructure
Project leaders decided that, rather than be capabilities, which cut the price tag roughly
tied to one vendor, they should deploy several in half.
best-of-breed cloud-based solutions from When the newly revitalized core and
boutique vendors to fill ERP functionality gaps the other systems become fully operational
in CRM, distributions, and demand planning, later this year, the company expects they will
among others. provide the consistency, optimization, and
To revitalize its existing infrastructure, efficiency it set out to achieve. Moreover,
the company could easily have spent tens these components, working in tandem with
of millions on servers, databases, and other an infrastructure that has been transformed
infrastructure components. Instead, project by virtualization, can serve as a platform for
leaders opted to create a private cloud and to future innovation efforts.
101
Tech Trends 2015: The fusion of business and IT
My take
Terry Milholland, chief technology officer,
Internal Revenue Service
2014 saw one of the smoothest filing seasons ever Which is where process comes in. We’re committed
for the IRS. It’s an encouraging sign that our efforts to an agile methodology—using our new standards
to turn the agency’s IT department into a world-class to modernize and grow. We have selected a set of
organization are paying off. Beyond supporting the technology standards that the organization follows
IRS’s customer-centric transformation, we wanted to increase productivity and quality; we’re already at
to evolve IT to deal with the complexity of our level 3 for CMMI and ITIL.6 The impact on quality has
operations. Budgeting processes are complicated and been very real, and has helped break down barriers
unpredictable. Tax implications of legislation like the between the different teams and pieces of the
Affordable Care Act need to be codified for the hard technical stack.
deadlines of the tax season. Decades-old technologies
require modernization. But our team has risen to the But it comes down to our people. I don’t lead with
challenge, and we’re seeing tremendous results. a “thou shalt” attitude. Instead, we enlist leaders in
the organization—the men and women who have
We’ve created a vision for IT to be on a par influence in the work environment and can pave
with Fortune 100 organizations, and the path for others. We solicit their feedback on our
that affects our people, process, and direction, working with them to iron out the details,
technology. At the center of the and being open about issues, ideas, and concerns.
technical vision are data and These “guild masters” can help convince their teams
services—allowing our core to believe in the vision, to do things differently, and to
systems to interact with each positively impact the culture. Openness has become
other and keeping teams from part of our organization. On projects, anyone can raise
repeating their efforts. We now an objective. We record it, then we disposition it. Their
have a logical and physical data opinions are listened to and the “Oh, they never ask”
model for the full submission attitude doesn’t exist.
process—more than 30,000
attributes manifested across our Whether private or public sector, IT departments face
core. Coupled with a service- constraints when it comes to taking on projects—let
oriented architecture, we’re creating alone modernizing legacy systems and tackling their
a repeatable approach to building technical debt. If I look back on the past fiscal year,
on top of our core—to be able to add we started with a 16-day government shutdown that
new technology in a transformational meant we had 90 percent of our workforce out and
way, responsive to mission needs. created uncertainty about our annual budget. But
we continue to push forward with our strategy to
transform our legacy systems. We’ve only just begun
our journey toward modernization. We are going to
keep adding new technologies in a transformational
way—despite, and in some cases because of, people
and fiscal constraints. Our focus on technology,
process, and more importantly, people will get
us there.
102
Core renaissance
Cyber implications
S OME organizations treat ownership and control as a proxy for managing risk. Because the “core” is
often software built on-premises or bought, this approach suffers from a twofold misconception. The
first is that the existing stack is reasonably secure. The second is that moving to new technologies, be
they mobile, social, or cloud, inherently raises the risk profile. Neither is universally true, and both raise
the need for strategic handling of cyber security concerns.
The notion that today’s IT footprints are secure enough is a dangerous one. Legacy projects may
not have considered compliance, contractual, or risk-based requirements adequately, if at all. A
lack of strategic focus and budget has relegated many security initiatives to compliance and control
activities—adding scope or causing rework to address vulnerabilities discovered late in the development
cycle. Reactionary measures are taken when high-profile breaches occur, typically targeting known
threats linked to particular incidents. A more comprehensive approach to cyber security is needed,
acknowledging that it could be exorbitantly costly to protect against every potential attack.
Organizations should identify the cyber “beacon” that is likely to attract threats. Resources should
then be directed against assets that potential attackers may likely find most valuable, or those that,
if compromised, could cause greatest damage. Beyond securing against attack, organizations should
monitor emerging threats and potentially reallocate resources as their cyber beacons change—practicing
vigilance, not just security. They should prepare for how to detect, contain, and respond to potential
incidents. There may be no such thing as a hacker-proof organization, but you can still be resilient in the
face of an attack. Hope and luck are not strategies; even if the core has not been compromised, that does
not mean it is secure. Building out cyber security capabilities can help close the gap.
The misconception that emerging technologies are inherently riskier than legacy assets is common,
as is the myth that on-premises solutions are always more secure than cloud alternatives. Privacy
concerns typically dominate discussions around social—requiring policy, training, and monitoring to
guide appropriate behaviors. Mobile concerns fall between security and privacy, especially as enterprises
are embracing “bring your own device” and “bring your own app” strategies. The approach described
above can help, with a mindset anchored in probable and acceptable risk. Prepare for strategies to secure
information at the device, application, and, potentially, data level while being sensitive to the overall
user experience. Security tops concerns about public cloud adoption, with the rationale that large
infrastructure-as-a-service, platform-as-a-service, and software-as-a-service providers are obvious and
lucrative targets for cyber criminals. But with the escalated potential bounty, public cloud vendors also
typically have highly sophisticated security tools, procedures, and personnel that can be more effective
than many company and agency in-house cyber defenses. Who is better prepared to win the cyber
arms race? Cloud providers whose livelihood likely depends on their ability to prevent and respond to
incidents? Or organizations that have historically had trouble justifying security and privacy budgets as
a priority? Either way, the obligations of the organization as the acquirer and custodian of data do not
go away. Leverage providers to help outsource risk if cyber isn’t a core strength, but recognize that your
organization still retains responsibility for its security.
Again, there is no universal answer. Security and privacy should not be a blanket objection that
curtails core renaissance, but they should be baked into the overall approach—setting the right
foundation for a revitalized core and guiding new investments in areas that will form the core of
tomorrow’s business.
103
Tech Trends 2015: The fusion of business and IT
104
Core renaissance
product roadmaps), proactively prototyping experience, not up from the systems and
new ideas, providing briefings on industry data. Look to embrace pieces of DevOps:
(and cross-industry) leading practices, or automated environment provisioning,
brokering introductions to interesting new requirements management, continuous
solutions for specific business scenarios. build/configuration management, testing
automation, one-touch deployment, and
• Verbs, not just nouns. Technical systems maintenance and monitoring
components are rightly critical parts of core solutions. Finally, create a living approach
revitalization, but pursuing core renaissance to architecture—guiding not just the
is also an opportunity to transform how you solutions and platforms that are blessed,
build and support solutions. Aim to embed but their usability, integration, data, and
design as a discipline8 into everything security considerations.
you do, working back from the user
105
Tech Trends 2015: The fusion of business and IT
Bottom line
D ISRUPTIVE forces are reshaping industries: globalization, emerging technologies, new customer
engagement requirements, diminishing competitive barriers to entry, evolving regulatory
and compliance requirements, and persistent threats around security and privacy. All of these are
inextricably linked to technology, moving the core to center stage. Some modernization will no
doubt be needed to keep the lights on as the business scales up. But beyond table stakes, a revitalized
core could become a strategic differentiator. A renaissance of the core amid an elevation of IT
to support the heart of the business can lay the foundation for the organization to experiment,
innovate, and grow.
Authors
Scott Buchholz, director, Deloitte Consulting LLP
McAleer is a principal with Deloitte Consulting LLP and leads the Enterprise
Digital Engagement practice within Deloitte Digital, where he manages
the go-to-market relationship with leading technology vendors. He
provides strategy and vision to help clients adopt solutions that improve
business performance. With over 24 years of experience, he specializes
in business transformation, strategic planning and execution, system
integration, custom application development, and enterprise software.
106
Core renaissance
Endnotes
1. Bob Evans, “Dear CIO: Is the time bomb in 4. Deloitte Consulting LLP, Tech Trends 2014:
your IT budget about to explode?,” Forbes, Inspiring disruption, chapter 10, February 6,
January 22, 2013, http://www.forbes.com/ 2014, http://dupress.com/periodical/trends/
sites/oracle/2013/01/22/dear-cio-is-the- tech-trends-2014/, accessed January 14, 2015.
time-bomb-in-your-it-budget-about-to- 5. Deloitte Consulting LLP, Tech Trends 2015:
explode/, accessed January 14, 2015. The fusion of business and IT, 2015, chapter 1.
2. Deloitte Consulting LLP, Tech Trends 2014: 6. Capability Maturity Model Integra-
Inspiring disruption, chapter 6, February 6, tion (CMMI); Information Technology
2014, http://dupress.com/periodical/trends/ Infrastructure Library (ITIL).
tech-trends-2014/, accessed January 14, 2015.
7. Deloitte Consulting LLP proprietary
3. Paul D. Hamerman, Randy Heffner, and research based on interviews with 150+
John R. Rymer, Don’t just maintain business IT executives, November 2014.
applications, raise business responsiveness,
Forrester Research, Inc., October 17, 2014. 8. Deloitte Consulting LLP, Tech Trends 2013:
Elements of postdigital, 2013, chapter 4.
107
Amplified intelligence
Amplified intelligence
Power to the people
109
Tech Trends 2015: The fusion of business and IT
The motives aren’t entirely altruistic . . . Discovery, scenario planning, and modeling
or self-preserving. Albert Einstein famously can be delivered to the front lines, informed
pointed out: “Not everything that can be by contextual cues such as location,
counted counts. And not everything that historical behavior, and real-time intent. It
counts can be counted.”4 Business semantics, moves the purview of analytics away from
cultural idiosyncrasies, and sparks of creativity a small number of specialists in back-office
remain difficult to codify. Thus, while the functions who act according to theoretical,
silicon and iron (machine layer) of advanced approximate models of how business occurs.
computational horsepower and analytics Instead, intelligence is put to use in real time,
techniques evolve, the carbon (human) potentially in the hands of everyone, at the
element remains critical to discovering new point where it may matter most. The result
patterns and identifying the questions that can be a systemic shift from reactive “sense
should be asked. Just as autopilot technologies and respond” behaviors to predictive and
haven’t replaced the need for pilots to fly proactive solutions. The shift could create less
planes, the world of amplified intelligence dependency on legacy operating procedures
allows workers to do what they do best: and instinct. The emphasis becomes fact-based
interpreting and reacting to broader context decisions informed by sophisticated tools and
versus focusing on applying standard rules that complex data that are made simple by machine
can be codified and automated by a machine. intelligence that can provide insights.
This requires a strong commitment to the
usability of analytics. For example, how can Bold new heights
insights be delivered to a specific individual
Amplified intelligence is in its early days,
performing a specific role at a specific time
but the potential use cases are extensive.
to increase his or her intelligence, efficiency,
The medical community can now analyze
or judgment? Can signals from mobile
billions of web links to predict the spread
devices, wearables, or ambient computing
of a virus. The intelligence community can
be incorporated into decision making? And
now inspect global calls, texts, and emails
can the resulting analysis be seamlessly and
to identify possible terrorists. Farmers can
contextually delivered to the individual
use data collected by their equipment, from
based on who and where they are, as well as
almost every foot of each planting row, to
what they are doing? Can text, speech, and
increase crop yields.5 Companies in fields
video analytics offer new ways to interact
such as accounting, law, and health care could
with systems? Could virtual or augmented
let frontline specialists harness research,
reality solutions bring insights to life? How
diagnostics, and case histories, which could
could advanced visualization support data
arm all practitioners with the knowledge of
exploration and pattern discovery when it is
their organization’s leading practices as well
most needed? Where could natural language
as with the whole of academic, clinical, and
processing be used to not just understand
practical experience. Risk and fraud detection,
semi-structured and unstructured data
preventative maintenance, and productivity
(extracting meaning and forming hypotheses),
plays across the supply chain are also viable
but to encourage conversational interaction
candidates. Next-generation soldier programs
with systems instead of via queries, scripts,
are being designed for enhanced vision,
algorithms, or report configurators?
hearing, and augmented situational awareness
Amplified intelligence creates the potential
delivered in real time in the midst of battle—
for significant operational efficiencies and
from maps to facial recognition to advanced
competitive advantage for an organization.
weapon system controls.6
110
Amplified intelligence
device context
engines
Sources: a Danny Sullivan, “Google’s Impressive ‘Conversational Search’ Goes Live On Chrome,” May 22, 2013, http://searchengineland.com/googles-
impressive-conversational-search-goes-live-on-chrome-160445, accessed October 14, 2014. b Abhijit A. Mahabal et al, “United States Patent 8,538,984
B1: Synonym Identification Based on Co-occuring Terms,” September 17, 2013, http://www.google.com/patents/US8538984, accessed October 14, 2014.
In these and other areas, exciting focus on the broader context while allowing
opportunities abound. For the IT department, technology to address standard rules that can
amplified intelligence offers a chance to be codified and executed autonomously.
emphasize the role it could play in driving
the broader analytics journey and directing All together now
advances toward use cases with real,
The emphasis on usability and deployment
measurable impact. Technically, these advances
moves the information agenda from isolated
require data, tools, and processes to perform
data scientists to multidisciplinary teams. The
core data management, modeling, and
agenda should focus on helping end users by
analysis functions. But it also means moving
understanding their journey, their context,
beyond historical aggregation to a platform
and how to enhance and reshape their jobs.
for learning, prediction, and exploration.
Like the revolution in user engagement
Amplified intelligence allows workers to
111
Tech Trends 2015: The fusion of business and IT
that transactional systems have recently in which incremental solutions are tested in
experienced, amplified intelligence solutions real-life scenarios.
start from the user down, not from the data The best outcomes will likely be from
model and analytics up. To start the process scenarios where technology or analytics
with users, organizations should identify a were seen as infeasible or too difficult to
crunchy question that, if answered, could take advantage of. New opportunities exist
significantly improve how a specific individual when companies expand information-based
does his or her job. The process should also decisions beyond just the executive suite’s
understand how an answer could affect how purview into the field by giving managers,
the individual conducts business—where he or sales teams, service techs, case workers, and
she would likely need the information, in what other frontline employees simple tools that
format, when, and via what channel. harness exceptionally complex intelligence.
Company leaders interested in improving And, ideally, computational intelligence will be
their decision making can use machine refined and extended by collective intelligence,
learning and other amplified intelligence creating a feedback loop where people are also
approaches to generate new growth ideas for augmenting the advanced tools and models.
their organizations. Amplified intelligence Individual creativity and resourcefulness can
is becoming critical for competitive success and should continue to flourish. The goal,
around the world, across industries. US-based however, should be mutual elevation: As
Uber uses big data to match passengers with machine analytics are enhanced, users have the
car services.7 European grocer Tesco leverages opportunity for more nuanced and valuable
big data to capture a disproportionate share of pursuits. As these pursuits become increasingly
sales from new families and parents.8 Effective nuanced and valuable, they put important
scenarios should be designed to be deployed feedback into the system. The overall outcome:
for high impact. That impact should inform Artificial intelligence amplifies human
scope, solutions, and iterative development, intelligence to transform business intelligence.
112
Amplified intelligence
113
Tech Trends 2015: The fusion of business and IT
An answer: GIS. By using GIS, the claims When the data is analyzed within the
department can access the potential impact context of location, the underwriter, risk
to the properties in that area and proactively inspector, and actuary will be able to make
call and/or send text alerts to the insured informed decisions about the risks and the
with specific information on how to protect coverages that are required.
the property from disaster. This will help
the insurer connect with the customers in The quantification of
difficult times and possibly result in improved
customer loyalty. If the property is affected
health and fitness data
by the storm, the insurer can overlay images Amplified intelligence has tangible
of the damaged property with the path of the applications to the P&C sector, but another
storm to access the damage and close claims emerging application of this capability is
much faster. rapidly changing how we live our lives. Just as
Such a customer experience would be telematics has disrupted the auto insurance
achievable through LBI. GIS adds fuel to the business, the concept of quantified self could
nascent data visualization capabilities at many be a potential disruptor for the life insurance
leading insurance companies. As insurers’ industry. “Quantified self ” refers to the use
ability to integrate various sources of data of wearable devices that monitor individual
to uncover the quickest and most accurate health and fitness metrics—who doesn’t know
picture on the ground improves, the more someone who is wearing a Fitbit, Jawbone or
valuable the insurer-policyholder relationship a Nike Fuel band—and has opened up a new
can become. world of data for insurers to analyze.
The data captured from multiple health
and fitness monitoring devices and apps
Location-based data can be integrated and turned into useful
to model risk information highlighting a customer’s behavior,
Location-based data is a fundamental health status, medical conditions, and
element in modeling risk. At the core of overall well-being. Life insurance companies
underwriting is the ability to assess and could subscribe to that data to improve risk
manage risk. Over the last decade, insurers assessments, underwriting decisions, and
have developed sophisticated mechanisms to the cost of insurance including discounts in
assess risk. However, the use of GIS/geospatial premiums based on increased or decreased
data was not that prevalent in the industry. health risk for the individual. They could
With GIS and geospatial data, insurers can also use quantified self information to cross-
assess risks by employing advanced modeling sell and up-sell offers, and make customer-
tools that overlay location-based data on retention decisions. In turn, insurers can serve
models of buildings, roadways, and other as a “coach” to their policyholders, providing
physical features to visually analyze the risk. a proactive service focused on wellness and
Suppose a business owner wants to obtain physical and mental health.
a quote to insure its factory by providing
key information about the property (address,
layout, and pictures). In this example, the
underwriter could cross-reference the property
details with other location-based data, such as
other factories or stores, past losses, and risks
associated with disaster, and visualize them to
make informed decisions.
114
Amplified intelligence
Footnotes
i
Julia Angwin and Jennifer Valentino-DeVries, The Wall Street Journal, “Apple, Google Collect User Data”, April 22, 2011, http://
www.wsj.com/articles/SB10001424052748703983704576277101723453610, accessed May 12, 2015.
ii
Paul B. Farrell, “Warning: 100-year climate disasters every 100 days”, MarketWatch, September 25, 2013, http://www.marketwatch.
com/story/warning-100-year-climate-disasters-every-100-days-2013-09-25, accessed May 12, 2015.
115
Tech Trends 2015: The fusion of business and IT
116
Amplified intelligence
117
Tech Trends 2015: The fusion of business and IT
millions of vehicles. Using the new system, Successes such as these are fueling the
crime analysts narrowed down the number growth of advanced analytics to fortify the
of possible cars, and the victims were able to effectiveness of the LAPD. The department is
identify the vehicle whose picture was in the in the process of rolling out analytics across
automated license plate recognition system. the organization and supporting the effort
Two days later, detectives spotted the car and with rigorous training and ongoing support.
followed it to what turned out to be another Although the endeavor is not without its
robbery attempt. The suspects were arrested challenges and costs, it is helping the LAPD
on the spot.11 Because of amplified intelligence meet its mission to safeguard the lives and
in the field, the lead didn’t have a chance to property of the city’s residents and visitors.12
get cold.
118
Amplified intelligence
My take
Thomas H. Davenport
President’s Distinguished Professor at Babson College
Visiting professor at Harvard Business School
Independent senior advisor to Deloitte Analytics
There is little doubt that computers have taken • Closely monitor automation developments in their
substantial work away from lower- and middle-skilled chosen field, and monitor which aspects of the
jobs. Bank tellers, airline reservations clerks, and profession are most likely to be automated. For
assembly line workers can all testify to this effect. example, I suspect that in journalism—already a
Thus far, however, high-end knowledge workers difficult field because of the decline of print—the
have been relatively safe from job encroachment. most likely candidates are those involving high levels
Computers have certainly changed knowledge work, of numerical reporting, such as sports and business
but they have largely augmented human labor rather journalism. Reporting on elections and political
than replacing it. surveys might also be at risk. More investigative and
human interest reporting is relatively safe, I suspect.
Now, however, knowledge workers face a challenge
to their own employment. Analytical and “cognitive • Become an expert in their chosen field as quickly
computing” technologies can make almost any as possible. Entry-level jobs are most at risk from
decision with a high degree of accuracy and automation, but experts are usually still needed to
reliability. From Jeopardy! questions to handle the most difficult cases and to advise and
cancer diagnosis to credit risk decisions, develop new rules and algorithms.
there seems to be no decision domain
that smart machines can’t conquer. • Develop an understanding of the technologies that
are most likely to become important in the industry.
Thus far, it’s been rare for a manager, For highly quantitative fields, machine learning is a
professional, or highly specialized strong candidate; for more textually oriented fields,
worker to lose a job for this reason. Watson-like cognitive computing is more likely to be
The decisions automated have been the automating technology.
relatively narrow, and only small parts
of knowledge workers’ roles have been • Most of all, I’d advise workers in fields where
supplanted. For example, while automated automation is coming to “make friends with their
radiological image analysis can identify certain computers.” Learn how they work, what they are
cancers, at most their use has been to supply a good at, and their areas of weakness. If possible,
“second set of eyes” for a radiologist’s diagnosis. learn how to modify and improve them. Understand
the implicit assumptions that underlie their models
However, if my children were planning to become
and rules, and under what conditions these
lawyers, doctors, accountants, journalists, teachers,
assumptions might become invalid.
or any of the many other fields for which automated
or semi-automated offerings have already been In the short run, knowledge workers are probably safe
developed, I would have some advice for them (which from substantial automation, but taking these steps
I am sure they would ignore!). I would advise the will likely make for a more successful career. In the
following actions: long run, all bets are off!
119
Tech Trends 2015: The fusion of business and IT
Cyber implications
C YBER security and data privacy considerations should be a part of analytics conversations, especially
as amplified intelligence moves insights more directly into the heart of how, and where, business
occurs. Information should be monitored and protected when it is at rest, in flight, and in use. These
three scenarios feature different actors using different platforms and that require different cyber security
techniques. Moreover, for each scenario, you must know how to manage misuse, respond to breaches,
and circle back with better security and vigilance.
“At rest” is the traditional view of information security: How does one protect assets from being
compromised or stolen? Firewalls, antivirus software, intrusion detection, and intrusion prevention
systems are still needed, but are increasingly less effective as attackers rapidly evolve their tools and
move from “smash and grab” ploys to long-dwell cybercrimes. Instead of an outright offense that may
leave telltale signs, attackers gain access and lie dormant—launching incremental, almost imperceptible
activities to discover vulnerabilities and gain access to valuable IP.
The additional emphasis on “in flight” and “in use” reflects a shift in how organizations put their
underlying data to use. Information is increasingly consumed in the field via mobile, potentially on
personally owned consumer devices. Encryption can help with transmission and data retention. Identity,
access, and entitlement management can help properly control user actions, especially when coupled
with two-factor authentication. Application, data, and/or device-level containers can protect against
attacks on the network, hardware, or other resident apps. Again, though, these demonstrated techniques
may not be enough, given the growing sophistication of criminal products, services, and markets.
Organizations should couple traditional techniques with advanced analytics, amplifying the
intelligence of cyber security personnel. Leading cyber initiatives balance reactionary methods with
advanced techniques to identify the coming threat and proactively respond. They take a fusion of
information from a range of sources with differing conceptual and contextual scope, and combine
it with human-centered signals such as locations, identity, and social interactions of groups and
individuals. This approach has a number of implications. First, it creates the need to adopt a broader
cyber intelligence mindset—one that leverages intel from both internal and external sources. Insight
pulled from new signals of potentially hostile activities in the network can point to areas where security
professionals should focus. Similar to how amplified intelligence informs approaches to business
operations, this raw security data should be analyzed and presented in ways to augment an individual’s
ability to take action.
Machine learning and predictive analytics can take cyber security a step farther. If normal “at rest,”
“in flight,” and “in use” behavior can be baselined, advanced analytics can be applied to detect deviations
from the norm. With training to define sensitivities and thresholds, security teams’ capabilities can be
amplified with real-time visibility into potential risks when or before they occur. At first, this ability is
likely to simply guide manual investigation and response, but eventually it could move to prescriptive
handling—potentially enabling security systems to automatically respond to threat intelligence and take
action to predict and prevent or promptly detect, isolate, and contain an event when it occurs.
120
Amplified intelligence
• Set priorities by asking business • Design from the user down. Amplified
questions. Organizations can start by intelligence is about putting advanced
asking business leaders for the wish analytics in the hands of the individual
list of questions they would love to be when he or she needs it. User experience
able to answer—about their customers, should dictate the format, granularity, and
products, processes, people, markets, decisiveness of how that insight should
facilities, or financials. Develop the wish be provided:
list independent of constraints on what –– Format—the channel, notification, and
is knowable, answerable, or technically interaction method
feasible. Use the questions to guide –– Granularity—how much detail is
priorities and reveal what types of data needed and in what context
might be needed—internal and external,
structured and unstructured, information –– Decisiveness—whether responses are
already captured versus information not descriptive, predictive, or prescriptive,
currently measured or stored. Identify which can range from providing passive
what problem-solving techniques may be supporting detail to aid decision
required: in-memory or massively parallel making to proactively recommending a
processing for analyzing huge data volumes, response or taking action
deterministic or probabilistic modeling for
advanced statistical modeling, visualization • Expect resistance (which is not futile).
or querying environments for exploration A recent Gartner report found that “by
and discovery, or predictive analytics 2020, the majority of knowledge worker
and/or machine learning to automate the career paths will be disrupted by smart
formulation of hypotheses. machines in both positive and negative
ways.”13 Investors are aggressively directing
• Check your gut. One of the only things capital toward AI and robotics, and venture
worse than an unanswered question is capital investments in AI have increased by
investing in insights your organization more than 70 percent per year since 2011.14
121
Tech Trends 2015: The fusion of business and IT
Unions and labor groups could impede live up to the full potential of amplified
adoption. Unskilled labor categories intelligence means using the technology
may see greater impact, as robotics and to enhance the value of the end worker.
machine learning continue to disrupt lines In a way, amplified intelligence initiatives
of employment. Transparency of intent are a direct investment in the individual
will be important, along with programs that makes them even more valuable to the
to help retool and redeploy displaced organization.
workers. Prioritizing investments that
122
Amplified intelligence
Bottom line
I T’S easy to get stuck on the “what?” of analytics—trying to define conceptual models for the
enterprise’s wide range of information concerns. Leading companies, however, have aggressively
pursued the “so what?”—prioritizing crunchy questions with measurable value as the focal points
of their endeavors. Amplified intelligence represents the “now what?” of moving from theoretical
exercises to deploying solutions where business decisions are actually made. Usability and outcomes
should take their rightful place over platforms, tools, and data—important ingredients, to be sure,
but only part of the recipe. While the machine continues to rise to impressive new heights, its
immediate potential comes from putting it in the right hands, in the right manner, when it counts.
Authors
Forrest Danson, US Deloitte Analytics leader, Deloitte Consulting LLP
Danson is the US Deloitte Analytics Integrated Market Offering leader,
responsible for coordinating analytics go-to-market activities and capability-
building across each of the functions: Audit, Tax, Consulting, and Financial
Advisory. Danson assumed this role in 2012 and has been focused on
“embedding analytics in everything we do”—our offerings, our industry
sectors, and our alliances.
123
Tech Trends 2015: The fusion of business and IT
Endnotes
1. Jeff Bertolucci, “10 powerful facts about 7. Brad Stone, “Invasion of the taxi snatch-
big data,” InformationWeek, June 10, 2014, ers: Uber leads an industry’s disruption,”
http://www.informationweek.com/big-data/ Bloomberg BusinessWeek, February 20,
big-data-analytics/10-powerful-facts-about- 2014, http://www.businessweek.com/
big-data/d/d-id/1269522?image_num- articles/2014-02-20/uber-leads-taxi-industry-
ber=4, accessed October 23, 2014. disruption-amid-fight-for-riders-drivers
2. AI Topics.org, “Ethics & social issues,” http:// 8. Rohan Patil, “Supermarket Tesco pioneers
aitopics.org/topic/ethics-social-issues, accessed big data,” Dataconomy, February 5, 2014,
October 23, 2014; Nick Bostrom, “Ethical http://dataconomy.com/tesco-pioneers-
issues in advanced artificial intelligence,” big-data/, accessed June 30, 2014.
http://www.nickbostrom.com/ethics/ai.html, 9. Palantir, Responding to crime in real time,
accessed October 23, 2014; Bianca Bosker, https://www.palantir.com/wp-assets/
“Google’s new A.I. ethics board might save wp-content/uploads/2014/03/Impact-Study-
humanity from extinction,” Huffington Post, LAPD.pdf, accessed January 9, 2015.
January 30, 2014, http://www.huffingtonpost.
com/2014/01/29/google-ai_n_4683343. 10. Ibid.
html, accessed October 23, 2014. 11. “Palantir at the Los Angeles Police De-
3. Eliene Augenbraun, “Elon Musk: Artificial partment,” YouTube, January 25, 2013,
intelligence may be ‘more dangerous than https://www.youtube.com/watch?v=aJ-
nukes’,” CBSNews, August 4, 2014, http://www. u7yDwC6g, accessed January 9, 2015.
cbsnews.com/news/elon-musk-artificial- 12. Ibid.
intelligence-may-be-more-dangerous-than-
13. Tom Austin, Top 10 strategic tech-
nukes/, accessed October 23, 2014.
nologies—The rise of smart machines,
4. Brent Dykes, “31 essential quotes on Gartner, Inc., January 29, 2014.
analytics and data,” October 25, 2012, http://
14. Deloitte University Press, Intelligent
www.analyticshero.com/2012/10/25/31-
automation: A new era of innovation,
essential-quotes-on-analytics-and-
January 22, 2014, http://dupress.com/
data/, accessed October 23, 2014.
articles/intelligent-automation-a-new-era-
5. Deloitte University Press, More growth of-innovation/, accessed October 23, 2014.
options up front, July 17, 2014. http://
dupress.com/articles/more-growth-options-
up-front/, accessed October 23, 2014.
6. Mark Prigg, “Google Glass for war: The US
military funded smart helmet that can beam
information to soldiers on the battlefield,”
DailyMail, May 27, 2014, http://www.dailymail.
co.uk/sciencetech/article-2640869/Google-
glass-war-US-military-reveals-augmented-
reality-soldiers.html#ixzz3OLyXMeYx,
accessed January 9, 2015.
124
Amplified intelligence
125
IT worker of the future
127
Tech Trends 2015: The fusion of business and IT
At the same time, exposure to and comfort for both those participating in crowd labor
with technology is reaching unprecedented pools and enterprises looking to the crowd for
levels, regardless of age, geography, or dynamic, scalable resources. Jobs can be task-
education level.5 The ubiquity of low- or oriented, tapping local or global pools of vetted
no-cost technology coupled with a growing talent to handle simple, sometimes menial
entrepreneurial spirit has given rise to the work. Or they can focus on highly specialized
maker movement.6 The movement encourages areas such as software engineering, data
hands-on learning with not just software science, creative design, or even management
development, but the blending of coding with consulting.10 A Bersin & Associates11 study
hardware and hard science. One byproduct found that more than 32 percent of positions
of the movement is The Raspberry Pi, a credit were either part-time or contract-based. A
card-sized, all-in-one computer that sells for growing number of these positions are being
$35 and teaches newcomers programming filled via crowdsourcing platforms such as
and product engineering, including the use of GigWalk, Freelancer, oDesk, Kaggle, Tongal,
sensors, robotics, and other hardware add-ons. and others.12
The maker movement encourages tinkering,
experimentation, and prototyping, ideally in Design as a discipline
disciplines adjacent to workers’ day-to-day
Design lies at the heart of the IT worker
responsibilities. Commercial successes from
of the future. The emphasis on design may
the movement include the Pebble Smartwatch,
require new skill sets for the extended
MakerBot’s 3D printer, and Oculus Rift’s
IT team—which may include graphic
VR headset.
designers, user experience engineers, cultural
But democratized innovation isn’t just
anthropologists, and behavioral psychologists.
the domain of start-ups and incubators. It’s
IT leaders should add an “A” for fine arts to
also just as important to the war for talent as
the science, technology, engineering, and
it is to the war for growth. Deloitte’s annual
math charter—STEAM, not STEM. Designing
Millennial Survey found that a company’s
engaging solutions requires creative talent;
reputation for fostering innovation is the single
creativity is also critical in ideation—helping
most important factor driving Millennials’
to create a vision of reimagined work, or to
employment decisions: It is a high priority
develop disruptive technologies deployed via
for 78 percent of all global respondents, and
storyboards, user journeys, wire frames, or
for more than 90 percent of respondents in
persona maps. Some organizations have gone
emerging markets such as China and India.7
so far as to hire science fiction writers to help
Finally, the very nature of employment is
imagine and explain moonshot thinking.13
changing. Despite a few high-profile bans on
Design can also underpin more agile,
working from home by companies such as
responsive techniques in IT management and
Yahoo,8 companies are increasingly providing
delivery by instilling a culture focused on
virtual work arrangements that stress flexibility
usability—not just concentrating on the look
over traditional incentives. And a recent
and feel of the user interface, but addressing
survey found that 53 percent of IT workers
the underlying architectural layers. Design
would take a 7.9 percent pay cut in exchange
can rally Dev and Ops around a shared vision
for the ability to work remotely.9 Technology
of improved end-to-end design and end-
such as virtual whiteboards, mobile robots, and
user experience—responsiveness, reliability,
video capability built into messaging platforms
scalability, security, and maintainability
connect team members who may be continents
in streamlined and automated build and
apart. The adoption of crowdsourcing is rising
run capabilities.
128
IT worker of the future
752,900 658,500
648,400
487,800
102,500
2012 2022 2012 2022 2012 2022 2012 2022 2012 2022
Sources: a Dennis Vilorio, “STEM 101: Intro to tomorrow’s jobs,” Occupational Outlook Quarterly, spring 2014, http://www.bls.gov/careeroutlook/
2014/spring/art01.pdf, accessed January 13, 2015. b Change the Equation, “What are your state’s STEM vital signs?,” July 2013,
http://changetheequation.org/sites/default/files/About%20Vital%20Signs.pdf, accessed January 13, 2015. c United States Department
of Commerce, “The state of our union’s 21st century workforce,” February 6, 2012, http://www.commerce.gov/blog/2012/02/06/
state-our-union%E2%80%99s-21st-century-workforce, accessed January 13, 2015.
129
Tech Trends 2015: The fusion of business and IT
130
IT worker of the future
131
Tech Trends 2015: The fusion of business and IT
132
IT worker of the future
That environment is changing. The half-life of • Exposure. Relationship building with other
an IT employee today sits at two years. New professionals and thought leaders inside and
disruptive technologies can emerge during outside their organizations. This can include
a performance management cycle.i And this coaching and mentoring, joining internal
evolution will continue well into the future. and external communities of practice,
Staying relevant and adapting to change are participating in professional organizations,
some of the most pressing priorities for today’s and attending conferences.
IT worker.
• Environment. Tools, systems, and other
The future skills of the infrastructure that support employees in
their day-to-day work, or that they can use
IT insurance worker on the job to learn. For example, learning
The IT worker of the future needs to be management systems that incorporate
comfortable in an environment where there search, ratings, and discussion groups help
is no wall between IT and the business. This learners find the resources and training they
means that IT workers need to be trusted require to resolve an immediate problem or
partners who understand the business, can to facilitate their longer-term growth.
articulate technology solutions to business
problems, and can proactively advise the A recent Deloitte study found that “CIOs
business. The IT worker can no longer rely on rank talent—acquiring, retaining, and
passive, formal or “event based” learning. IT developing it—among their top priorities.”ii
workers must maintain their own awareness Technology organizations increasingly
and understanding of current and future recognize that innovation and business
technology. growth require two things: immediate
To meet this evolving need, insurers should access to solution-based learning for on-
look to implement a program for increasing the-job problem solving, as well as a robust
the flexibility and adaptability of insurance IT learning strategy to “continually upgrade
workers across four categories: the capabilities of existing internal staff ” to
strategically meet long term organization
• Education. Traditional, formal methods needs. As insurers address a rapidly evolving
of training and development, such as competitive environment, developing the
instructor-led classroom training, online team to lead them in the future is increasingly
courses, virtual classrooms, and simulations. imperative to continued growth.
Insurance vendors offer formal and informal
training – an insurer should push their IT
team members to learn the platforms of the
current day and future.
133
Tech Trends 2015: The fusion of business and IT
134
IT worker of the future
customers, and, equally as important, how increased flexibility, agile work techniques,
the GSA IT organization can support new and cross-team collaboration. Using mobile
operational strategies. technologies, workers can now connect
On the technology front, Sonny Hashmi, to critical systems from anywhere at any
GSA’s CIO, developed a roadmap of seemingly time. This capability paid dividends during
minor investments that formed a new Hurricane Sandy, where field workers stayed
precedent for consolidation, standardization, operative wherever they could find an Internet
and enhanced usability. Instead of attempting connection—hotel lobbies, office parks, or
a sweeping overhaul, Hashmi focused on public shopping centers. Hashmi also helped
initiatives IT could spearhead, often in high- create a digital services agency called 18F—an
touch commodity areas. Email, document internal innovation hub—which is composed
management, and collaboration suite projects of Presidential Innovation Fellows.
yielded early wins. Many of these projects Finally, Hashmi is changing the GSA’s
tapped cloud-based solutions that improved approach to recruiting and hiring IT talent.
the user experience while also reducing cost Hashmi has had success recruiting former
and complexity. They also helped create a Silicon Valley players with the skills and
new technology environment—one driven by experience needed to solve some of the
innovation and collaboration—that Hashmi government’s toughest problems. His team now
now leverages to cultivate IT workers of the includes a dozen Silicon Valley technologists
future. The agency proved to be an early who are excited by the challenge, the potential
adopter of cloud, open source, digital, and impact, and the spirit of civic duty they find in
agile development—helping to lead the way their new roles.
for emerging technology adoption in the US
federal government. Reorienting the IT organization
This groundwork is important as the GSA
Deloitte LLP’s information technology
continues to modernize its IT footprint. A
services (ITS) organization provides and
massive application modernization initiative,
maintains the infrastructure needed to
which includes a tenfold rationalization of
support Deloitte’s network of roughly 210,000
more than 1,000 applications, is currently
professionals. This global footprint comprises a
underway. Simplifying the core in this way
wide range of applications consumed via a mix
frees resources that can be directed toward
of corporate and employee-owned devices.
innovation and emerging technologies.
Over the last five years, Deloitte, like
Hashmi is also investing in retraining and
many of its clients, has been impacted by
reinvigorating the talent pool, preparing his
numerous technology trends, including the
people “for not just new tactical skills, but a
consumerization of IT, rising mobile adoption,
new paradigm change in how IT is delivered.”
cloud, and big data, among others. The rapid
GSA IT teams now sit side by side with
pace of technological change brought about by
their internal customers, leveraging open
these trends has challenged ITS to transform
platforms to iterate quickly. They use DevOps,
its organization and operational models in
UX, and cloud computing to build new
ways that can help streamline and accelerate
capabilities that complement tried-and-
development projects. On the process side,
true processes. The GSA has also begun
this has meant adopting agile development
transforming its office facilities by knocking
techniques in which large investment programs
down walls, eliminating assigned seating, and
are divided into small and mid-size releases,
creating open meeting rooms. Rethinking the
allowing small teams to work iteratively in
organization’s workspace approach has led to
135
Tech Trends 2015: The fusion of business and IT
short sprints, making it easier to accommodate possess three primary traits that can help
in-process design changes based on real-time teams create more user-centric designs: a focus
feedback from customers and end users. on empathy, intellectual curiosity, and mastery
Though more traditional waterfall techniques of a particular craft (whatever that may be).
remain useful for some legacy projects and Recent hires now come from a broad variety
maintenance, ITS now approaches new of backgrounds spanning 12 nationalities,
initiatives from a “Why not agile?” perspective. 22 degrees, and dozens of majors, including
ITS has also shifted its resource mix computer science, information systems,
from predominantly onshore resources, graphic design, psychology, anthropology, art
formerly organized in competency-based history, and sociology. Moreover, ITS now
Centers of Excellence (CoE) and multitasking trains employees in non-traditional subjects,
across multiple projects, to a new model including the art of empathy and designing
in which teams of external, onshore, and from a user-centric point of view, to better
offshore resources collaborate closely within align with the design studio methodology. The
autonomous delivery units—a studio model. result is a multidisciplinary team that blends
Along with adopting the studio model, ITS creative, user experience, engineering, and
has also altered its approach to recruiting new functional knowledge to enhance creativity
talent. Traditionally, fluency in English was a and innovation. Focusing on the end-user
requirement for most offshore development experience, the onshore studio teams conducts
roles, which limited the pool of potential research and brainstorming to gain a deep
candidates. In the studio model, only a small understanding of customer needs, talks to end
offshore mirror studio team—which regularly users to better understand their behaviors and
communicates with the onshore delivery motivations, looks at processes from end to
management studio team—needs English end, understands the data involved, and seeks
proficiency. This frees ITS to hire leading inspiration from existing paradigms in the
candidates for specialized work, regardless of external world.
their language skills. Post-reorganization, on-time project
Additionally, ITS has begun hiring delivery has risen from less than 70 percent to
employees who bring more to the job than 94 percent, with corresponding increases in
just technical degrees and IT experience. user adoption and engagement, and overall ITS
Prospective candidates are now expected to organizational satisfaction.
136
IT worker of the future
My take
Michael Keller, EVP and chief information officer,
Nationwide Mutual Insurance Company
137
Tech Trends 2015: The fusion of business and IT
Cyber implications
T ECHNOLOGY has entered an era of usability, openness, and convenience. End users expect
solutions to be simple, intuitive, and easy to use, not just for the IT worker of the future, but for the
entire workplace of the future.
At the same time, the stakes around cyber security and data privacy continue to increase, making
cyber risk management a strategic priority across industries. Yet traditional techniques like complex
passwords, containers, key fob two-factor authentication, and CAPTCHA verification can interrupt the
end-user journey. Frustrated users may look for shortcuts or alternative means for carrying out their
business. In doing so, they often bypass controls and introduce new vulnerabilities. Security protocols
can only be effective if users follow them.
Therefore, it is critical to balance the need for security with a focus on user experience (UX) by
creating a well-integrated, unobtrusive risk framework that is anchored around the end user’s journey.
Superior user experiences will have security attributes so tightly integrated that they are barely
noticeable; they can quietly and unobtrusively guide users toward more vigilant and resilient behaviors.
For example, technical advances in fingerprint authentication, facial recognition, and voice detection
embedded into commonly used consumer devices make it possible to protect without sacrificing user
interface flows.
This marriage of UX and cyber risk management has a dark side. New threat vectors target
weaknesses of specific personas within your employee base—spoofing alerts to update mobile apps
with malicious proxies or corrupted links posing as social media interactions. The response cannot
just be more usable, intuitive, risk-managed systems—education and awareness are critical. Arm your
employees with not only the “what,” but the “why” and the “so what.” Beyond enforcing compliance,
make cyber risk management a strategic organizational pillar and a shared cultural concern embedded
across solution life cycles and operational processes. A broader enterprise governance structure can help,
communicating the intent and importance of cyber security measures. Your employees should be taught
how to identify and handle risk, not just how to comply with the minutiae of policies and controls.
The combination of cyber-aware user experiences and education programs can elevate security and
privacy beyond being reactive and defensive. And IT workers aren’t just end users. They are also the
creators and managers of the systems and platforms that drive the business. Cyber security and privacy
should be tightly integrated into how software is delivered, how systems are maintained, and how
business processes are executed. As new IT organizational and delivery models emerge, build muscle
memory around modern approaches to security and privacy. The IT workers of the future can become
the new front and back line of defense—informed, equipped, and empowered.
138
IT worker of the future
139
Tech Trends 2015: The fusion of business and IT
To retain institutional experience, • Light your talent beacon. Your own people
organizations should consider contract are critical to attracting the IT workers of
arrangements for aging employees that offer the future. Seventy percent of Millennials
part-time packages at lower compensation learn about job opportunities from friends;
and benefits. 89 percent of software engineers are
staying put, having applied for fewer than
• Outside in. To achieve positive results, two jobs in the past five years.21 Leading
organizations will likely need to participate organizations need to be a net importer of
in external talent ecosystems. Define talent, and the front lines start with their
a crowdsourcing strategy that guides people. Communicate your vision for the
the usage of crowd platforms to solve organization, commit to the talent strategy,
your organization’s problems, and give and invest in incentives to drive retention
employees permission to participate in and referrals.
crowd contests, on the job or off the clock.
Incubators and start-up collaboration • Transform HR. Not an insignificant task.
spaces are looking for corporate sponsors; Not every employee is being hired to
they provide a chance to co-locate workers retire, and the future worker of IT (and
with inventors and entrepreneurs exploring workers in other departments) will likely
new ground. Institutions such as Singularity need a different set of services, support,
University and the MIT Media Lab offer and development than they receive today.
education programs and opportunities to HR can become a competitive weapon in
collaborate with leading researchers in areas the war for talent by shortening the time
like advanced manufacturing, artificial needed to develop the IT worker of the
intelligence, medicine, social computing, future.22 HR may need to be overhauled
and big data. Deliberately seek out briefings along with your IT organization by
and ideation sessions with your vendor and shifting its focus from people and policy
partner community to harness software, administration to talent attraction and
hardware, system integrator, and business development. HR transformation initiatives
partner thinking and research. should consider the IT worker of the
future—not just the existing employee base.
140
IT worker of the future
Bottom line
Authors
Catherine Bannister, director, Deloitte Consulting LLP
141
Tech Trends 2015: The fusion of business and IT
Endnotes
1. Dr. Tomas Chamorro-Premuzic, “Why 9. Michael Ventimiglia, “Study: Tech employees
Millennials want to work for themselves,” willing to take 7.9% pay cut to work from
Fast Company, August 13, 2014, http://www. home,” GetVOIP, September 30, 2013, http://
fastcompany.com/3034268/the-future-of- getvoip.com/blog/2013/09/30/study-tech-em-
work/why-millennials-want-to-work-for- ployees-pay-cut, accessed November 10, 2014.
themselves, accessed November 10, 2014. 10. Deloitte Consulting LLP, Tech Trends 2014:
2. Allie Bidwell, “Report: Economy will face Inspiring disruption, February 6, 2014,
shortage of 5 million workers in 2020,” U.S. http://dupress.com/periodical/trends/tech-
News and World Report, July 8, 2013, http:// trends-2014/, accessed November 10, 2014.
www.usnews.com/news/articles/2013/07/08/re- 11. Deloitte Consulting LLP acquired
port-economy-will-face-shortage-of-5-million- Bersin & Associates in January 2013.
workers-in-2020, accessed November 10, 2014.
12. Josh Bersin, “Enter the virtual work-
3. Sohan Murthy, “Revisiting gender force: TaskRabbit and Gigwalk,” Forbes,
inequality in tech,” LinkedIn Today, April 14, 2012, http://www.forbes.com/
July 8, 2014, https://www.linkedin. sites/joshbersin/2012/04/14/enter-the-
com/pulse/article/20140708151101- virtual-workforce-taskrabbit-and-gigwalk/,
72012765-revisiting-gender-inequality- accessed November 10, 2014.
in-tech, accessed November 10, 2014.
13. Rachael King, “Lowe’s uses science fiction
4. Christopher Mims, “Computer program- to innovate,” CIO Journal by The Wall Street
ming is a trade; let’s act like it,” Wall Street Journal, July 20, 2014, http://blogs.wsj.com/
Journal, August 3, 2014, http://online.wsj. cio/2014/07/20/lowes-uses-science-fiction-
com/articles/computer-programming- to-innovate/, accessed November 10, 2014.
is-a-trade-lets-act-like-it-1407109947,
accessed November 10, 2014. 14. TrackVia, Rebels with a cause, 2014, http://
www.trackvia.com/overview/resources/
5. Aaron Smith, “U.S. views of technology and rebels-with-cause-millennials-lead-byod-
the future,” Pew Research Internet Project, byoa-trends/, accessed November 10, 2014.
April 17, 2014, http://www.pewinternet.
org/2014/04/17/us-views-of-technology- 15. James Bessen, “Some predict computers will
and-the-future/, accessed November 10, produce a jobless future. Here’s why they’re
2014; “Emerging nations embrace Inter- wrong,” Washington Post, February 18, 2014,
net, mobile technology,” Pew Research http://www.washingtonpost.com/blogs/the-
Global Attitudes Project, February 13, 2014, switch/wp/2014/02/18/some-predict-comput-
http://www.pewglobal.org/2014/02/13/ ers-will-produce-a-jobless-future-heres-why-
emerging-nations-embrace-internet-mobile- theyre-wrong/, accessed November 10, 2014.
technology/, accessed November 10, 2014. 16. See 7-Eleven, “7-Eleven® turns to ‘idea hub,’
6. John Hagel, John Seely Brown, and Duleesha hackathon for new smartphone app capabili-
Kulasooriya, A movement in the making, ties,” March 28, 2013, http://corp.7-eleven.
Deloitte University Press, January 24, 2014, com/news/03-28-2013-7-eleven-turns-to-
http://dupress.com/articles/a-movement-in- idea-hub-hackathon-for-new-smartphone-
the-making/, accessed November 10, 2014. app-capabilities; Reed Smith, “How to
advance health technology?,” Social Health
7. Deloitte, Big demands and high expectations: Institute, December 15, 2011, http://www.
The Deloitte Millennial Survey—Executive socialhealthinstitute.com/2011/12/how-to-
summary, January 2014, http://www2.deloitte. advance-health-technology/; Walgreens,
com/content/dam/Deloitte/global/Documents/ “hackathon,” https://developer.walgreens.com/
About-Deloitte/gx-dttl-2014-millennial-sur- blog-tag/hackathon, accessed January 10, 2015.
vey-report.pdf, accessed November 10, 2014.
17. Lindsay Rothfield, “How your company
8. Julianne Pepitone, “Marissa Mayer: Yahoos can attract top tech talent,” Mashable, June
can no longer work from home,” CNN 28, 2014, http://mashable.com/2014/06/28/
Money, February 25, 2013, http://money.cnn. attract-tech-talent-infographic/, ac-
com/2013/02/25/technology/yahoo-work- cessed November 10, 2014.
from-home/, accessed November 10, 2014.
142
IT worker of the future
18. Deloitte Consulting LLP, Tech Trends 2013: 21. Rothfield, “How your company
Elements of postdigital, 2013, chapter 4. can attract top tech talent.”
19. Soren Kaplan, “6 ways to create a culture 22. Deloitte Consulting LLP, Global Human
of innovation,” Fast Company, Decem- Capital Trends 2014, 2014, http://dupress.
ber 21, 2013, http://www.fastcodesign. com/periodical/trends/global-human-capital-
com/1672718/6-ways-to-create-a-culture-of- trends-2014/, accessed November 10, 2014
innovation, accessed December 17, 2014.
20. Netflix, “Freedom & responsibility culture
(version 1),” June 30, 2011, http://www.
slideshare.net/reed2001/culture-2009,
accessed December 17, 2014.
143
Exponentials
Exponentials
145
Tech Trends 2015: The fusion of business and IT
146
Exponentials
147
Tech Trends 2015: The fusion of business and IT
A new technology that scales quickly from one to a million users has become a common and
straightforward phenomenon. Scaling an organization at exponential speed, however, is quite another
matter. Organizational growth is usually linear—incremental and slow. In recent years, however, a new
breed of exponential organizations (ExOs) such as Waze and WhatsApp have experienced dramatic growth
trajectories and achieved multibillion-dollar valuations in just a few years.5
Unlike traditional businesses that combine assets and workforces within organizational boundaries and sell
access to it, ExOs leverage the world around them, such as other people’s cars and spare rooms. In our
benchmarks, they outperform their competitors at least tenfold. A traditional consumer product company,
for example, takes an average of 300 days to move a product from idea to store shelves. Quirky, an ExO
that crowdsources new product ideas, can move products through the same process in 29 days.6
Most of the key drivers of this new breed of ExOs can be boiled down to two acronyms: SCALE and IDEAS.
SCALE comprises the external mechanisms that ExOs use to fuel their growth:
• Staff on demand: ExOs leverage external resources instead of maintaining large employee bases.
• Community and crowd: ExOs build and join communities to achieve rapid scale.
• Algorithms: As the world turns to big data, ExOs excel in the use of algorithms and machine learning.
• Leased assets: ExOs access or rent assets to stay nimble. For example, Lyft doesn’t own its cars.
• Engagement: Techniques such as gamification and incentive prizes are core to ExOs’ ability to quickly
engage markets.
IDEAS comprises the internal control mechanisms that ExOs use to increase their organizational velocity:
• Interfaces: ExOs configure interfaces for their external constituents. Uber, for example, has its own
system to manage its drivers.
• Dashboards: To track and monitor performance, ExOs use real-time metrics and performance-tracking
techniques like the Objectives and Key Results methodology.
• Experimentation: ExOs use approaches such as lean production for rapid experimentation and process
improvements through fast feedback loops.
• Autonomy: ExOs are extremely flat organizations, sometimes with no management layers.
• Social: File sharing and activity streams drive real-time, zero-latency conversations across
the organization.
There are currently between 60 and 80 ExOs that are delivering extraordinary results.7 Their rapid rise
portends a new way of how businesses may be built and operate in the future. Established enterprises
should consider these changes sooner rather than later.
148
Exponentials
design principles
Source: Deloitte Development LLP, Scaling edges: A pragmatic pathway to broad internal change, 2012.
Source: Deloitte Development LLP, Scaling edges: A pragmatic pathway to broad internal change, 2012.
149
Tech Trends 2015: The fusion of business and IT
150
Exponentials
151
Tech Trends 2015: The fusion of business and IT
152
Exponentials
153
Tech Trends 2015: The fusion of business and IT
My take
Peter H. Diamandis, MD,
Cofounder and executive chairman, Singularity University;
Chairman and CEO, XPRIZE Foundation;
Author of Bold: How to Go Big, Create Wealth and Impact the World
With news of 3D printing projects appearing almost Hull’s commitment, courage, and capability helped
daily, it is easy to assume that the technology is a “big him surmount these challenges and execute his
bang” disruption with overnight achievements. That is vision. Conviction is needed to endure the experience
not the case. Like many disruptions, 3D printing took of repeatedly failing and learning, and, ultimately,
decades to develop. It finally stepped center stage convincing and disrupting. It arguably underpins what
because of Chuck Hull’s indefatigable vision. Apple Inc. famously dubbed as “the crazy ones.” In
its 1997 television commercial, the company pointed
Hull invented 3D printing in the 1980s and founded to Bob Dylan, Martin Luther King Jr., and Thomas
3D Systems to commercialize the technology. Edison as exemplars whose visions and convictions fell
For the first 20 years, development was slow, outside the status quo and ultimately changed it.
extraordinarily expensive, and saddled with
complicated user interface challenges. Vision and conviction aren’t always enough by
In the early 2000s, despite its first themselves, however. They need fluid organizations to
mover advantage, the company achieve their impact. Businesses likely won’t be able
nearly went bankrupt. Today, 3D to keep pace with exponentials, much less disrupt
Systems’ market cap is more than markets, if they stick to an incremental approach
$3 billion19. to innovation that is siloed in many departments.
Exponential technologies, including these six, are
Hull’s vision girded his simply too intertwined and advancing too rapidly for
confidence to fight the many status quo organizations to keep pace.
battles encountered on the
road to disruption. Like many 3D printing, for example, is part of the larger
entrepreneurs, Hull had to cope exponential, robotics. Robots, in turn, are being
with investors, board members, endowed with AI, which will likely move them far
employees, and customers who beyond stocking shelves to running driverless cars
continually doubted the new and even performing surgery. By 2020, the Internet of
idea. When a company is creating Things exponential will connect more than 50 billion
something disruptive and new, many devices to the Internet.20 IoT devices and trillions of
people won’t believe it until they can hold it. sensors will connect to machines with sophisticated
And even then, they might be skeptical about artificial intelligence. Finally, infinite computing power
its market potential. will combine with AI to transform the field of synthetic
biology to create everything from new foods to
new vaccines.
154
Exponentials
155
Tech Trends 2015: The fusion of business and IT
156
Exponentials
157
Tech Trends 2015: The fusion of business and IT
Authors
Bill Briggs, director, US chief technology officer, Deloitte Consulting LLP
158
Exponentials
Endnotes
159
Tech Trends 2015: The fusion of business and IT
19. Bloomberg BusinessWeek, “3d Systems 26. Marc Goodman, “Criminals and terror-
Corp,” http://investing.businessweek. ists can fly drones too,” Time, January 31,
com/research/stocks/snapshot/snapshot. 2013, http://ideas.time.com/2013/01/31/
asp?ticker=DDD, accessed January 21, 2015. criminals-and-terrorists-can-fly-drones-
20. Cisco, “The Internet of Things,” April too/, accessed January 15, 2015.
2011, http://www.cisco.com/web/about/ 27. PRNewswire, “Global synthetic biol-
ac79/docs/innov/IoT_IBSG_0411FINAL. ogy market expected to reach USD13.4
pdf, accessed January 15, 2015. billion in 2019: Transparency Market
21. Paul Benioff, “Quantum mechanical Research,” press release, April 8, 2014, http://
hamiltonian models of Turing ma- www.prnewswire.co.uk/news-releases/
chines,” Journal of Statistical Physics, global-synthetic-biology-market-expected-
vol. 29, no. 3, 1982, pp. 515–546. to-reach-usd134-billion-in-2019-trans-
parency-market-research-254364051.
22. Tom Simonite, “Google launches effort to build html, accessed January 15, 2015.
its own quantum computer,” MIT Technol-
ogy Review, September 3, 2014, http://www. 28. Deloitte Consulting LLP, Tech Trends 2013:
technologyreview.com/news/530516/google- Elements of postdigital, 2013, chapter 5.
launches-effort-to-build-its-own-quantum- 29. Adam Clark Estes, Researcher can hack air-
computer/, accessed January 15, 2015. planes through in-flight entertainment systems,
23. Tom Simonite, “Microsoft’s quantum mechan- August 4, 2014, http://gizmodo.com/research-
ics,” MIT Technology Review, October 10, er-hacks-airplanes-through-in-flight-enter-
2014, http://www.technologyreview.com/ tainm-1615780083, accessed January 15, 2015.
featuredstory/531606/microsofts-quantum- 30. Siobhan Gorman, “China hackers hit U.S.
mechanics/, accessed January 15, 2015. chamber,” Wall Street Journal, December
24. The National Human Genome Research 21, 2011, http://www.wsj.com/articles/SB
Institute, “The Human Genome Project 100014240529702040584045771105415
Completion: Frequently Asked Ques- 68535300, accessed January 19, 2015.
tions,” http://www.genome.gov/11006943, 31. Neil Webb, “Home, hacked home,” Economist,
accessed January 27, 2015. July 12, 2014, http://www.economist.com/
25. Chloe Albanesius, “Google X collecting news/special-report/21606420-perils-
genetic data for ‘baseline’ health project,” connected-devices-home-hacked-home,
PCmag.com, July 25, 2014, http://www. accessed January 19, 2015.
pcmag.com/article2/0,2817,2461381,00. 32. Rachel Glickhouse, Technology update: A
asp, accessed January 15, 2015. crowdsourcing guide to Latin America, Ameri-
cas Society/Council of the Americas, January
12, 2012, http://www.as-coa.org/articles/
technology-update-crowdsourcing-guide-
latin-america, accessed January 15, 2015.
160
Exponentials
161
Authors, contributors, and special thanks
Authors
Bill Briggs
Chief technology officer
Director, Deloitte Consulting LLP
[email protected]
163
Tech Trends 2015: The fusion of business and IT
Contributors
Anthony Abbattista, Elizabeth Baggett, Alex Batsuk, Amy Bergstrom, Troy Bishop, Mike Brown,
Kevin Chan, Rajeswari Chandrasekaran, Chris Damato, Larry Danielson, Dan DeArmas, Brooke
Dunnigan, Kelly Ganis, Julie Granof, John Henry, Dan Housman, Lisa Iliff, Anand Jha, Kumar
Kolin, Steven Lemelin, Derek Lindberg, Andrew Luedke, Erin Lynch, Karen Mazer, David Moore,
Diane Murray, Jeoung Oh, James O’kane, Turner Roach, Beth Ruck, Christina Rye, Ed See, Srivats
Srinivasan, Pavan Srivastava, Christopher Stevenson, David Strich, Rupinder Sura-Collins, Jim
Thomson, Barb Venneman, Ashok Venugopalan, Unmesh Wankhede, Jon Warshawsky, Vikram
Watave, Randy Whitney, Shelby Williams
Research
Leads: Thomas Carroll, Chris Chang, Brian Cusick, Justin Franks, Ashish Kumar, Karthik Kumar,
Nicole Leung, Paridhi Nadarajan
Team members: Nidhi Arora, Rachel Belzer, Joshua Block, Simeon Bochev, Mark Brindisi, Rachel
Bruns, Valerie Butler, Alex Carlon, Zhijun Chen, Chris Cochet, Adam Corn, Kevin Craig, Michael
Davis, Carolyn Day, Nermin El Taher, Amy Enrione, Zachary Epstein, Inez Foong, Melanie Gin,
Matthew Hannon, Calvin Hawkes, Nathan Holst, Evanny Huang, Shaleen Jain, Abhishek Jain,
Karima Jivani, Ryan Kamauff, Solomon Kassa, Mohin Khushani, Ryo Kondo, Varun Kumar, Alyssa
Long, Nathan Mah, Ryan Malone, Neha Manoj, Simy Matharu, Lea Ann Mawler, David Melnick,
John Menze, Alice Ndikumana, Kashaka Nedd, Carrie Nelson, Akshai Prakash, Lee Reed, Tammara
Ross, Jaclyn Saito, Jinal Shah, Shaleen Shankar, James Shen, Hugh Shepherd, William Shepherdson,
Andrea Shome, Sam Soneja, Gayathri Sreekanth, Kartik Verma, Jonathan Wan, Jordan Weyenberg,
Sridhar Yegnasubramanian, Jenny Zheng, Jennie Zhou
164
Authors, contributors, and special thanks
Special thanks
Mariahna Moore for being the heart, soul, and backbone of our team. Tech Trends takes a village,
but it simply would not happen without your leadership, passion, and drive. Cyndi Switzer for
impossibly exceeding exceptionally high expectations—continuing to be an indispensable mem-
ber of our team. Dana Kublin for her creative spark, infographic wizardry, and willingness to dive
in wherever needed. And Maria Gutierrez for her passion and tireless efforts to amplify the Tech
Trends message.
Holly Price, Henry Li, Amy Booth, Mary Thornhill, and Doug McWhirter for the fantastic
impact made in your first year Tech Trending—from the phenomenal effort coordinating our
unparalleled volunteer army to your invaluable contributions to researching, writing, marketing,
and refining the content.
Matt Lennert, Junko Kaji, Kevin Weier, and the tremendous DU Press team. Your professionalism,
collaborative spirit, and vision helped us take the report to new heights.
Finally, thanks to Stuart Fano for his years of contribution to Tech Trends. Your brilliance lives on
in this year’s app; we can’t wait to have you back in the trenches for 2016.
165
Learn more
Follow @DeloitteOnTech
www.deloitte.com/us/techtrends2015
Follow @DU_Press
Sign up for Deloitte University Press updates at www.dupress.com.
This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or its and their
affiliates are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice
or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or
action that may affect your finances or your business. Before making any decision or taking any action that may affect your finances or
your business, you should consult a qualified professional adviser.
None of Deloitte Touche Tohmatsu Limited, its member firms, or its and their respective affiliates shall be responsible for any loss
whatsoever sustained by any person who relies on this publication.
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of
member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description
of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed
description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules
and regulations of public accounting.
Copyright © 2015 Deloitte Development LLC. All rights reserved.
Member of Deloitte Touche Tohmatsu Limited