Deloitte Tech trends 2013 report - Feb 2013

96
Tech Trends 2013 Elements of postdigital 2013 Technology Trends
  • date post

    18-Oct-2014
  • Category

    Business

  • view

    6.653
  • download

    0

description

Deloitte Tech trends 2013 report - Feb 2013

Transcript of Deloitte Tech trends 2013 report - Feb 2013

Page 1: Deloitte Tech trends 2013 report - Feb 2013

Tech Trends 2013 Elements of postdigital

2013 Technology Trends

Deloitte

Tech Trends 2013 Elements of postd

igitalEd

ition 4

Page 2: Deloitte Tech trends 2013 report - Feb 2013

12013 Technology Trends – Disruptors

Preface

Welcome to Deloitte’s annual report examining trends in technology put to business use. Once again, we’ve selected ten topics that have the potential to impact businesses over the next 18 to 24 months.

Developing the list of trends is an ongoing process of primary and secondary research. The process includes:• Feedbackfromclientexecutivesoncurrentandfuturepriorities• InputfromDeloitteindustryandpracticeleaders• Perspectivesfromindustryandacademicluminaries• Researchfromalliancepartners,industryanalysts,andcompetitorpositioning• Crowd-sourcedideasandexamplesfromourglobalnetworkofpractitioners

This year’s theme, Elements of postdigital, examines the convergence and controlled collision of five forces – Analytics,Mobile,Social,Cloud,andCyber–asbusinessesmoveclosertoachievingthepossibilitiesofthe PostdigitalEnterpriseTM,whereallfiveforcesaremature,implemented,integrated,andbaked-ininsteadof bolted-on.Thesefiveforcesofferanewsetoftoolsforbusiness,openingthedoortoanewsetofrulesforoperations,performance,andcompetition.ITcandeliverengagementandempowermenttobusinesscustomers,both innovating and industrialising.

ThePostdigitalera,likethepost-industrial era, reflects a “new normal” for business and a new basis for competition. Inpost-industrialtimes,wedidn’tforegoindustrialisation,weembracedit.ThePostdigitaleraissimilar,butwithdigitalisation as its core.

It’sanuncommontimetohavefiveforces–allnewlyemerged,allevolving,alltechnology-centric–alreadyimpactingbusinesssostrongly.ItisanopportunityforITtodeliverextraordinaryvalueviamodestinvestments on top of a strong legacy technology footprint.

Our 2013 report shares ten trends grouped into two categories. Disruptors are opportunities that can create sustainablepositivedisruptioninITcapabilities,businessoperations,andsometimesevenbusinessmodels. EnablersaretechnologiesinwhichmanyCIOshavealreadyinvestedtimeandeffort,butwhichwarrantanotherlookbecauseofnewdevelopmentsoropportunities.Enablersmaybemoreevolutionarythanrevolutionary,butthepotential is often there nonetheless to elevate the business game.

Eachtrendispresentedwithmultipleexamplesofadoptiontoshowthetrendatwork.Eachalsoincludesanexternalpoint-of-viewintheMy Take. This year, you’ll also find a new section called Flying Car Future,whichtakes a provocative view into where the trend may be headed in Horizon 3 – and beyond.

Eachofthe2013trendsisrelevanttoday.Eachhassignificantmomentumandpotentialtomakeanimpact. Andeachwarrantstimelyconsideration.Forward-thinkingorganisationsshouldconsiderdevelopinganexplicitstrategyineacharea–evenifthatstrategyistowaitandsee.Butwhateveryoudo,stepup.Provokeand harvest disruption. Don’t get caught unaware or unprepared.

Thankyouforyourinterestinthisyear’sreport.Wewelcomeyourfeedbackandquestions.TothemanyexecutiveswhohaveprovidedinputintoTechTrends2013,thankyouforyourtimeandinsight.WelookforwardtohavingmoreoftheessentialdialogbetweenbusinessandIT.

MarkE.White PrincipalandCTO DeloitteConsultingLLP

RobHillard NationalLeader Technology DeloitteConsulting

Page 3: Deloitte Tech trends 2013 report - Feb 2013

2

At a Glance

CIO as the Postdigital CatalystCatalysing value from the elements of mobile, social, analytics, cloud and cyber CIOscanleadthemovetotomorrow–reshapingbusinessasusual,anddrivinginnovation.Ontheone hand, they face unprecedented opportunity for innovation. On the other, the existential threat ofdisruption.Howshouldbusinessrespond?AndwhobettertoleadthantheCIO?WhenCIOsharness the convergence of the five postdigital forces, they can change the conversation from systems tocapabilitiesandfromtechnicalissuestobusinessimpact.Planbig,startsmall,failfast,scaleappropriately.

Mobile Only (and beyond) The enterprise potential of mobile is greater than today’s smartphone and tablet apps Mobileshouldbetopofmindfororganisations.Butdon’tlimityourideastoMobileFirst.ThinkMobile Only, imagining an untethered, connected enterprise. The next wave of mobile may fundamentally reshapeoperations,businessesandmarketplaces–deliveringinformationandservicestowheredecisions are made and transactions occur. And the potential goes far beyond smartphones and tablets toincludevoice,gestureandlocation-basedinteractions;deviceconvergence;digitalidentityinyourpocket;andpervasivemobilecomputing.Theverydefinitionofmobileischanging.

Social Reengineering by DesignHow work gets done is no longer constrained by 19th century platforms Businesses are no longer building technologies just to enable interaction – they are now engineering social platforms for specific context – platforms that can relieve rather than serve traditional organisationalconstraintssuchasdeephierarchies,command-and-controlcultures,physicalproximityandresourceconcentration.Socialreengineeringcanfundamentallytransformhowworkgetsdone,butitisn’tjusta“project.”It’sastrategy.Andit’snotserendipity.It’sintentional–bydesign.

Design as a DisciplineInherent, pervasive and persistent design opens the path to enterprise value Drivenbyconsumerexperience,intuitivenessandsimplicityaremovingfromITaspirationstoenterprisemandates.Designisnotaphase;it’sawayofthinking.Beyondlookandfeel,beyonduserinterfaces.Isolatedinsilosofuserexperience(UX),marketingandproductdevelopment,individualdesignfunctions may be reaching their limits. What’s needed is a collaborative, immersive environment to worktogether.Designisnotjustan“ITthing”ora“marketingthing”ora“productengineeringthing.”It’sanenterprise thing.

IPv6 (and this time we mean it)Ubiquitous connected computing is straining the underlying foundation of the InternetInternetProtocolisthefoundationofnetworking,butwe’verunoutofaddressablespaceforaddressable items. The more important it is for your business to connect with the outside world, themoreimportantIPv6isforyourfuture–andthemoreurgentthisissueisforyoutoday. IPaddressesarewovendeepintoapplicationsandinfrastructure,andmigrationcanbringchallenges.Whilethere’snodropdeaddateforIPv6,thefinalIPv4addressblockshavealreadybeenallocated.Carefulandproperadoptionwilltaketimeforplanning,executionandverification.Thetimeto start is now.

DisruptorsOpportunitiesthatcancreatesustainablepositivedisruptioninITcapabilities, business operations, and sometimes even business models.

Page 4: Deloitte Tech trends 2013 report - Feb 2013

32013 Technology Trends – Disruptors

Finding the Face of Your Data Fuse people and technology to discover new answers in data – and new questions, too Humansdosomethingsreallywell,whilecomputersarebetteratotherthings.Itisthisparticularcombination that enables the identification of new patterns and relationships across dimensions of data – structured and unstructured, internal or external, big or otherwise. By combining human insight and intuitionwithmachinenumber-crunchingandvisualisation,companiescananswerquestionsthey’veneveransweredbefore.Moreimportantly,theycandiscoverimportantnewquestionstheydidn’tknowtheycouldask.

Gamification Goes to Work Driving engagement by embedding gaming in day-to-day business processes Gamification can encourage engagement and change employee, customer and supplier behaviour, creating new ways to meet business objectives. The goal is to recognise and encourage behaviours that driveperformance–sometimesinunlikelyplaces.Thistrendhasmovedbeyondhypeandisalreadydemonstratingbusinessvalue.Gamificationintheworkplaceincorporatessocialcontextandlocationservicestomotivateandrewarddesiredbehavioursintoday’smobile-socialworld.

Reinventing the ERP Engine Revving up data, hardware, deployment and business model architectures at the core IfyoucouldreallygetERPcheaperandfaster,whatwouldyoudodifferently?Runmaterialsrequirementplanning(MRP)manytimeseachday?Closethebooksinamatterofminutes?Optimisedeliveryrouteson-the-flyinresponsetoneworders,trafficorcustomerpreferences?Whatwoulditmeanforbusinessagility,capabilityandcompetitiveness?ERPisnostrangertoreinvention,overhaulingitselftimeandagaintoexpand functionality. But the underlying engine has remained fairly constant. That’s now changing.

No Such Thing as Hacker-proof If you build it, they will hack it. How do you deal with that? You’veeitherbeenbreached–oryousoonwillbe.Yourbossknowsit,yourbusinessknowsit,yourboardknowsit,yourcustomersknowit,andhackersknowit.It’syourjobtodealwithit.Thatmeanschangingthewayyouthinkaboutdefendingyourself.Bemoreproactiveaboutthethreat–andreactmorerapidlywhenbreachesdooccur.Detectthemquickly,respond,cleanupandadjustyourtactics. Beoutward-facing,preparedandreadyinadvance.Anticipateandpreventwhenpossible,butbereadytoisolateandencapsulateintrusionstominimiseimpact.It’sbettertoloseafingerthantoloseanarm.

The Business of ITAfter reengineering the rest of the business, IT’s children deserve some shoes FragmentedprocessesandsystemscanpreventITfromeffectivelydeliveringonthechangingdemandsofthebusiness.ITmayneedtotransformitsownmanagementsystemstokeepup.IsthisERPforIT?Maybesomeday.Today,CIOsarecraftingsolutionsfromindustry-leadingproductsandtestingbusinesscases at each step. And the potential benefits are worth the investment – not only in driving down costs andbettermanagingrisks,butinpositioningITasthebusinesspartnerinprovokingandharvestingdisruptioninthePostdigitalera.

Enablers TechnologiesinwhichmanyCIOshavealreadyinvestedtimeandeffort,butwhichwarrantanotherlookbecauseofnewdevelopmentsoropportunities.

Page 5: Deloitte Tech trends 2013 report - Feb 2013

4

Contents

CIO as the Postdigital Catalyst ...............................................................7

Mobile Only (and beyond) ...................................................................16

Social Reengineering by Design ...........................................................24

Design as a Discipline ..........................................................................33

IPv6 (and this time we mean it) ...........................................................41

Finding the Face of Your Data .............................................................51

Gamification Goes to Work .................................................................60

Reinventing the ERP Engine .................................................................68

No Such Thing as Hacker-proof ...........................................................76

The Business of IT................................................................................84

Conclusion ...........................................................................................93

Contributors ........................................................................................94

Page 6: Deloitte Tech trends 2013 report - Feb 2013

52013 Technology Trends – Disruptors

Di Disruptors

Page 7: Deloitte Tech trends 2013 report - Feb 2013

6

Page 8: Deloitte Tech trends 2013 report - Feb 2013

72013 Technology Trends – Disruptors

CIO as the Postdigital Catalyst1

Technology-centric forces are driving business innovation. Who will lead the charge?Fivemacroforces–analytics,mobile,social,cloud,andcyber–arehardatworkenablinganddisruptingorganisationsofmanyshapesandsizes.ThePostdigitalEnterpriseTMprovokesandharveststhesedisruptionsbychanging operating models, capabilities, and perhaps evenbusinessmodels.Industrialisationwasn’tcompletewhenweenteredthepost-industrialera;ithadsimplybecome the new basis for competition. The same holds trueforthesedigitalforcesinthePostdigitalera.

CIOsareinauniquepositiontobetheharbingers of change. To serve as catalysts across the executive suite, helping others understand the boundaries of the possible. Toforcethinkingbeyondveneeringexistingsolutionsand processes. To stand accountable for realising transformation.

Inalmosteveryorganisation,therelationship betweenthebusinessandITis–atbest–complicated.On one hand, technology lies at the heart of the business strategy – a tool for efficiency and an engine forgrowth.Ontheotherhand,ITdepartmentsshouldmanage the realities of being a high profile cost center – in many companies they are the single largest expense on the balance sheet1.It’snowonderthatarecentGartnerstudyreportedthat45%ofITleadersreporttotheCFO,morethantoanyotherexecutive,andthatthisrepresents an increase of 3% from 2011 to 20122. Thereareshrinkingbudgets,ashrinkingtoleranceforlongprojects,andanend-usercommunitywhosebenchmarkforeffectiveITinitiativeshasshiftedfromenterprise systems to consumer products – notably around the definitions of responsiveness and usability.

At the same time, the five postdigital forces are changing theverynatureofIT.Mobilehasdestroyedconstraintsbasedonphysicallocation.Usersnowexpectthatthe power of the enterprise should be available at the point where decisions are made and where business is transacted – no matter where that is. Social is flattening internal hierarchies, rewriting the possibilities of global collaboration inside and outside of organisational boundaries, and allowing engagement with consumers as individuals – customer segments of one.

Analyticsisunlockinginsightsfromdatato supporthumandecisionmaking–frombigdataandtransactionaldatatowhat’sin-between–using advanced statistical models and visualisation techniquestofueldescriptive,predictive, andprescriptivedecisionandaction.Cloudhaschanged the economics and cadence of technology investments. On the subscriber side, a growing collection of services is available for subscription – withanacquisitionmodelthatiselasticinbothcostand capacity. On the provider side, cloud presents opportunities to monetise information and services in new ways – new or adjacent business models for many sectors, not just high tech, media, and entertainment. Cybersecurityandprivacyarepartofaconstantconversation – guiding innovation in emerging spaces in advance of regulatory concerns, while also dealing with relentless and growing threats.

AmaturePostdigitalEnterpriseTM leverages innovation and drives change. A recent research report identified that 39% of the companies studied exhibited excellence in multiple postdigital domains. On average, theseorganisationsare26%moreprofitablethantheir industry competitors. They generated 9% more revenue through their employees and physical assets, andtheyexhibited12%highermarketvaluationratios3.

Inresponsetothistypeofadvantage,Gartnerpredictsthat by 2015 about 25% of companies will create a ChiefDigitalOfficer(CDO)role,leadingdigitalsourcesofrevenueaswellasdigitalmarketplaceproductsand services4.Thisevolutionacknowledgesthatmanyparts of the business can reap benefits from postdigital convergence. This postdigital environment creates both the opportunity for innovation and the existential threat of disruption – especially now as many businessesareinherentlydigital.What’satstake may very well be the future of the business. Tomorrow’sleadingCIOsarelikelytobethosewhorisetothechallenge,perhapsreframedastheCDO,forging new identities as a postdigital catalyst – anagenttoprovokeorspeedthemovetothePostdigitalera.

Page 9: Deloitte Tech trends 2013 report - Feb 2013

8

History repeating itself? TheevolvingnatureofITandtheroleoftheCIOhavebeenthesubjectofmuchdebateoverthepastseveraldecades – and a consistent feature of our Technology Trends research. The message has focused on the dual challengeofindustrialisingcoredeliveryandoperations,whileelevatingthepositionofITtohelpinformtheinnovation agenda. But practical realities have changed in 2013 – creating not only a sense of urgency, but an opportunity to redefine the role.

CIOasthePostdigitalCatalyst

What were the challenges? What’s different in 2013?

CIOs as revolutionaries5 • WarningsofthedeclininginfluenceoftheCIOhadnotyetbecomebudgetrealities,often with the majority of technology spend remainingwithintheITdepartment.

• Institutionalbaggagehashadanimpact,whereIThasbeensaddledwithproductionoutages or perceived budget and timeline overrunsfordiscretionaryprojects.IthasbeendifficultforsomeCIOstoplayanexpanded leadership role as they have had to focus on disciplined execution of their baseline mission.

• Technology innovations have often not been well understood within the business–leadingtolackofenthusiasmfor exploring new concepts. Without businesssponsorship,manyCIOswhohaveattempted to play revolutionary roles have done so in isolation – trying to anticipate what the business will need, and building what they perceive to be innovative solutions in a vacuum.

• RigidprocurementprocessesandlimitedtechnologyskillsoutsideoftheITshopprovidedsomeincentivetoincludeITinforward-lookingprojects;evenifCIOsweren’t revolutionary in defining the vision, they were often pulled into the effort.

• Analystspredictthat,by2017,theaverageChiefMarketingOfficer(CMO)willspendmoreonITthantheaverageCIO6.TheCIOmaynolonger just be fighting for recognition, but also for relevance.

• RenewedfocusonrunningthebusinessofIT7, creating foundational services for efficiency and transparencyoftheITfunction,andcreatingdeliberate disciplines to drive innovation8.

• Advances in consumer technology and high rates of adoption have created more technologically savvy business counterparts. There is new incentive for the business to participateininnovativeITefforts.

• Cloudcomputingand“appstore”platformshave led to more experimentation within the linesofbusiness–withlow-code/no-codeconfigurationtoolsthatreduceskillbarriers. IThasthechancetoinsertitselfintoconversations by providing offerings around security, integration, and data correlation – hurdlesthatoftenlimithowfar“shadowIT”cantakepotentialsolutions.

Page 10: Deloitte Tech trends 2013 report - Feb 2013

92013 Technology Trends – Disruptors

CIOasthePostdigitalCatalyst

Technology implicationsCIOshaveenormousassetsundertheircontrol–fromapplicationstoinfrastructure(includingdevices,facilities,andoperations),fromsolutionsourcingtomanagingtheend-userexperience,fromplanninganddemandmanagement to project and financial management. They are also responsible for a large amount of human capital –includingfull-time,contractor,consultant,on-site,off-site,andoff-shoreresources.

Becoming a postdigital catalyst is not simply a change in philosophy or mindset. There are a number of tangible implications that should be addressed.

Topic Description

Budget / portfolio management

Manyorganisationshavearigidinvestmentprocess–requiringawell-definedbusinesscaseand reasonablyunderstoodrequirements,whicharethenevaluatedatafewpredefinedtimesduringthecalendaryear.Thisoftenworksfineforlargeticket,multi-yearinitiativeslikedatacentermodernisationoranERProllout.ButforCIOstobecometruepostdigitalcatalysts,theyshouldhaveamoreagile,responsiveplanningandprioritisationfunction.Project,portfolio,andITfinancemanagementdisciplinescanhelpwiththisjourney,addingdisciplineandvisibilityaroundthepipelineofasks,projectstatus, andresource/budget/releaseperformance.

IT delivery model flexibility

WaterfalldeliveryisanimportantpartofmanyITorganisations,butwhat’sgoodforlong-running,widelyscopedprojectscanbeanathemaforsmaller,dynamicefforts.CreateaSWATteamwith diverseskillsets,includingsomethatmaybeforeigntoyourITdepartment.Thinkgraphicdesigners,user experience engineers, or even anthropologists and cognitive psychologists, in addition to business leads, technology engineers, QA resources, and project managers capable of cultivating your own flavour of Agile. Business owners respond to show, not tell, in the postdigital world. Cultivateideas,developworkingprototypeswithcoreconcepts,andgrowyourthinkingabout whatiswantedandneededthroughhands-onexperimentation.

Information disciplines

Data management, stewardship, correlation, cleansing, analytics, and visualisation can be critical disciplinesinthePostdigitalera.The“informationalisation”oftheenterpriseshouldbeattheforeof theCIO’sagenda–turningdataintodecisions,shiftingreportsintometricsthatmatter,movingfromstove-pipedprocessestoservice-basedcapabilities,andarticulatingIT’smissionandrelatedservicesinterms that the business can understand, anchored in business impact.

Integration Integrationandorchestrationwilllikelybecomethebuildingblocksoftomorrow’sITorganisation. Adynamicmiddletierisimportantformanagingend-to-endinteractionsbetweenlegacyon-premisepackages,rapidlydevelopedemergingtechnologies,andcloudsolutions.Flexibilityintermsofservicequality,transactionmanagement,thedegreeofroutingdeterminism,businessrules,andpolicymanagementwilllikelybecritical.

Vendor management

Technology footprints are trending toward more heterogeneity. Managing contracts, licenses, subscriptions, service levels, updates, patches, and release schedules should be a priority. Morestrategically,pursuingjointventuresorvalue-basedarrangementswithamixofestablished playersandstart-upscanhelpfuelinnovationandhedgeagainstdisruption.

Architecture Architecture and design9arethecorecurrencyofthePostdigitalEnterpriseTM. While solution architectsconversantwithbusinessprocessesandobjectiveswilllikelybecomethemostsought aftertalent,enterprisearchitectureupanddownthestackshouldbetreatedasaseriousdiscipline with codified assets.

Enabling skills, methods, and tools

Eachpostdigitalforcerequiresasetofskills,methods,andtoolsthatmayormaynotbematureintheorganisation–oreveninthemarket.Whataretherightmobileappdevelopmenttoolsforyourneeds?As“bringyourowndevice”(BYOD)evolvesto“bringyourownapp”(BYOA),whataretherightmobileappmanagement(MAM)andmobiledevicemanagement(MDM)approaches?Doyouhavethedatascience experience for valid taxonomy and pattern discovery that can allow actionable insight from the rising flood of unstructured data? Do you understand the people, process, and technology implications ofanincreasinglysocialbusinessenvironment?WhatistherightblendofITservicescatalogandbusinessservicescataloginthehybrid-cloudenvironment?Whataretherightmethodsfordigitalassetmanagement and cyber intelligent innovation with the intersection – even collision – of analytics, social, andmobileintheborderlesscloud?Thesequestionsshouldbeaddressedasthevendorspaceevolveswithbreathtakingspeed.ThiscallsforanexperimentalITapproach,usingprototypesandmultipleinitiatives to find the most appropriate choices in an iterative manner.

Page 11: Deloitte Tech trends 2013 report - Feb 2013

10

Lessons from the frontlinesSuper-sized innovationRedRobinGourmetBurgersneededtoboostslumping revenues, connect more efficiently with customers, and revitalise its restaurant business. CIOChrisLapinghadalreadybuiltareputationasaproblemsolver,usingITresourcestomanagecomplex projects such as improving the company’s distributorsupplychain.SowhentheCEO, StephenCarley,waslookingforhelptomanageorganisationalchange,LapingwasnamedSVPofBusinessTransformation.IT’strackrecordinmeetingtough challenges became a catalyst for driving change in other parts of the company.

Toimprovecustomerexperience,Lapingworkedwithmarketingtoleveragethepowerofanalytics.Together, they created the company’s loyalty program. The program allows the organisation to analyse customer activity – leading to improved insights,tailoredmarketingcommunications, and an improved dining experience.

TheCIOalsosponsoreddeploymentofmobiledevicemanagement(MDM)softwareaspartofacustomerservice change initiative, allowing the company to upload applications on tablets shipped to restaurants alloverthecountry.Employeesnowusetabletstomaintain waiting lists and to page customers via their mobile phones when their tables are ready. They also use the tablets to connect customers to their loyalty program.10

Laping’svisionforbusinesstransformationextendedbeyondcustomermanagementtoincludeworkforcedevelopment. To modernise employee training, anewself-paced,interactiveprogramwasrolled out via mobile channels. The company also uses internalsocialnetworkingtocrowdsourcefeedbackfrom managers and employees across the company. Inoneearlyachievement,thetimerequiredto roll-outanewmenuwasreducedfroma year-and-a-halftoonemonth11.

TheCEOrecognisestheroleofITasamajordriverof innovation for the company, and the efforts of the CIOhavetranslatedintoincreasedmarketshareforthecompany.Profitsandstockpricehaveincreased,and the company is seeing more repeat customers.

A winning hand12

Intheelusivequestforinnovationdeepinresearchlabsoflargecorporations,CIOstodayhavebeendealtgame-changingcards.ITmayhavebeentraditionallyknownforbeingrisk-averse,buttheunfoldingofbreakthroughbusinessturnaroundsledby technology has turned the heads of executives andhasthemlookingtotheCIOforthenextmove. One area of opportunity is developing in the automotive and transportation industry. With the ability to capture and process data from remote train andtracksensorsandweatherforecastsinreal-time,NorfolkSouthernRailwayhasbeenenhancing itsdispatcherdecision-makingcapabilities.Notonly is it a cloud play, it’s also a big data and analytics one, too.

Usingdatatoautomatebasicdispatcherdecisions,dispatchers and train engineers can spend more time on managing exceptions, moving freight in a timely manner and providing improved service for the company’s rail customers. Behind the cards is DeborahButler,NorfolkSouthern’sCIO.Whenfullydeployed, the systems are expected to reduce fuelconsumptionby6%ormore,translatingtoannualoperatingcostsavingsof$80-$100million. Capitalinvestmentsavings,intheformofreducedassetrequirements,couldsaveanother $200-$400million.

CIOasthePostdigitalCatalyst

Page 12: Deloitte Tech trends 2013 report - Feb 2013

112013 Technology Trends – Disruptors

CIOasthePostdigitalCatalyst

Turning trash into treasureToPuneetBhasin,WasteManagementisnotjustagarbage company. With more than 22 million customers and20,000trucksdrivingtwomillionmileseachday,he describes Waste Management as a logistics and energycompany.Bhasin,thecompany’sCIOandSVPofTechnology,Logistics,andCustomerService,isworkingclosely with other executives to put technology at the centeroftheWasteManagementnetwork.13

When he joined Waste Management, Bhasin’s goal was to figure out how the company could leverage emerging technologies. He developed a Decisions Sciences group, now a subsidiary called Waste Management Logistics,togaininsightonoperationsbyusingthemassivequantitiesofdatathecompanyalreadyhad.HeworkedcloselywiththeCEOandCFOtoestablishthe group, and soon the team was providing data analytics, research, and industrial engineering services. The new capabilities now provide the basis for many new initiatives at the company such as the rollout of custommobiledevicesandsensorstotruckstotrackinformation such as load weights, routes, and time spent atstops.Thisallowsthecompanytomakeroutesmoreefficient,reassignworkiftrucksbecomefull,andreportinformationbacktocustomerstohelpthemchangetheir trash and recycling habits.

Analytics also forms the basis for a pricing application similar to those used in the airline and hotel industries. Waste Management provides more than 100,000 service quotesamonth,specifictoeachcustomer14. Bhasin determined that salespeople were spending less than half of their time on selling and the rest on administrative taskssuchasdeterminingpricingplans.HisDecisionSciences group built a predictive analytics model which uses factors such as location, type of waste, weight, local regulations, and competing services to generate pricequotes.Theapplicationalsopredictswhethercustomers with expiring contracts might accept a price increase.

PuneetBhasinhastakenhispositionasCIObeyondan enabling role to that of a strategic leader, and his visionhasputITatthecoreofrevenue-generatingprojects. The pricing application, for example, increased revenue by $218 million in 201015. As Waste Management changes its business, postdigital forces will continue to provide the basis for turning trash into treasure.

Page 13: Deloitte Tech trends 2013 report - Feb 2013

12

Doug AlbrechtDirectorofInformationManagementPortofLongBeach

My take

CIOasthePostdigitalCatalyst

AtthePortofLongBeach,wehelpmovethenation’sgoods. My job is to figure out how technology can support this mission effectively in today’s postdigital environment. All of the postdigital forces – mobile, analytics,cloud,social,andcyber–areatworkatthePortofLongBeach.Onthemobilefront,smartphoneand tablet apps are still emerging for us, but our “mobile first” direction will eventually allow everyone – from executives in Asia to engineers on the job site – toaccessthePort’ssystemswheneverandwherever.That said, we are pros with mobile sensors and machine-to-machine.WealreadyhavemanysensortechnologiesrunningatthePort:seismologicsensorsalertusofearthquakesandpotentialinfrastructuredamage,RFIDtagscontroltruckaccesstoourterminals,sewer and storm water control sensors measure performance and environmental impact and monitor security.

Sensor data enters directly into our systems and moves all the way up to the analytics for operational dashboards.Forexample,wereceiveshipmovementdatathattracksentrytoandexitfromtheharbor, allintegratedwithourbillingsystem.TheGreenFlagProgramautomaticallyappliesincentivediscountsto ships that manage their speed nearing the port, smoothing traffic and mitigating environmental impact. AGreenFlagdashboardshowsmonthlyandyearlyperformanceofallcarrierscallingthePortof LongBeach.

We use a private cloud to get the benefits of business continuity, resilience, and ease of maintenance – even though it creates challenges of complexity and the needfordifferentskillsets.Hardwareisacommodityandeventuallywewillmovetoapubliccloud.IwouldrathermyteamworryaboutPortbusinessthanmemoryneeded in a new server.

Intermsofsocialmedia,we’vejustbeguntouseitforexternalmarketing.Butinternally,asophisticatedproject management system connects people and information creating a central source of information forlargecapitalprojects,likethe$1.2billionmiddleharbour project. We also recently implemented unified communications to facilitate collaboration between our employees. The next step will be to tie it all to mobile.

Cybersecurityisanimperative.WearepartoftheU.S.CoastGuard’scybercommandcenterandparticipateinTSA’sCyberWorkingGroupforthetransportation sector. We’ve implemented a hardened outershellanddeployedmultiplein-depthtoolsandtechniques.Wealsoemphasisethe“humanfirewall”by training our employees to understand that no matter how many protections we have, if someone asksforyourpasswordandyougiveittothem, it’s all out the window.

IhavethreepiecesofadviceforCIOs.First,knowwhatteamyou’reon.I’vecometorealisethatmyteamatthePortincludesbothITandtheDirectorsrunning other parts of the business. To do my job, Ishouldunderstandwhatthey’redoing, and communicate with them clearly. We invite PortDirectorstoourITstaffmeetingstogettoknowthem and learn how to better support their needs, and build a foundation of trust. Second, develop your people. Teach them leadership, communications, andhowthebusinessworks.Third,trustyourstaff todotheworkthey’resupposedtodo.Thatwillopen up time for you to get out and see what else isgoingon.Beingwell-readisimportant,butnotsufficient.It’sessentialtomeetandinteractwithotherITexecutives–tobringbackideasthatwillcontinuetomakepostdigitalforcesmorevaluable to your business.

Page 14: Deloitte Tech trends 2013 report - Feb 2013

132013 Technology Trends – Disruptors

CIOasthePostdigitalCatalyst

Flying car futureSomepredicttheslowdemiseoftheCIO16–asifITwill become a utility, managed as a distributed function across the business. We predict the opposite. CIOswilllikelynotonlybecomeomnipresentonexecutive committees, but also become consigliore to CEOsastheynavigateanincreasinglydigitalbusinessenvironment.

Businessinthefuturewilllikelybeconductedasacombination of discrete services – command and control giving way to service levels and outcomes. Inthismodel,outside-inarchitecture17 becomes the norm, mandating a platform mentality when building newcapabilities.Integrationandorchestrationofservices are more than technical challenges – they may becomethebasisformarketofferings.Socialgraphstrump organisational structures, computing becomes pervasiveandubiquitous,event-drivenreplaces process-driventhinking,andexperiencesmaybevaluedmore than fixed processes and predefined standards.

TheCIOofthefuturemaylookalotlikeaventurecapitalist–maintainingprinciplesforwhatmakesasolid investment, defining the boundaries upon which deals will be conducted, and driving funding, staffing, andstrategicsupportbasedonoften-changingneedsand the emerging value of individual initiatives. Though innovation investments may dominate the portfolio, there will still be a need for care and feeding of the existing operating environment.

Postdigitalcatalystsarenotlikelytocommoditiseoperations and maintenance, but rather use it as a feedbacklooptoguideconsistentimprovement and more disruptive efforts. How people interact, how business is conducted, and even how the lights arekeptoncanprovideinsight.

Finally,completingtheshifttopostdigitalmirrorsthe shift from a product to an information economy. MuchliketheCFOmanagesthecapitalpositionoftheorganisationandtheChiefHumanResourceOfficermanagestalent,theCIOwilllikelyberesponsible for information assets in many forms. This is especially important with the merging of the physical and the digital world, and with the shift toopenarbitrageofbusinessITservices.CIOshavehad the important elements to the future in their verytitle.TheCIOoftheFlyingCarFuturewilllikelyserve as the evangelist, translator, and arbiter of information – not only an important corporate asset, but also the currency upon which dynamic new offerings can be constructed.

Page 15: Deloitte Tech trends 2013 report - Feb 2013

14

CIOasthePostdigitalCatalyst

Where do you start? CIOsshouldbeginwithaself-assessmentoftheirrelationshipswithfellowC-suiteofficers.HowistheITdepartmentperceived?DoestheheadofsalesortheCFOhaveanopiniononthevaluethatITiscreatingfortheorganisation?Whatdotheyknowabout the emerging postdigital forces of mobile, social, cloud, analytics, and cyber? What are they doing about them? And, very importantly, how are theyengagingwithITtopursuepotentialbenefits?

• Seedinnovation.Createapocketwithinyourorganisation that has goals involving research and development(R&D).Thiscanbeheavier“D”, but it is important to explore the five postdigital forces and identify specific ways they can be appliedtoimproveyourbusiness.Askvendors and other business partners to fuel the ideation – not with abstract rhetoric, but with real examples withtangibleoutcomes.Findusecasesthatmakethe concepts real, regardless of industry or sector alignment.Innovationisjustasmuchabouttheimport/exportflowofideasthanthe“eureka”moments. Nurture the discovery of these potential catalytic possibilities.

• Haveessentialconversations. Sit down and talkwitheachfunctionalhead.Understandtheirpriorities,solicitfeedbackonyourorganisation,and start a dialogue about the potential of the postdigitalforcesbasedonreal-worldstoriesyou’veuncovered.Findoutifthey’vestarteddabbling in any of the areas – even at the conceptuallevel.Acknowledgetheneedforadifferent operating and delivery model in these new spaces.

• Retool.FewITorganisationsareequippedtotransitiontothePostdigitalera.Increaseddepthinbothbusinessandtechnicalskillswilllikelyberequired,withadifferentmentalityaboutwhatispossible,andwhatnewtechniquesareneededtodeliveronthepossibilities.Focusonbusinessandtechnical architecture, creating expectations for both specialisation and a broader understanding across solution touch points and the entire delivery lifecycle. Thisnewworldwilllikelyrequirethecloseteamingofpeoplewithawiderangeofskills,sogrowyourpostdigital innovation team with that expectation in mind.Useittoguidehiring,facilitiesbuild-out (thephysicalspacethey’llbeworkinginmatters), and methodologies for planning and delivery.

• Prototype.Committoexpeditingconcept

development using your modified approach. Ground projects in business objectives and simplemetrics.Fightforasingle,empowered business owner who can guide both the big picture direction and the tactical decisions of the project. Createacadenceofreleasablecodeeveryfewweeks–evenifmanyoftheincrementalsprintswilllikelyneverbewidelydistributed.Pilotassoonaspossible,usinguserfeedbacktoguidethefuturedirectionof the solution. Adopt the mantra of plan big, start small,failfast,andscaleappropriately.Rinseandrepeat – adding additional domain areas across lines of business, and building towards more ambitious improvement initiatives.

Page 16: Deloitte Tech trends 2013 report - Feb 2013

152013 Technology Trends – Disruptors

Bottom line

The traditional Australian IT department is under siege from technology spend moving beyond their sphere

of direct control, but the collision of the five postdigital forces creates an opportunity for the CIO to shape

business performance and future competitive stance by being the postdigital visionary and acting as a guide

through the digital disruption maze.

Deloitte’s 2012 report into digital disruption in Australia (Digital Disruption - Short Fuse, big Bang?)

showed the scale of the opportunity and threat. Leveraging these opportunities can start with ERP.

Combine analytics, mobile, and social for new triple-threat potential. Cloud allows marginal investment

experiments with substantial business value. Cyber is important for risk-intelligent innovation. Pressures

to deliver value persist. IT departments that aren’t seen as reliable, efficient,

and effective will likely be relegated to utility status.

The CIO can lead the move to tomorrow, reshaping business as usual, and driving innovation. When CIOs

catalyse the convergence of the postdigital forces, they can change the conversation from systems to

capabilities and from technical issues to business impact. Plan big, start small, fail fast, scale appropriately.

Robert Hillard, National Leader, Technology

Dean Kingsley, National Lead Partner, Technology Risk

CIOasthePostdigitalCatalyst

AuthorsSuketu GandhiPrincipal,DeloitteConsultingLLP sugandhi@deloitte.comWithover19yearsofexperienceintheITarenafocusingon“consumer-drivenbusinesses,”SuketuleadstheITStrategy&ManagementservicelineintheGlobalTechnologyAdvisorypracticeandthePostdigitalEnterprise™marketoffering,focusedonprovokingandharvestingthedisruptionofthefivepostdigitalforces.

Bill BriggsDirector,DeloitteConsultingLLP wbriggs@deloitte.comBillBriggsispassionateaboutdisruptivedigitaltechnologies.InhisrolesasGloballeadofDeloitteDigitalanddeputyChiefTechnologyOfficerofDeloitteConsultingLLP,Billcombinesdeeptechnologyimplementationexperiencewithafarsightedview of the evolving technology landscape.

Endnotes1 Source:DeloitteConsultingLLPproprietaryresearchconductedbytheDeloitteGlobalBenchmarkingCenter,2012.2 Gartner,Inc.,“CFOs’DemandforIT:2012GartnerFEIStudy,”JohnE.VanDecker,October19,2012.3 George Westerman, Didier Bonnet, and Andrew McAfee, The Advantages of Digital Maturity,http://sloanreview.mit.edu/feature/the-advantages-of-digital-maturity/(November2012).

4 “GartnerSaysEveryBudgetisBecominganITBudget,”Gartner,Inc.pressrelease,October22,2012,ontheGartner,Inc.website,http://www.gartner.com/it/page.jsp?id=2208015,accessedDecember7,2012.

5 AdditionalinformationisavailableinDeloitteConsultingLLP(2011),“TechTrends2011:ThenaturalconvergenceofbusinessandIT”,http://www.deloitte.com/us/2011techtrends,Chapter4.

6 Todd Wasserman, Why Are B2B Social Media Firms So Hot?,http://mashable.com/2012/06/20/why-enterprise-social-media-firms-are-being-gobbled-up/(June2012).

7 AdditionalinformationisavailableinDeloitteConsultingLLP(2013),“TechTrends2013:Elementsofpostdigital”,www.deloitte.com/us/techtrends2013,Chapter10.

8 AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter9.

9 AdditionalinformationisavailableinDeloitteConsultingLLP(2013),“TechTrends2013:Elementsofpostdigital”,www.deloitte.com/us/techtrends2013,Chapter5.

10DavidF.Carr,Red Robin CIO Named Social Business Technology Leader,http://www.informationweek.com/thebrainyard/news/240012564/red-robin-cio-named-social-business-technology-leader(October31,2012).

11DavidF.Carr,Red Robin CIO Named Social Business Technology Leader,http://www.informationweek.com/thebrainyard/news/240012564/red-robin-cio-named-social-business-technology-leader(October31,2012).

12King,R.GE CEO Jeff Immelt Says Analytics ‘Next Holy Grail’.RetrievedDecember29,2012,fromhttp://blogs.wsj.com/cio/2012/11/29/ge-ceo-jeff-immelt-says-analytics-next-holy-grail/

13PeterHigh,CIO-plus Series: Interview with Puneet Bhasin of Waste Management,http://www.forbes.com/sites/peterhigh/2012/11/26/cio-plus-series-interview-with-puneet-bhasin-of-waste-management/(November26,2012).

14ChrisMurphy,Waste Management Software Helps Find The Right Price,http://www.informationweek.com/global-cio/interviews/waste-management-software-helps-find-the/231600963(September14,2011).

15 Kim Nash, New Mission for CIOs: the Art and Science of Pricing,http://www.cio.com/article/697992/New_Mission_for_CIOs_the_Art_and_Science_of_Pricing_?page=1&taxonomyId=3151(January10,2012).

16PeterKretzman,IT Consumerization, the Cloud and the Alleged Death of the CIO,http://www.wired.com/insights/2012/03/death-of-the-cio/ (March2012).

17AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter10.

Page 17: Deloitte Tech trends 2013 report - Feb 2013

16

Mobile Only (and beyond)2

Apps are just the beginningA bevy of statistics triumphantly proclaim the arrival of themobileera–fromInternettrafficstatisticstodevicesales to even broad measures of how people spend their time:•In2012,bothApple1andGooglePlay2 surpassed 25

billion app downloads•AsofSeptember2012,Squareisprocessing

$8 billion on an annualised basis, up from $1 billion a year ago3, and 35 million Americans havecompletedpurchasesusingSquare4

•AsurveyofWeb-enabledphoneownersfoundthat80%oftheparticipantsmultitaskedontheirmobiledevicewhilewatchingTV5

•AsofDecember2012,13%ofallInternet traffic originated from mobile devices6

•Inthesecondquarterfor2013,thetotalglobalinstall base of smartphones and tablets is predicted toexceedthoseofPCs7

The explosion of smartphone and tablet adoption in the consumer world cannot be denied. Andenterpriseshavetakennote.Mobileinitiativeshave popped up in almost every corner of the business –lookingtountethertheworkforce, engage customers more effectively, and reshape business-as-usual.CIOsarescramblingtodeal with the outcry. To manage, maintain, connect, and protect devices. To imagine, build, deploy, and promote applications. And all the while, many are singing the gospel of “an app for that,” trying to close the gap between end-userexpectationsandcurrentofferings.

Againstthisbackdrop,“mobilefirst”becamearallyingcry in 2012, calling for each project, solution, or investment to strongly consider a mobile component. That’s where many companies stand today: wrestling with how to use mobile – specifically smartphones and tablets – to veneer existing operations and processes.

Unfortunately,it’sbeenslowgoing.Ourresearch shows that across the Fortune 100,only62%ofcompanieshavesomekindofpubliclyavailableapp. Evenfewer,52%,havemobile-orientedwebsites(thatis, amobile-specificsitewithadedicatedURL,suchas m.url.comorurl.com/mobile).8

But things are changing, with the mobile ecosystem moving at lightning speed. Smart phones and tablets aren’t the only – or sometimes even the preferred – targets. Advances in embedded sensors and actuators aredrivingpowerfulmachine-to-machine(M2M) usecases.Patternrecognitionandcontextualanalysis,ambient access and connectivity, and mass adoption of natural user interfaces – voice, gesture, and beyond – are creating new modes for user engagement. The opportunity goes well beyond using mobile apps to dowhatyou’vealwaysdonedifferently.It’saboutdoingfundamentally different things.

We’re entering an era of “mobile only,” with outcomes that would be impossible without today’s mix of persistent connectivity, artisanal solutions that blend creativityandUXandnext-generationengineeringwithdevices.Uber,Square,andProjectGlasswouldnotexistwithoutmobile.NeitherwouldWholeFoods’robotic shopping carts – which double as concierges andpersonal,in-aislecheckoutmachines.AsthecostofBluetoothchipsetsandWiFicontinuetodrop,suddenlyit seems everything has the potential for intelligence – eitherasastand-alonedeviceorbytetheringtoaphone,tablet,orPC.

Inthepost-PCera,mobilecan’tbejustahobby. It’snotnoteworthythatyourenterprisehasgreatmobileapps;it’snoteworthyifyoudon’t.Asyoumovepastexperimentation,makesureyouavoidgettingstuckonmobilefirst.Focusinsteadontheprospectofreinvention,based on the new realities of Mobile Only – and beyond.

Page 18: Deloitte Tech trends 2013 report - Feb 2013

172013 Technology Trends – Disruptors

MobileOnly(andbeyond)

History repeating itself? We’re still in the early days of the mobile era. Deloitte research shows that leading mobile operating systems are less than five years old, and enterprise adoption has only just begun9.ITprofessionalsarebarragedwithhypefromvendorsandtalkingheadseagertoannouncethearrivalofanewage.Cominginthewakeofincessantcloudrumblings,discerningCIOsarewaryofgettingtoofaraheadofmobile’sintendedpromise.

What were the challenges? What’s different in 2013?

“Web era” hype • “E”everythingbecametherule,asvendorssaturatedthemarketwithretooledsolutionstotakeadvantageoftheWeb.Marketingover-soldproducts with marginal business value and unsophisticated technical architectures.

• Webwasapproachedasitsown,independentdomain – organisationally, technically, and operationally. As adoption hit maturity, the distinction became meaningless. eCommercewassimplyanotherchannelandbusiness was inseparable from eBusiness. Organisations were left trying to integrate webdivisionsbackintothefold.

• Theswitchfromthickclientstowebpresencewas an important shift, but it still largely focusedondesktopsandlaptopswithbroadband connectivity. The result was only a modest effect on the nature of technology services, or the types of problems that could be addressed.

• Whilealandgrabisunderwayacrossmobile,therehasbeenaremarkableamount of standardisation on platformsandservices.FromOStomicro-bloggingtosocialsharingtolocation-basedrecommendationservices, a handful of dominant playershaveemergedineachmarket.And while the futures of individual vendors are far from certain, the services they provide and the use casesmadepossiblewilllikelycontinue to thrive – providing a foundation for innovating beyond today’s definition of mobile.

• Mobilewilllikelybecomeasolutionfabric,liketheWeb–presentinalmost every part of a business. And because mobile centers of excellence are introducing multi-disciplinary,Agile-based solution approaches, their usefulness willlikelyextendbeyondtheshelf-lifeof mobile’s novelty – and should be easily shifted to the next emerging technology.Companiesarelearningfromtheire-mistakes,thinkingaboutomni-channelsales,logistics,andmarketinginsteadofdomainsilos.

• Mobile’simpactonbusinesscanbeeven more radical than the Web’s – removing physical boundaries as to where business can occur and who can conduct it.

Asset intelligence / “Internet of Things”

• Sensorandembedded-chippricinghistoricallyhad not hit a tipping point allowing mass marketadoption.

• RFIDbacklashanduncertainlyaroundNFCadoption slowed corporate investment – exacerbated by competing protocols10 and visiblelackofsupport11 from industry leaders.

• Recentroll-outofnext-generationprintabletagsandlowcost/footprintcomponentsismakingwidespreadadoption feasible.

• Sector-specificinnovationisshort-circuiting adoption cycles. mHealth advances by conventional consumer goodscompanies(e.g.,Casio,Jawbone,Nike)andnewentrants(e.g.,AgaMatrix,FitBit,Vitality) are creating new standards – and encouraging a growing population of niche players that are innovating on top of their platforms.

Page 19: Deloitte Tech trends 2013 report - Feb 2013

18

MobileOnly(andbeyond)

Technology implicationsManyCIOsdon’tneedconvincingonmobile.Theyunderstandthatitspotentialisonlybeginningtobeunlocked, andthey’reexcitedaboutthechancetoplaycorporatePrometheus–bringingemergingtechnologiestothebusiness tosparkinnovation.

Butthey’realsodealingwiththecomplicationsofeventoday’smodestmobileadoption:bringyourowndevice(BYOD)pressuresfromlineemployeestotheboardroom.Draconianrestrictionsaroundsecurity,risk,andlegalbytheChiefInformationSecurityOfficer(CISO)andgeneralcounsel.Constituenciesthatarelongonappideas(somegood,somegreat,someawful).AndanITorganisationthatisill-equippedtodealwiththetsunami.Thankfully,thesamebuildingblocksneededforthetacticalresponsecanlikelybere-usedoncethebusinessembracesMobile Only – and beyond.

Topic Description

Security and privacy

Organisations need policies and tools: To authenticate users. To control devices, applications and data. To provide end-to-endencryptionwhileatrest,inflight,andinuse.Toruncontentfilteringandmalwareprotection.Toallowsecurity event monitoring, logging, and response. Security policies and profiles should be tied to specific users and plausiblescenarios,focusingremediesonlikelyincidents,nottheinfiniterangeofimaginablerisks.

Privacyisauniversalconcern–fromindustryregulations,tolegallyprotectedinformation,tosensitivityaboutinappropriatemonitoringofbehaviourandsocialinteractions.Industry-leadingpracticesshouldbemerged with organisational policies and governance to address today’s regulatory needs. Some very real technical design considerationsunfold,includinghowtopresent,cache,andstorepersonallyidentifiableinformation(PII)andtransactionaldatatocomplywiththePaymentCardIndustry(PCI)DataSecurityStandards,HIPAA(Health InsurancePortabilityandAccountabilityAct),andothers.

Mobile device management (MDM)

MDM is an important dimension of security and privacy, allowing organisations to manage and control devices – especially as the definition of “device” grows beyond phones, tablets, and laptops. MDM allows for policies, provisioningprofiles,apps,anddatatobeenforced,monitored,andprotected.Patches,software(OS/app)updates,andautomaticback-upscanbeexecutedovertheair.

MDM can also allow devices to be triaged, disabled, or wiped clean if compromised. Mobile OS providers are trying to build more detailed management tools into their platforms – but with a crowded vendor landscape therewilllikelybeconsolidationinthecomingyear.

Digital content management

Mobile is forcing renewed attention on digital content, asset, and rights management – and downstream activitiesofmonitoring,measuring,andanalytics.“Multi-channel”mandatesarematuringinto“omni-channel”strategies–requiringconsistencyandcompletenessacrosswhatevermeansofinteractionacustomerchooses.Contentisattheheartoftheexperience,andisincreasinglyinteractive,highresolution,anddynamicallyallocatedbased on customer and location context.

Mobile architecture

Native,responsiveWeb,andhybrid(Webviewswithinnativeappcontainers)applicationarchitectures currentlydominate.Butanewgenerationofcross-platformdevelopmenttoolshave“buildonce,deploymany”and“low/nocode”approaches.Manyorganisationswillneedtosupportacombinationofthesetechniques,withappropriate choices being driven by business objectives and usage scenarios. But remember, the underlying data and services layers are just as important. Mobile middleware is an extension to many existing integration solutions, improvingmessagedeliverybyparsing/bufferinglargedatapayloadsandallowingforoffline transaction processing.

Mobile QA Theend-userexperienceiskinginmobile,andmobileQAshouldreflectthatattitude.Abaselineofautomatedscriptingisencouraged–withcompilationandbuild-verificationaddressingcompatibilityissueswiththetargetdeviceportfolio.Thisportfolioislikelytoexpand.Edge-casetestingsimulatingconnectivityandusageparametersof the end user are also necessary – validating graceful feature degradation as signals lose strength, traumatic eventhandlingifdevicesaredropped,andinadvertentinteraction(e.g.,“pocketdialing”equivalentforapps).

Mobile center of excellence

Manyorganisationsareapproachingmobilewithanon-traditionaldeliverymodel–embracingAgilemethodologiesusingamulti-disciplinaryteamwithunconventionalskillssuchascreativedirectors,graphicdesigners,anduserexperienceengineers.Regardlessofconsumer-oremployee-facingscope,rapiddevelopmentwith a heavy emphasis on usability and design are needed – neither of which is a core discipline for many enterpriseITshops.Mobileand,morebroadly,digitalcentersofexcellence,arebecomingcommonplace, helpingtobridgethehistoricaldividebetweentheCMOandCIOorganisations.

Page 20: Deloitte Tech trends 2013 report - Feb 2013

192013 Technology Trends – Disruptors

MobileOnly(andbeyond)

Lessons from the frontlinesLeave your wallet at homeSquareisanelectronicpaymentcompanythatenablesamobile-onlypaymentexperience,wherethecustomercanmakeapaymentfromthe“wallet”apponhisorhersmartphone – and the vendor can process payments using the “register” app on a smartphone or tablet. Inaddition,whenbothcustomerandcashierareusingthe apps, the cashier can detect the customer through location-basedtechnologies.Inthatcase,allthe customer needs to do is say his or her name to complete the purchase. No more fumbling for change, digging throughcreditcards,orevenpickingupyoursmartphone.Makingapaymentcanbecomehands-free.

Businesses that didn’t accept credit cards before cannowtakeadvantageofthemillionsofcards thatAmericanscarry–vendorsatfleamarkets, mom-and-popshops,artists,farmers’markets, and more. And beyond the “cool factor” of paying withasmartphone,customerscanuseSquaretogive and receive gift cards and earn rewards points for theirpurchases.WithSquare,customerscantruly leave their wallets at home.

Collaborative Care12

TheNewMediaMedicineresearchgroupattheMITMediaLabhasbeenusingmobiletodisruptthehealthcareindustryandreinventthedoctor-patientrelationship.UsingCollaboRhythm,anopen-sourcetechnologyplatform the group created, patients with chronic diseases are empowered to become apprentices and active participants in their own health, and doctors and other healthprofessionalsareconvertedintoreal-timecoaches.

InteractionwithCollaboRhythmbeginswitha speech-andtouch-controlledinterfacethatenablesdoctorsandpatientstomakeshareddecisionsaboutcare.It’snotatele-presencesystem,butatele-collaborationsystem.CollaboRhythmprovidespatientdatatrackinginterfaces, data synchronisation services, communication tools,andvisualisationframeworks,andmakesiteasy to deploy applications to mobile phones, tablets, and computers. The goal is for patients to own their healthdataandtracktheirownprogresssotheycantakeappropriateaction–withdoctorsservingashealthcoachesinsteadofcommanders.UsingCollaboRhythm,many things that patients would see in their doctors’ offices is available at home – or when patients visit another doctor, or change jobs, or move across the world. And, patients can contribute their own data that doctors often do not see: data points and perceptions about social support, diet, alternative therapies, and how these factors influencetheirqualityoflife.Whatcouldthismean? Nomorelettingpatientsslipthroughthecracks.

The research group has already thought about howtotakeCollaboRhythmtothenextlevel.Inthenot-so-distantfuture,doctorscouldpushmedicationreminders to a patient’s bathroom mirror or television.Or,patientscouldtalkwithan“intelligentconversational agent” to prepare for a visit to the doctor. Doctors could even send patients visualisations of their health progress in fighting disease, in a way that’s both understandable and actionable for patients.  

The New Media Medicine group believes that patients ofthefuturewilllikelyknowmoreabouttheirhealththantheirdoctors.Andbymakingpatientsactiveandinformed contributors to their own care, patients can be healthier and in control. And, as patient wellness is likelytobecomeanimportantfactorintheprofitabilityofthehealthcaresystem,thisislikelytobesomethingthat life sciences companies, providers, and plans are incented to promote.

Hardware renaissance: thy name is mobileKickstarterisapopularcrowd-sourcedventure capital platform. Two of its milestone projects embodytheMobileOnlymindset.TikTokwasthefirst company to raise nearly $1 million13, selling watchbandstoholdApple’sNano6.Evenwitharelatively sparse set of features, the idea of a smart watch captured imaginations, selling 250,000 units through May 201214andsparkinganewnicheindustry.PebbleWatchisTikTok’sspiritual,ifnotliteral,successor,featuringane-inkdisplayandBluetooth 4.0 connectivity to smartphone devices. CallerID,incomingtextmessages,notifications,weather,andotherapp-specificcontentaredeliveredon the wrist. Buttons and touch screen prompts allow interaction with the devices: answering the phone, launching voice commands, etc. And with its own softwaredevelopmentkit(SDK)andappmarketplace,new features are being rolled out daily.

Finally,SmartThingsmovesbeyondwearablecomputing,lookingtoimbedintelligenceintomanythings in your life with an affordable range of sensors, actuators, and hubs. Not surprisingly, a smartphone appisincludedformanualcontrol.Possiblyitsmost intriguing feature is its rules engine and open SDK – allowing complex events to be modeled and executed based on chains of sensors and controllers. Forexample,locationtriggersonaphonecantriggera“leavinghome”event,causingdoorstolock,thermostat to be adjusted, lights to be turned off, and security devices to be initiated.

Page 21: Deloitte Tech trends 2013 report - Feb 2013

20

MobileOnly(andbeyond)

Onarecentfamilyvacation,mydaughtersandIrentedjetskis.AndInoticedsomething:ourentirerentalprocesswasmobile-enabled.Theoperatorscheduledourequipment,swipedmycreditcard,andevenissuedareceiptfromhismobilephone–andIlaterlearnedthathe uses his mobile phone to arrange for maintenance too. This is just one example that “mobile only” is a trend thatisheretostay.It’schangingthewayweoperateinboth our personal and professional lives.

AtDeloitte,wehaveafive-prongedapproachtotakeadvantageofthemobiletrend.Thefirstprongis hardware: you can’t be mobile without devices. Companiestakevariousapproaches,from“everyone willgetthesamedevice–andyou’regoingtolikeit” to“bringyourowndevicetowork,whateveritis, secure or unsecure.” We opted for an approach in the middle. Once a mobile device passes our security testing, we believe in offering it as a choice.

Thesecondprongisdevicemanagement.Inwhatwebelieve is in the best interest of our people and clients, we’vechosenatightly-managedapproach,butwithoutadopting a single, heavy mobile device management application.

The third prong is our software. How do we feel about tablet,PDA,andmultiplatformsoftware?Wedidsome experimenting to figure this out. There are many amazing apps out there, but at Deloitte, we have to tune to the business imperative. We have an enterprise app store, and we’re now globalising it to unify our software experience.

The fourth prong in our approach is collaboration. We fundamentally believe that mobile is a critical enabler to improve collaboration with one another. We’ve started using a web conferencing solution that allows us to join web conferences from our tablets and smartphones in addition to our laptops. Mobile web conferencing helps us not miss a beat with our teams and clients even when we’re on the go.

Larry QuinlanGlobalChiefInformationOfficerDeloitteToucheTohmatsuLimited

My take

Andthelastprongishandlingtheunknownanswertothequestionof”what’snext?”Canweradicallyimproveabusinessprocess,likethejetskioperatorworkinginawaythathecouldn’tbefore?Willmobilehelpusdeployourpeople?Manageskillsets? Write proposals? Maybe it’s not revolutionary, but what if we could use mobile to manage office space? Monday through Thursday our offices are virtually empty,yetonFridayyoucan’tfindaseat.Whatifourbadgesactedasreal-timesensorstoimprovemanagement of our space, and ultimately saved tens of millions of dollars?

How do we measure our achievement? We’re in the people business, so improvements in productivity provide us with a competitive advantage – but the impact is hard to measure. However, consider this: today,ifyoulandafterasix-hourflightandhave 89 messages in your inbox, by the time you get throughCustoms,you’veclearedmostofthem.Before mobile, you’d have had to get to the hotel and fire up your laptop, and spent your night on those89emails.It’shardtoarguethatmobiledoesn’t improve productivity.

ManyCIOs,myselfincluded,liketobeincontrol. But with mobile, my advice is to not try to control itcompletely.Consideranexperimentalapproachtodevelopingapps–itwilllikelyteachyousomething.Listentoyourpeople,andgetanimprovedunderstanding of how they are using mobile. Buildprototypes,getfeedback,andthrowthemaway. This is hard to embrace, since nobody has ever said“let’simplementanERPsystem,seewhatitdoesfor us, and scrap it next year.” But mobile brings the need for a different approach.

Ultimately,successiswhentechnologysupportstheway we inherently do our jobs, so we need to figure outhowtotiemobilebacktoourfundamentalbusiness processes. When we can finally affect businessprocesseswithmobileinawaythatmakespeoplesay“Wow,Ineverthoughtofthat!”…we’vedone our job.

Page 22: Deloitte Tech trends 2013 report - Feb 2013

212013 Technology Trends – Disruptors

MobileOnly(andbeyond)

Flying car futureWe are already living on the cusp of mobile’s future. Mobile and mobility are converging in the form of self-drivingcars,nowlegalinthreeU.S.states15. Digital wallets are delivering on the holy grail of a singular digital identity crossing our personal and professional personas. Society is trending towards connectivity and some form of computing embedded in almost everything around us, which we’re interacting with in more and more natural ways. Fourforcesaretakingshape,definingthenew face of mobile:

•Convergence.Mobilewilllikelybecometheanchor of our digital identities, providing a centralised,connected,always-with-ushubfor services, information, entertainment, and convenience across our personal and professional lives.Impulsecomputingismovingfromluxurytothe very fabric of how we interact with the world around us. Mobile is already the new camera, watch,bookstore,radio,carkey,dictionary,textbook,addressbook,medicalhealthrecord,sales tool, cash register, daily planner, calculator, customer service agent, thermostat, and personal assistant. How long before it also becomes the new doctor, personal historian, retail store, personalmanufacturingline(3Dprintingandreplication),andofficialproofofidentity?Morecompelling than the individual use cases is how they’ll converge in a mobile footprint accessible across different devices, as our definition of device evolves from a discrete piece of electronic equipmenttoacollectionofparticipatingnodes.

•Ubiquity. Virtuallyeverythingandeveryoneweinteractwithwilllikelysoonhavethepotentialto be wired – containing embedded sensors and mobile technologies that allow new and advanced trackingofandinteractionwithphysicalthings.Portabilityoftheever-growinglistofconvergingserviceswilllikelybeexpected.Syncalmostanyactivity across almost any device. Begin reading the morning paper in your bathroom mirror and continuebylisteningtothetext-to-voiceversionfrom the dashboard of your car during trafficstops.Thenfinishthroughtheheads-up display from your glasses on the elevator ride to your office.

•Transparency. The user interface is evolving. We’vealreadymovedfrompoint-click-typeto touch-swipe,butwe’restillconsciouslyinterfacingwithadevice.Voice,gesture,andlocation-basedservicesarelikelytobecometheprimarymodusoperando–unlockingnewusecasesforcommerce,back-office,andpersonallives.Asimpleexample is a mobile boarding pass for an airline flight. Untilrecently,auserhadtotakeherphoneout,unlockthedevice,openhercalendar,findherflight,copy her confirmation code, find and launch the airline’sapp,choosecheck-in,pasteher confirmation detail, and then stay in the app to present the boarding pass at security and again uponboarding.Usinglocation-basedservicesandahostoftechnologiesforshort-rangecommunication,today’sdevicescanmaketheoperationauser-freeinteraction. When the user arrives at the airport within three hours of a flight on her calendar, the boarding pass is automatically displayed on her screen and transmitted to the TSA and gate agents without her havingtotakethedeviceoutofherpurse.

•Extendingreality.Augmented reality is moving out of games and military and scientific environments into the mainstream enterprise. What you can read, hear, or feel is delivered based on how you gesture, move,andtalk–sensitivetolocationandcontext,with information you need or want in a format that can adapt to the environment at hand. The defining developmentalworkofSixthSensefromPranav MistryandPattyMaesintheMITMediaLab’sFluidInterfacesGroupdemonstratesthatthisisnot science fiction – but rather business reality16.

Page 23: Deloitte Tech trends 2013 report - Feb 2013

22

MobileOnly(andbeyond)

Where do you start? Many companies find themselves off to the mobile races – with efforts launching across business units andacrossfunctionsaroundtheglobe.Prioritisationand focus remain critical, but just as important is aboldvisiontothinkbeyondveneeringtoday’sbusiness and processes. This puts even more pressure on the enterprise enablement front – how to secure, build, integrate, deploy, and manage a new set of devices, services, and assets that are necessarily dynamic.Eveninthischangingworld,thereare some foundational steps that many early achievements have followed.

• (Accelerated)digitalstrategy. Mobile is moving too fast for a prolonged academic exercise in strategicplanning.Makenomistake–strategyisimportant.Butitshouldhappenineightweeksinsteadofeightmonths.Itshouldbeginwithopportunity identification – helping the business discover ideas for reshaping customer, employee, product, and partner experience through mobile. And don’t forget about enablement – creating a roadmap for just enough foundational architecture, infrastructure, and management capabilities to be slightly ahead of the usage scenarios.

• Crossthestreams.Isyourorganisationfundingparallel efforts in content management, asset management,social,CRM,analytics,gamification,andmobile?Ifso,you’renotalone.Atbest,there’sredundantworkbeingdone.Atworst,connectionsare being missed, and competing priorities may be leading in drastically different directions. These efforts don’t necessarily have to be corralled under a single centralised team, though they increasingly are. But there are enough real dependencies and overlap that they can’t be handled in isolation, either.

• Lessonsfromkindergarten. Mobile is begging for show, not tell – especially as you start dabbling withadvancedfeatures.Evenyourmostcreativeend users are subconsciously anchored in how thingsworktoday.Youneedtobringconceptstolife – whether through illustrated user stories or wireframesorworkingprototypes.Createamobile‘A-team’withamixoftalentsthatincludecreative,UX,engineering,andsectorandfunctionalknowledge.Considerstartingbydecidingonatarget platform and have them come up to speed.

Letthemearntheirstripesonaparticularlyjuicyusecase with clear business value. Also, consider using them as the inner circle of your mobile center of excellence – guiding choices as mobile moves from an experiment to a core strategic discipline.

• EatTechCrunchforbreakfast.Inspirationislikelydue more to the importing and exporting of ideas thanto“eureka”momentsofradicalbreakthroughs.Who in your organisation is monitoring the start-upcommunityandtechnologyblogospherefor anecdotes that may seed your next big thing? Especiallyinmobile,usecasesareremarkablyportableacrossindustries.Considermakingteammembersaccountable for staying current on what others aredoing.Createsocialplatformsforthebroaderorganisationtoengagearoundthesepotentialsparks– with the added benefit that ideas and commentary willlikelynotdissipateintotheetherofisolatedinboxes, but instead will remain persistent assets whose value may not be unveiled for some time.

• Userdown,notsystemup. Meeting user expectationsstartswithresearchanddata-driveninquirytounderstandthetargetusers’needs,desires,androutines.Theseinsightsdrivetheearly-stagestrategy and feature ideation process. Because customers interact with companies through a variety touchpoints – from browsing a website to calling a customer service associate – it’s important to consider each interaction through the eyes of the customer.

Foranairline,thatmaymeangroundingfeaturesandfunctionality in the realities of the pilot and attendant experience,frompre-departureworkflowstoin-flightlimitations such as low lighting and turbulence. Foradistributor,itmaymeanweighingtheneedsofthebusinesswiththeon-the-groundneedsofdrivers.And for a railroad, it may mean opportunities to help conductors overcome the distractions of a moving train with customisable font sizes, expanded touch areas,andatask-focusedarchitecture.

Page 24: Deloitte Tech trends 2013 report - Feb 2013

232013 Technology Trends – Disruptors

MobileOnly(andbeyond)

Bottom lineMobile is more than just the latest fad in tech innovation. It is a fast-moving concept that is fundamentally reshaping operating models, business models, and marketplaces. Start-up and technology investment communities have embraced this notion – but large businesses and government entities have been slow to react. Organisations should move boldly to establish themselves as we move into an era of disruptive mobile innovation – and be prepared to make radical changes in response. Those who do not will be left behind.

Frank Farrall, National Leader, Deloitte Digital

AuthorsMike BrinkerPrincipal,DeloitteConsultingLLP [email protected],MikeBrinkerhasbeenhelpingclientsnavigatetheever-changingworldoftechnology.HisdeepinsightsandexperienceenableMiketounderstandthe particular needs of a client’s business, develop practical business solutions and bring change that can produce results.

Shehryar KhanPrincipal,DeloitteConsultingLLP [email protected] the mobile lead for the Deloitte Digital service line, Shehryar Khan focuses on helping clients use mobile to drive organisational transformation – identifying opportunities where mobile can truly impact both user and business goals.

Endnotes 1 “Apple’sAppStoreDownloadsTop25Billion,”AppleInc.pressrelease,March5,2012,ontheAppleInc.website,http://www.apple.com/pr/library/2012/03/05Apples-App-Store-Downloads-Top-25-Billion.html,accessedDecember6,2012.

2 Velazco,C.Google’s Play Store Hits 25 Billion App Downloads, Kicks Off Five Day Sale To Celebrate.RetrievedDecember6,2012,fromhttp://techcrunch.com/2012/09/26/google-play-store-25-billion-app-downloads/

3 Kim,R.Square goes big: raises $200m at $3.25b valuation.RetrievedDecember6,2012,fromhttp://gigaom.com/2012/09/17/square-goes-big-raises-200m-at-3-25b-valuation/

4 Tofel, K. Future of mobile: 5 takeaways from Mobilize 2012.RetrievedDecember6,2012,fromhttp://gigaom.com/mobile/future-of-mobile-5-takeaways-from-mobilize-2012/

5 JeremyLockhorn,Forget Mobile – Think Multiscreen,http://razorfishoutlook.razorfish.com/articles/forgetmobile.aspx#01,accessedDecember6,2012.

6 MaryMeeker,2012 Internet Trends,http://kpcb.com/insights/2012-internet-trends(May30,2012).Slideshare7 MaryMeeker,2012 Internet Trends,http://kpcb.com/insights/2012-internet-trends(May30,2012).Slideshare8 DeloitteConsultingLLPproprietaryresearch,September2012.9 DeloitteConsultingLLPproprietaryresearch,October2012.10CharlieFine,NatalieKlym,MilindTavshikar,andDirkTrossen,The Evolution of RFID Networks(Paper224),http://ebusiness.mit.edu/research/papers/224_Fine_Klym_Evolution_of_RFID_Networks.pdfhttp://ebusiness.mit.edu/research/papers/224_Fine_Klym_Evolution_of_RFID_Networks.pdf(May2006).

11Kim,R. iPhone 5’s NFC snub will keep technology out of mainstream.RetrievedDecember6,2012,fromhttp://gigaom.com/2012/09/12/iphone-5s-nfc-snub-will-keep-technology-out-of-mainstream/

12See:http://newmed.media.mit.edu/collaborhythm13See:http://www.kickstarter.com/projects/1104350651/tiktok-lunatik-multi-touch-watch-kits14LaurieSegall,$7 million Pebble watch shatters Kickstarter records,http://money.cnn.com/2012/05/02/technology/startups/pebble-kickstarter-watch/index.htm(May2012).

15ThomasClaburn,Google Autonomous Cars Get Green Light In California,http://www.informationweek.com/government/policy/google-autonomous-cars-get-green-light-i/240008033(September27,2012).

16See:http://www.pranavmistry.com/projects/sixthsense/

Page 25: Deloitte Tech trends 2013 report - Feb 2013

24

Social Reengineering by Design3

Shaking off the business constraints of 19th century platformsModern corporations owe their structure and operating models to the birth of the industrial age, where bureaucracy, hierarchy, and specialisation of labour were paramount for efficiencies and scale. Clearlydefinedrolesandresponsibilities, strictprocesses,anda“C3”(command,control, andcommunications)mentalityaretenetsofthemodel prescribed by Max Weber, adjusted by HenryFord,andrefinedbyMichaelHammer.

Many businesses have found success in the model. But current business practices constrain individual responsibility, accountability, and capability. Sometimes that’s due to real or perceived boundaries of a specific job. Often it’s because people are simply unable to navigate the organisation – find the right information, specialists, or decision makerstogrowideas,buildrelationshipswithpeoplewithsimilarinterests,oreffectivelyworktogetherin a multinational, matrix reporting environment.

Comparethatwiththeintendedgoalsofsocialbusiness1: to amplify individual passions, experience, and relationships for the benefit of the enterprise – invisible connections and characteristics within the physical manifestation of our organisations. Aligning the interests of the individual with the mission of the business and every other employee, whileharnessinguniversalqualitiesofindividualworth: content, authenticity, integrity, reputation, commitment, and reliability.

Therealpotentialofsocialbusinessinvolvesbreakingdown barriers that limit human potential and business performance.ButitrequiresfundamentallyrethinkinghowworkgetsdoneandhowvalueiscreatedinthePostdigitalera–socialreengineeringofthebusiness.

The strategies, practices, and technologies of social business are maturing. No longer viewed as a fad or a distraction, different parts of many organisations are already realising the potential.

Marketingandpublicrelationshaveestablishedlisteningpoststotrackconsumersentimentinthepublic social sphere. Sales and customer service are integrating customer contacts across channels and connectingwithR&D,manufacturing,andfulfillment.Customercommandcentersmovebeyondpassivemonitoring, using social channels to actively engage with personalised outreach, promotions, issue triage, andproductsupport.CIOshaveinitiativesunderwaytogive employees social tools for collaboration, finding andminingtheknowledgeoftheenterprise,andcreating new intellectual property assets with a more enlightened,user-centricapproachtoknowledgemanagement.

While this is progress, it is only the beginning of what’spossible.Manycompaniesarestuckon “what social media and social technologies should Ideploy,andhowcanIgetmypeopletousethem?”They’ve adopted the pattern of starting with a new social tool, bolting it onto existing processes, and hoping for a desired result. This approach may improve, but it does not transform.

Instead,reexamineyourprocessautomationdesigns(ERP)andyourinformationautomationdesigns(analytics)toseizethevalueaffordedbyatruly,transparently connected enterprise. Where in those designs are there assumptions of isolated specialisation? Of limiting linear transactional processes? Of limited flow of information and context for decision andaction?Ofsame-time,same-placerequirements for employee productivity and capability? Where are the processesandsystemsconstrainedbytraditionalC3–command, control, and communications? Where can you relieve organisational and process barriers to give customers, teams, and suppliers social collaboration, communication, and monitoring tools to help them perform? How can you empower people to transcend thelimitsofthepre-definedprocessestodotherightthing and maximise the value of each interaction? Realisingthepotentialofsocialreengineeringisn’t a“project.”It’sastrategy.Andit’snotserendipity. It’sintentional–bydesign.

Page 26: Deloitte Tech trends 2013 report - Feb 2013

252013 Technology Trends – Disruptors

SocialReengineeringbyDesign

History repeating itself? Social reengineering is predicated on social business – which is still often confused with similar sounding, partially relatedtermssuchassocialmedia,socialnetworking,andsocialcomputing.Butbeyondthat,theconceptofrewiringorganisationsbasedontechnologydrawscomparisonstotheERPrevolutionofthe1990s.ButthisismorethanBPR2.0,sowhatisdifferentaboutsocialreengineering?

What were the challenges? What’s different in 2013?

Social business / social network/social media

• Therehasbeenalackofclarityaround the definition of these concepts – which has caused misperceptions and less-than-impactfulearlyadoptionefforts.

• One-offinvestmentsinsocialhaveyieldedincrementaleffects.Layeringinsocialtoolsto existing rigid processes, or without empowering(andincenting)individualstotakeonmoreresponsibility,onlyaddsnewtools to conduct yesterday’s business. Gains can be seen by using social merely as a new channelforcommunication,knowledge,and content management – but its full potential is not realised.

• Thereisgrowingconsensusovertheseterms, allowing the focus to shift from debatetoputtingtheconceptstowork.

• Socialtechnologies are the tools that connect people, information, and assets across time and place. Not just about content, but more about context and community.

• Socialmedia are the places where people assembletodowork.Inthiscontext,theprimary implication is assembling and workingelectronically.

• Socialnetwork is the actual embodiment ofwhoknowswhatandwhoknowswhom – the collection of connections and interests expressed in a connected social graph.

• Socialbusiness is the concept of activating socialnetworksusingsocialtechnologyand media to create business value, across any number of functional or business processes.

Business Process Reengineering (BPR)

• BPRandtheensuingERPwavewereaboutefficiencies and scale – standardising and automating business processes, weaponising the industrial hierarchy. This remains valuable for parts of the organisation, especially finance and manufacturing.Ithadlittleconcernfor the individual employees, and even less for the customer.

• Rigidprocessesandstandardisedrolesand job functions made it hard to respond to changes – or to respond to individual customerrequests.Whatyouremployees– and, in some respect, your business – candohadbeenpre-determined.

• Assumptionsembeddedinbusinessculturesand limitations of previous technology approachesrequiredcommandandcontroldesigned into systems and platforms.

• Organizationalcomplexitieshavegrown,customers and employees are more empowered,andmarketconditionsaremoredynamicthanthepost-industrial BPRage.Profitabilityisnolongeronly a function of scale, but of motivation and sentiment.

• Muchofbusinesscontinuestooccuroutside of the boundaries of traditional tools and standard operating procedures, relyingonhumanengineering(e.g.,personalrelationships,liveconversations)toanswerquestions,sharenewideas, and do their jobs. Social reengineering lookstoprovideplatformsthatsupport the behaviour of the leading employees, while also removing unnatural constraints of existing standards and processes.

Page 27: Deloitte Tech trends 2013 report - Feb 2013

26

SocialReengineeringbyDesign

Technology implicationsThe underlying technology may be the beginning of the social reengineering journey. But providing platforms for sharing,discovering,connecting,andcultivatingindividualideasandknowledgeforthecommunalgoodisnota trivial endeavour. Open communities that span organisational boundaries should solve for legal, compliance, and intellectual property concerns, without extinguishing the enthusiasm of their participants. Specific technology implications include:

Topic Description

Social computing Socialtoolstoimprovehowemployeescodifytheirknowledge,sharetheirdeliverables,workjointlyonsharedtasks,andcommunicate–includingwikis,enterprisesocialmediaplatforms,ideamarkets,specialistfinders,anddigitalasset/contentmanagementsolutions.The technical implications remain very real: entitlement and privacy rights, archiving strategies, discoverability, version control, and more. But social versions of these tools de-emphasiseartifactsthemselves(taggeddocuments,explicitlistingofskills,tighthierarchiesofrepositories)infavourofthepowerofthenetworktoprovidecontextandcommunity–usingratingsor“likes”tocommunicatethequalityofassets,allowinginteractionstobesharedanddiscoveredsothatotherscanbenefitfromaquestionthat wasanswered,andcreatingdigitalexhaustofwhoknowswhat,whoknowswhom, andhowworksgetsdoneintheorganisation.

Social monitoring Acommonpartofmanysocialreengineeringeffortsisbuildingthecapabilitytolisten,track,andanalysebrand,product,andindividualcustomersentiment.ToolssuchasCollectiveIntellect,Netbase,andothershaverelativelylowtechnicalcomplexityforinitialconfiguration.However,greaterskillandexperienceisrequiredintuningthemodels,thresholds,andanalysis to yield more insightful, actionable results. The products are progressing in interpreting nuanced emotion and subtle, sarcastic, or idiomatic expressions, but there is still no substitute for experienced human interpretation to calibrate results and adjust models.

Digital content management / digital rights management

Communityandcontextarecritical,butcontentalsoplaysasignificantrole. Digitalmanagementofaccess,entitlements,andrightsrequiresdigitalassetmanagement,content governance, and stewardship, and tools to enable sharing, distribution, anddiscoverabilityofcontent.Regionalandindustrylawsandregulationsshouldbe considered – affecting where content can be created, stored, and accessed.

Social platforms and gamification2

Socialbusinessplatformsrequireintegrationofthefivepostdigitalforces–analytics,mobile,social,cloud,andcyber.Eachindividualforcecanbechallenging.Therefore,aroadmapofincremental advances may be the right approach. The need for authenticating individual personae, enforcing their personalised security and privacy profiles, and allowing traversal and transaction across their collection of interests and connections is a foundational needformanysocialbusinesses.Ifthevastmajorityofactivitiesareinternally-focused,traditionaldirectoryservicessuchasActiveDirectory,OpenDirectoryorOpenLDAPcanprovide authentication and entitlement services, and social collaboration tools can help manage relationships and sharing preferences. Social businesses extended beyond enterprise boundariesposeabiggerchallenge.SeveralvendorshavecreatedopenAPIstohelp– but many assume adoption of their own proprietary identity mechanisms. That is exacerbated with integration to mobile application tools and platforms.

Finally,whilegamificationisapowerfulapproachtobothenablingandtransformative social business platforms, the gamification solutions are immature and evolving. Inaddition,theyintroducetheirownpatternsandapproachestomobileandcyber.Adoption,integration,andorchestrationwilllikelybeamulti-yearjourney.

Page 28: Deloitte Tech trends 2013 report - Feb 2013

272013 Technology Trends – Disruptors

SocialReengineeringbyDesign

Lessons from the frontlinesBehind the (reengineered) curtainThemechanicsbehindhowcreditcardsworkareamysterytomanyconsumers,whorarelyknowhowmuch it costs them or the financial institution that issued it.Basedonthisalone,BarclaycardU.S.isbreaking from tradition by offering transparency for their new Ringcard.Butthey’renotjustallowingconsumerstolookunderthehood;theyarecrowdsourcingwhatfeatures to include, allowing consumers to create their own credit card experience.

TheRingisasimplifiedcreditcardwithfewfees orrewards.Instead,itallowsthecustomercommunityto decide how the card is managed. Through an internal socialplatformdesignedfortheRingcommunity,customers interact directly with the company. They can vote on changes to the card – everything from increasing fees to editing terms and conditions. Barclaycard releases theRing’sfinancialperformancesocustomerscanofferfurthersuggestionsorraisequestions.Customerscan also interact with each other using topical forums. Gamification principles reinforce specific behaviours, suchasintheGivebackprogram,whichdistributessomeoftheRing’sprofitstousersinproportiontotheirparticipation in the forums. Badges can be earned for using paperless statements and other actions3.

By listening to customer ideas, Barclaycard has been able to refine their product in a timelier manner than they could with traditional product development cycles. Inthefirstsixmonthsofoperations,Barclaycardusedmorethan50crowd-sourcedideastoimprovethe Ringand,combinedwithothercustomerinitiatives,has seen complaints decrease by half. Barclaycard’s understanding of customer needs gleaned from communitydiscussionandfeedbackhasallowedthem to deploy changes in a timely manner, increasing customer retention by 25%4.Inshort,Barclaycard’sRingCardishelpingtoredesigncreditcardsintoacommunity-drivensocialexperience.

Global collaboration at the speed of socialGeneralElectric’sColabplatformwantstobethevirtual water cooler at the office – and more. RonUtterbeck,CIOforGeneralElectricCorporateand Director of the Advanced Manufacturing SoftwareTechnologyCenter,createdthenew Colabsocialplatformwhichhasgrownfromzero users to 124,000 strong in less than a year5. Attracting roughly 1,000 new users every few days, Colabhasbeguntodismantlefunctional,geographic,andgenerationalsilosthatlarge-scalecorporationsare all too familiar with6. The company is an early adopterinthisarena,andthechairmanandCEO JeffImmeltisanearlyandstrongsupporter. Beyondsimplyfile-sharinginthecloud,theplatformallows others to recall the context in which the files were used through its recorded conservations, attached meeting notes, and collaboration history. With a strong base product, the company plans to extend functionality for specific business applications throughreal-timefeedbackanditerativereleaseplanning. One future plan is to surface small windows todriverelevantdecisionpoints–allowingtasks to be completed without logging into entirely different systems.

Timelyinnovationrequiresaneasywayforusers toprovidefeedback,aswellasdeliveryprocesses that enable speed and experimentation – even if it means releasing features that are not in their fullyfunctionalform.ForGE’smorethan300,000employeesaroundtheworld,theworkplacehassuddenly has gotten smaller – and a lot more agile.

Page 29: Deloitte Tech trends 2013 report - Feb 2013

28

SocialReengineeringbyDesign

Community problem solvingWhatdochessrankings,groceryshopping,pharmaceutical development, and space travel have in common? These represent some of the topics for predictive modeling competitions hosted on Kaggle, atwo-year-oldplatformforbigdataanalytics.Organisations pose issues such as “when will shoppers go grocery shopping next?” or “how do we predict the likelihoodofsideeffectsduringthedrugdevelopmentphase?” and provide a dataset for analysis. Kaggle then converts the issue and dataset into a contest, and the research community competes for a prize paid by the sponsoring organisation.

Kaggle provides a social platform for entrants to testanddemonstratetheirskills,aswellasopenupopportunitiesforcollaboration.EntrantsintoKagglecompetitions come from more than 100 countries and vary in disciplines from computer scientists and statisticians to students in glaciology and signature verification7.Cross-disciplinaryteamsnaturallyform as competitors reach out to each other to collaborate in contests.

Initstwoyearsofoperations,Kaggle’scommunitymembers have contributed nearly 180,000 entries andparticipatedin67competitions.Byhavingmultipleparticipantstestingdifferenttechniquesinacompetitiveatmosphere, promising solutions bubble to the top inamoretimelymannerthaninatypicalproblem-solvingprocess.Forexample,inonecompetition,theKaggleCommunitywasabletoimproveAllstateInsurance’sclaimpredictionabilityby271%inthreemonths8.

Kaggle has also recently collaborated with Greenplum to allow companies interested in contracting big data jobs to reach out to Kaggle community members9. By identifying leading minds in data analytics, organisations that want to improve their predictive capabilities can mine for talent across the globe.

Page 30: Deloitte Tech trends 2013 report - Feb 2013

292013 Technology Trends – Disruptors

SocialReengineeringbyDesign

John Hagel Co-ChairmanDeloitteLLPCenterfortheEdge

My take

Social Reengineering by Design involves using technology inamorethoughtfulandbroad-basedwaytomeetbusinessneedsinasocialcontext.ItisfrontandcentertothequestionofHow can and should people connect to advance business objectives?

The traditional 20th century corporation was often about efficient scale through tightly specified and highly integrated activities. There was a predictable performance curve, but at times it turned out to have diminishingreturns.Itseemedthemoreexperienceyou had in an industry, the harder it was to get to the next level of performance. This pattern made it difficult to tolerate – much less encourage – innovation, experimentation, and learning. Today, change is occurring at an accelerated pace, as past practices and approaches becomelesssuitedtonewmarketandindustryneeds.Whatwasonceefficientisn’talwaysefficientanymore;there are often people in the wrong place, at the wrong time, scrambling to reorganise to meet the needs of the marketplace.Theopportunityexiststocreateanewsetof platforms – social platforms – to scale learning and effective innovation, while still supporting efficiency. It’snot“either/or,”it’s“both/and.”

Social platforms can be applied to achieve both broad and narrowbusinessgoals.Forexample,socialreengineeringcan be used for exception handling – managing the things that get thrown out of automated processes that individuals need to resolve. Social technologies can allow people to handle exceptions in a more efficient way, perform pattern recognition, and see what exceptions maybeindicativeofchangingneedsinthemarketplace.

Another application for social reengineering involves learningandtalentdevelopmenttosupportbuildingskillswherever, whenever, and for whomever.Ifyou’reseriousabout learning, driving performance, and developing talent,lookbothinsideandoutsidethefourwallsofyourorganisation.BillJoyfamouslysaid,“Nomatterwhoyouare,mostofthesmartestpeopleworkforsomeoneelse.10”Connectinginsidewithoutsidecanchangeyourframe of reference. Often, the more people you draw intoyournetwork,thefastertheentirenetworklearns.How can we articulate not just the opportunity but the imperative to move toward scalable learning?

How can we go in – in a very surgical way, with modest resources – and demonstrate the impact of this shift? Begin by systematically identifying the metrics that matter. Senior executives are typically focused on financial performance. Middle managers are usually more concerned with operating metrics. Frontlinemanagersoftenaddresstheactivitiesandbehaviours affecting those operating metrics.

Firstidentifyspecificopportunitiesinthefinancialmetrics, drill down to the important operating metrics thatimpactthosefinancialmetrics,andthenlookforthe frontline metrics that can impact the operating metricsthatmatter.Bytakingthisapproach,youcantarget the deployment of social technology in ways that get the attention across levels of management and move the needle for the entire organisation. Second,resistthetemptationtogetagold-platedsolution.Useanadequateproductforsocial-enablingthe target area of the organisation. Actively monitor the impact on the relevant metrics, perform timely iterations to strengthen impact on these metrics, and engage broader support and sponsorship. Andthird,keepaneyeonthebiggerpicture. The absolute level of performance is often less relevantthanthepaceofprogress;thesnapshotofyear-over-yearperformanceisoftenlesstellingthanexaminingthetrajectoryovertime.Inarapidlymovingbusiness environment, even strong performance can beovertaken–winnerscanaccelerateperformanceimprovement over time.

Social platforms help address the important element oftacitknowledge–experiencethat’shard to express, and gained in time. Scalable learning is oftenlessaboutcodifiedknowledgeandmoreaboutconnecting, building relationships, and developing trustthatpromptspeopletosharewhattheyknow.Connectingtoknowledgeisoftenlessimportantthanconnecting with one another. That’s the design of social reengineering.

Page 31: Deloitte Tech trends 2013 report - Feb 2013

30

Flying car futureInbusinesstoday,contentisking–thethingsIknow,the things I do, the things I produce. This applies bothto“I”atthecorporatelevelandattheindividualcontributorlevel.Lookingfiveortenyearsdowntheline, there may be a fundamental shift – where context andcommunitybecomeatleastequal(ifnotmoreimportant)playersthancontent.Amorefullysociallyreengineered world of business platforms. What does suchafuturelooklike?

Contextinitssimplestformistheinterrelatedconditions in which something exists or occurs. Forexample,anorderisthecontent–thewhere,when, and by whom an order was transacted is the context. What happened before the order? Was the order in line with a customer’s historical tendencies? Isitsomethingthesalesassociatetypicallysells? What can be learned about the weather, local events, or social sentiment surrounding the product? Theexplosionofgeo-locationdata;bigdatatrackingdigitalexhaustacrosssocial,web,andinside-the-enterprisesources;andmobiledevicescapturingvideo,temperature,location,bio-metrics,andotherdata are providing a treasure trove of context. The inevitable convergence of personal and professional digital identities is an important factor – promoting correlation across an individual’s multiple personas–tounlockthepowerofcontext.

Communitieswilllikelycontinuetoevolvethemeaningand utility of relationships. As highly specialised social platformsemerge,lexiconswilllikelyformtoguidehow a given topic is discussed. Social currencies will likelyformaroundlevelsofknowledge,engagement,and cooperation. The organisations of tomorrow may see a shift in employment models – instead of havingthemajorityofworkconductedbyfull-timeemployees,dynamicworkforcesmaybetappedbasedonwell-describedareasofneed.Thisalreadyexistsforlow-level,low-skilltasks.Butitcouldeasilyexpandtomorestrategicfunctions.Thetendencytostockpileknowledgeandprotectwitha“needtoknow”mentalitywouldshifttovalueknowledgeflows, with “need to share” ruling sensibilities11.

Ifcontextandcommunitybecomethebasisforflyingcar competition, then the ability to dissolve and reconnect business processes and their underlying systems becomes critical – responding to the community’s needs based on the context of the marketandoperationconditionsofthecompany.Outside-inarchitecture12 moves from a thought experimenttoamandate.Informationandattentionbecome the scarce resources, and the new economy is dominated by those organisations that can identify, share, and amplify experience – across geography, language, and domain constraints.

Veryrealconstraintsareinplaytodaythatcancurbthisvision–HRpolicies,regulatory,laboragreements,tax, and international trade, to name a few. There will likelybeachancetoinfluencesomechangesbasedontherealitiesofthenewmarket–andtopushbroaderreform in light of demonstrated business innovation.

SocialReengineeringbyDesign

Page 32: Deloitte Tech trends 2013 report - Feb 2013

312013 Technology Trends – Disruptors

Where do you start? Social reengineering by design is about a deliberate approach to recognising legacy assumptions that may beconstrainingyourbusinessperformance,andmakingyourbusinesssocial.Itcanrequireapplyingthesocialmantras of transparency and trust, creating new ways to motivate your employees and customers, and reshaping thecontentandcontextofwork.Whilethisisabouttechnology-enabledtransformationofbusiness,thecorrect order of operations is still often strategy, then people, then process, then technology.

• Chooseyourtarget.To start, select a business objective in an area which could potentially be positively disrupted if viewed as a social platform. Findareaswherethereisanaturalcommunityofstakeholdersthatcouldbetapped,butarecurrentlypoorlyactivated.Placeswherepeople,information,and potentially operational assets could be brought togetherinasocialnetworkforabusinesspurpose.Don’t let today’s behaviours limit exploration. OneexamplemightbeR&D–linkingyourmarketers,product engineers, and sales team with service techniciansandend-users,aswellasyourupstreammanufacturing partners. Another may be demand planning, focused on suppliers, manufacturing, sales, andmarketing.Thinkthroughbusinessobjectivesforthe area, and what outcomes could be influenced if reengineered using a social mindset.

• Socialdiscovery.Identifythesocialnetwork(s) relevant to accomplishing the selected business objective. This may cross your organisation, customers, and business partners – but also external thirdparties(othervendors,academics,luminaries). Social reengineering is about community, context, andcontent–inthatorder.Forlikelycandidates, do some digging. Who are the players that form the community – across internal hierarchies, within customer organisations, at business partners, or external parties? What are their relationships to the target objective? What content and context could empower the community?

• Carrots and sticks. Articulate meaningful incentives fortheidentifiedsocialnetworktoengageintheselectedbusinessgoal.Participationispersonal,sothisislikelytobecustomisedtothevariouspersonasbeingengaged. How do their interests align, and what are thekindsofpersonalisedincentivesthatcouldbelaidout to encourage participation in the social platform?

• Thinkfromscratch.What constraints are holdingbackthetargetarea–operationally,organisationally, or technologically? They could be functions of the corporate structure, communication gaps, unwillingness or inability to collaborate, geographicalconcerns,perceivedinequalities based on career levels, “not invented here” biases against external parties participating, or general political distractions. Or they could be well-definedrestrictionsbasedonregulatoryor legalissues.Reengineeringwilllikelyrequiresomedrasticchanges.Fromtheconstraintsidentified, which ones are within your company’s control? Willleadershiphelpbreakthroughconventionsand support the team through what may be an uncomfortabletransition?Resisttheinstincttostandardisethenewprocessup-front.Setboundarymarkerstoguidebehaviourinthereengineeredworld, but leave freedom for experimentation andobservehowworkisgettingdone,andhowthecommunityisengaging.Letpeoplestrollinthe proverbial grass – and wait to pour concrete sidewalksuntilyouunderstandwheretheyareactuallywalking.

• Finalstop–thetools.Nowisthetimetolookattools and technology solutions – after clarity around business objectives, social platforms, communities, incentives, and reengineering ambitions. By now there’slikelyahandfulofsolutionsdeployedacrossthe various lines of business. These opportunistic social efforts don’t necessarily need to be shut down,especiallyasthey’relikelyalignedto “no regret” pieces of the social value prop – listening, analytics, and customer outreach. See what investments have been made and what can be reused, but don’t give undue preference toastackjustbecauseapocketofthebusinesshasalreadyprocuredit.Makeastrategicplatformdecision based on the broader transformational nature of the reengineered vision. Of course, lookingatthetoolsmaygeneratenewideas about constraints, incentives, or span of the socialnetwork,sodon’tbeafraidtoiterate.

SocialReengineeringbyDesign

Page 33: Deloitte Tech trends 2013 report - Feb 2013

32

Bottom lineThe postdigital forces, led by social, can be used to shape business around the ways people naturally interact. As the time, attention, and engagement of your employees and customers becomes a more precious resource than computer power or standardisation, social platforms can overcome traditional organisational constraints to enable innovation and user-centred pathways to productivity.

We’re no longer building technologies to enable just interaction – social platforms can be built for a variety of specific business purposes: specialised content, enhanced with context, enriched by the power of communities. This calls for a deliberate, intentional course to discover new ways of doing business, using social to reengineer processes, systems and organisation for the new economy. It is a course driven not by efficiencies and scale, but by mindshare and engagement.

Katherine Milesi, Partner, Deloitte Digital

SocialReengineeringbyDesign

AuthorsStephen RedwoodPrincipal,DeloitteConsultingLLPsredwood@deloitte.comStephenRedwoodorganisationinhelpingorganisationstransformthroughculturechange, leadership development, behavioural change, and organisation redesign. He supports clients in their efforts to address the human capital and organisational implications of emerging technologies.

Chris HeuerSpecialistLeader,DeloitteConsultingLLPcheuer@deloitte.comChrisHeuerisaleadingsocialmediaandcollaborationstrategist,focusedonSocialBusinessstrategy,design,andadoption.Chrishelpsorganisationsapplydesignthinkingtocross-boundarycollaborationbetweenemployees,partners, and customers to save time and improve performance.

Endnotes 1 AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter1.

2 AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter2;andinDeloitteConsultingLLP(2013),“TechTrends2013:Elementsofpostdigital”,www.deloitte.com/us/techtrends2013,Chapter6.

3 KitEaton,Barclaycard’s Ring Calls On Crowd To Build A Better Credit Card,http://www.fastcompany.com/1822714/barclaycards-ring-calls-crowd-build-better-credit-card(March2012).

4 See:http://groundswelldiscussion.com/groundswell/awards2012/detail.php?id=8155 King,R,GE Colab Tool Brings Good ‘Peeps’ to Life,http://blogs.wsj.com/cio/2012/12/03/ge-colab-tool-brings-good-peeps-to-life/(December2012).

6 RobertBerkman,GE’s Colab Brings Good Things to the Company,http://sloanreview.mit.edu/feature/ges-colab-brings-good-things-to-the-company/(November2012).

7 See:http://www.kaggle.com/About8 Casestudy:“Allstate:Predictingliabilityforinjuryfromcaraccidents”,http://www.kaggle.com/host/casestudies/allstate9 “EMCandKagglePartnertoEnableOn-DemandDataScientistWorkforce,”EMCCorporationpressrelease,October23,2012,ontheGreenplumwebsite,http://www.greenplum.com/news/press-release/emc-and-kaggle-partner-to-deliver-on-demand-data-scientist-workforce,accessedJanuary2,2013.

10 Bornstein, D. Social Change’s Age of Enlightenment.RetrievedJanuary10,2013,fromhttp://opinionator.blogs.nytimes.com/2012/10/17/social-changes-age-of-enlightenment/

11JohnHagelIII,JohnSeelyBrown,andLangDavison,The Power of Pull: How Small Moves, Smartly Made, Can Set Big Things in Motion(UnitedStates:BasicBooks,2012).

12AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter10.

Page 34: Deloitte Tech trends 2013 report - Feb 2013

332013 Technology Trends – Disruptors

Design as a Discipline4

Design should be much more than a project phaseDesignisalreadypartoftheITvocabulary.Functionaldesign. Technical design. Detail design. Testing design. Userinterface(UI)design.Technicalarchitecturedesign.And,morerecently,userexperience(UX)design– a hot area of focus as consumer technology experiences areresettingexpectationsforcorporateIT.Throughoutits history, however, design has generally remained a discrete set of deliverables or project phases, completed by specialised teams at distinct points during a project’s lifecycle.Individualfacetsofdesignhavereflected little understanding of other related project activities, much less the broader context of the business vision and expected outcomes.

Meanwhile, usability, intuitiveness, and simplicity have moved from aspiration to mandate, with the business having access to new ways to get what it wants: directly procuring cloud services, digital solutions, and mobile apps that are “good enough” to meet their needs. InthisopenmarketplaceforIT,businessrelevanceanduserengagementarecompetitivecurrency.ManyCIOsfindtheirorganisationslacktheskillsandcrafttomint the new coin.

What’s missing may be a commitment to design as abusinessdiscipline,acommitmentthattakesshapebyasking:What benefits would we gain if design were a pervasive and persistent aspect of each part of the enterprise? Thiskindofthinkingmovesdesignfromjustanothersoftwaredevelopmentlifecycle(SDLC)phasetoanintegralpartoftheITenvironment.Itshiftsthefocusfrom“HowdoImeettherequirements?”to“Whyisthisimportant in the first place?” and “How could we innovate toimproveit?”Enterprisescanreachthisvision,butitoftentakesadeliberateapproach,intentionallyapplied, byanewmixoftalent.TheCIOispositionedtomake it happen.

Pocketsofdisciplineddesignareemerging,butrarely gobeyondthefront-endinterface.UIisimportant, tobesure,butdesignshouldn’tstopthere.Front-enddesign is only as good as its foundational architecture – and only as valuable as the resulting user engagement. Poorlydesignedtransactionalservices,datafeeds,socialplatforms, and underlying infrastructure can derail even

anelegantuserinterface.Utilityandergonomicsareimportant, but not in the absence of reliability, security, scalability, and maintainability, particularly in a hyper-hybridcloudenvironment1.JackDorsey reflected on the artistry and imagination behind the Golden Gate Bridge, but one of its most important featuresisrarelymentioned:resiliency.Seventy-fiveyears later, the Golden Gate Bridge is still standing2.

Amindshiftislikelyrequiredtostarttheprocess. Think“system”asinsystemic, not as in software. Focusondesigningexperiences,notjust user interfaces. Zoom above the development lifecycleandlookatdesignasacross-cutting discipline.It’snotan“ITthing”ora“marketing thing”ora“productengineeringthing.”It’san“enterprisething.”Newskills,capabilities,tools,andmethodsareoftenrequiredtosustainthejourney.Takingideasfromthefieldsofarchitectureand industrial design, or from the application of anthropology and behavioural psychology, into each stage of solution definition, ideation, and realisation. Multi-disciplinaryteamsshouldpracticeconcurrentdesign in a highly collaborative model, blending creative,UX,engineering,andfunctionalknowledgetoencouragethecross-breedingofideas.Transparencyistheultimatedesignobjective–wheretheUIisinvisibleandthingsjustwork.

Considerthebanana–anearlyperfectdesign. Itfitsperfectlyintheuser’shand.Nomanualsarerequiredtounderstandoruseit.Thepackagingis non-slip,easy-to-open,andbio-degradable. And it dynamically communicates status information. Theskincolourbroadcastsitsreadinessforconsumption – green is too early, brown too late, yellow just right. An unconventional example? Perhaps,butitillustratesthepoint.Andyoucan expectthatitwilllikelybebothchallengingandhumbling for technology designers.

ITcancreateanewnicheforitselfbycorneringthemarketondesign.Onthefront-end,ontheback-end,creative, user experience, applications, services, data, and infrastructure. Design weaponised as a repeatable, deliberate approach. Design as a Discipline.

Page 35: Deloitte Tech trends 2013 report - Feb 2013

34

History repeating itself? Design has spurred research and debate throughout the modern industrial age – historically by visionaries suchasHorstRittel,BryanLawson,andNigelCross,andtodaybythelikesofDieterRams,PhilippeStarck, andFrankGehry.Designalsohasapresenceinmanytopcompanies,thoughoftenassomethingthatlivesbetweensalesandmarketing,andlesssoasasetofskillsorunderlyingcorecompetencyacrossabusiness’functions. Too often design has been relegated to a phase of a project, or a silo of activity, with fixed inputs and outputs to the rest of the organisation.

Design as a Discipline

What were the challenges? What’s different in 2013?

Design thinking •Design thinking is an old term that has seenaresurgenceofinterest.CoinedbyHerbertA.Simonin19693, it has gained recognition in recent years through the workofthedesignfirmIDEO4, as well asprogramssuchastheHassoPlattnerInstituteofDesignatStanford5. Agencies and product vendors are trying to capitalise onthenew-foundpopularity–crowdingthemarketwithdifferentmessagesonthewhat,why,andhowofdesignthinking.

•Designthinkingisofteninterpretedasadistinct process, prescriptively combining divergent and convergent ideation, anchoredinachievingawell-definedgoal.Inthismodel,designthinkingcanbecomecompartmentalised, as opposed to a new, holistic, disciplined approach.

•Design as a Discipline represents a systemic expansion of design thinking.Itlooksattheimportant intersection between creative, businessexperience,domainknowledge,and technical engineering – creating shared language, shared approaches, and shared goals toward problem solving across the enterprise.

•DesignasaDisciplinecanknockdownthecompartmentalised boundaries of design thinking,movingbeyondproductmarketingandR&Dtovariouspartsoftheorganisation.Shiftingtoanenterprise-wideconversation–where each project strives to include creative, business,andengineeringtalent.Itcantakean iterative, experimental, and experiential approach across the technology lifecycle – fromportfolioplanningandrequirementsgathering to new capabilities around monitoring, improvement, and release planning.

User engagement6 / User empowerment7

•Userengagementemphasisesworkingbackwardfromanend-userpersonatoguide experiences that get automated. The mantra of designing from the user-down–notsystem-up–continuesto hold true. The danger lies in stopping atthefront-endorfocusingoncreativeanduser-interfacecomponentswithoutunderstandingdownstream,back-endimplications.

•Userempowermentaddstouserengagement the forces of consumerisation anddemocratisationofIT.Usersandcustomers expect to get technology from the enterprise that is at least as good as the technology they have at home. And they expect to get it when they need it, without undue time, cost, or bureaucracy. The challenge has become how to be responsive to these demands yetremaintruetothedisciplinesofriskmanagementandquality.

•Design as a Discipline builds on the user engagement and user empowerment mantras – extendingthepersona-basedapproachto the underlying data, application, and infrastructure services.

•Design as a Discipline shifts from separate, adjunct processes to being embedded in overall solutiondelivery.InsteadofhavingaseparateteamworkingtoenableERPthroughmobile,usabilityanduserexperiencedesignskillsareembeddedacrosstheentireERPproject,informing not only mobile use cases, but also moreconventionalthreadslikebusinessprocesstemplates, business intelligence visualisation, and interface specifications.

Page 36: Deloitte Tech trends 2013 report - Feb 2013

352013 Technology Trends – Disruptors

Technology implicationsArt meets science at the heart of design as a discipline, but there is still plenty of science involved – in the underlying technology layer assisting solution development, and in the deliberate approach that infuses creativity into the system.

Topic Description

Digital backbone The need for a reusable set of services and solutions across an organisation’s digital domains isbecomingcritical.Thesesolutionsareimportantbuildingblocksfordesignasadiscipline.Potentialareasincludecontent,rightsmanagement,mobile,social,web,eCommerce,customer analytics, identity, credential, and access management – as well as heavy sales and marketingcapabilities,includingcustomerrelationshipmanagement,salesforceautomation,campaignmanagement,andsearchmanagement.Anenterprise-widedigitalbackbonecanaccelerate design as a discipline adoption and create clarity about the integrated nature of foundational technologies.

Integration / orchestration

Being able to bring together data and transactional services for end users is a universal need. Adetailedintegrationlayerisimportanttoallowtieredqualityofservicefororchestratingbetweendataandsystemsandformanagingtrade-offsbetweenreliability,speed,andperformance.

User experience (UX) UXisanindispensableingredientindesignasadiscipline–anditinvolvesmuchmorethanabstractaestheticsorscreenlayout.Itinvolvesamixoffieldresearch,thecreationofdetaileduserpersonasandstories,build-outofservicediagrams,informationarchitectureoftheactor,tasks,andbroadercontext,andconceptualdesignoftheend-userexperience. Thedesiredskillsetrequiresamixofcreativedesignerandanthropologist,ideallywitha layerofspecialisationbasedonsolutionchannel(e.g.,mobile,web,social,digitalERP).

Agile development Longago,industrialdesignleadingpracticesstandardisedonclosecollaborationacross multi-disciplinaryteams.ITdepartmentsspearheadingdesignasadisciplineshould followsuit.Thatrequiresbusinessanddomainspecialists,creative,UX,engineers,andQAtoworktogetherthrougheachphaseoftheproject.Afocusontimelydevelopmentcanforcethebreakdownofprojectgoalsintodiscretedigestiblecomponents,witheachiterationresultinginapotentiallyreleasableendproduct.Designwilllikelyevolveasincrementalfeatures are built, responding not just to technical specifications, but also to the actual usability, utility, and experience of the end product. Many organisations claim to have dabbled with Agile in the past, but few ever moved beyond an iterative waterfall approach (affectionatelyknownas“wagile”or“agerfall”).Partofthechallengeinadoptionislikelytoinclude shedding biases, rewiring delivery models, and mechanically building out the tools for newwaysofhandlingrequirements,releaseandconfigurationmanagement,andtesting.

Prototyping Movingquicklyfromconcepttoprototypeisacoretenetofdesignasadiscipline.Justasindustrialdesignersusethree-dimensionalprinterstovetpotentialproductconcepts, ITdepartmentsneedtheabilitytorealiseworkinginteractivemodelsofpotentialsolutions.HTML5-basedframeworks,nativemobiledevelopmenttools(suchasApple’sInterfaceBuilder,Eclipse’sGraphicalLayoutEditorforAndroid,andMicrosoft’sVisualStudio11), andthird-partytools(e.g.,FluidUI,OmniGraffle,andWireframeSketcher)areviableapproaches.Chooseplatformsalignedwithyouroverarchingdigitalstrategy.

Design as a Discipline

Page 37: Deloitte Tech trends 2013 report - Feb 2013

36

Design as a Discipline

Lessons from the frontlinesReady for takeoffTheairlineindustryisatoughnuttocrack,withhighfuelandequipmentcosts,shiftingdemand,androuteandairportcapacitylimitingmarketgrowth.Inthefaceofthesechallenges,VirginAtlanticAirwayshastakenadifferentpathtodistinguishitself–bankingonastrategyofmakingtravelanenjoyableandfunexperience.

Virgin’semphasisondesignandstylepermeatestheuserexperiencefromthemomenttheybookaflightand experience the easy Web interface. The gate terminals offer relaxing lounges which include elevated laptop tables and dining areas featuring local food. On board the aircraft, customers encounter the signature purple mood lighting, custom cabins with chairs that can be converted to beds, an onboard bar, and an interactive entertainment system8 – all of which aremeanttogivethefeelingofafive-starhotel. These features are the product of concerted efforts to build relationships with other parts of the company andcommunicatetheimportanceofthinkingaboutdesign at different steps. The result is intended to be aflightthatpeoplelookforwardto.

Design elements are also included in intangible aspects of customer experience. The company’s service design teamlookstoimprovethewholecustomerserviceexperience by imagining what the entire experience of traveling for customers could be – and then planning serviceguidelinesaroundthatvision.OneofVirgin’sinnovationsistheUpperClassWing,whichaimstoget customers from limo to lounge in ten minutes. Passengersarepickedupbychauffeuredcarservice,checkedinusingadrive-throughprocess,andthendirected through a private security passage to the VirginClubhouseloungearea9.

VirginAtlantichasworkedhardtoinfusedesignprinciples across the company and deliver a reputation built on customer experience, and the payoff has been dramatic. When the new cabin configuration wasrolledout,VirginAtlantic’smarketshareincreasedby 2% – or approximately £50 million10 and customer satisfaction was over 90%11. The company has also been recognised with numerous industry awards for excellent customer experience and service awards. VirginAtlanticAirwayscontinuestotake-offthroughinnovation and design.

One more thingFromwhiteearbudstotheroundedrectangularshape, Apple has helped to define technology product innovationfortheInternetage.Itsminimalisticstylecanbeidentifiedeasily–thelookoftheirwebsite, the style of their stores, the layout of their products, and more. Although Apple’s design ethic is often discussedinreferencetothelookandfeelofproducts,almost every aspect of the customer experience is carefullydesignedtoworktogether.

Fromtheoutset,Appleflippedtheideaofhowtododesignonitshead.Insteadofhavingengineerstellingindustrialdesignerstomakecomponentsandbatterieslooknice,Applefirstdecideshowaproductwilllookontheoutside,andengineeringmakesthetechnologyfitthe vision. Apple’s design process also merges the talent of many different disciplines – from product design to mechanicalengineering.Thecompanyworksclosely with manufacturers to select materials, and stretches their capabilities by challenging them to develop new methods12. The result is a series of products designed to be easy to use and intuitive, even to users who are unfamiliar with technology.

As consumers demand that technology do more and more, it can be difficult to control technological complexity. Apple products have strictly adhered to a policy of simplicity, and their devotion to design has produced an identifiable brand which has attracted outsized media attention and a loyal customer base. OnthefirstdayoftherecentiPhone5launch, Applesoldtwomillionunitsandwasback-ordered foratleastthreeweeks13.Inthesmartphoneindustry,Appleearnsasmuchas70%oftheprofitsinthemarket.Fortablets,thenumberis85%.14 Apple has become one of the most profitable companies in the world, at least in partbymakingtechnologyaccessibleandstylish.

Design everywhere (even on your wall)WhenlookingatNest,themodernisticconsumerthermostatdesignedbyTonyFadell(thefatherof theiPod),itwouldbeeasytogetcaughtupintheproduct’saesthetics.TheminimalisticLEDdisplay. The ease of use by rotating the entire device as a controlknob.Thesimplicityofmenusforset-upandprogramming. But it’s clear that design discipline extendsthroughoutthecompany.Pre-salesare centered on a simple interactive Web app to help determine compatibility with existing furnaces and thermostatconfigurations.Installationinvolvestwo screwsandsnapconnectorsforwiring.Amulti-headscrewdriverisincludedinthepackaging–withoptionscoveringnotonlyNest’sneeds,butthoseyou’lllikelyencounter when removing your old thermostat. A carpenter’s level is even built into the mounting hardware.

Control–usingthedeviceitself,across-platform mobile app, or the Web – is intuitive and consistent. Aplatform-basedoperatingsystemallowsA/Btesting of system menus, letting the company capture user feedbackandfine-tuneitsoverallUX.Self-updatesandpatchingarehandledviaembeddedInternetconnectivity.Andaself-learningfunctionaimsforahands-offapproachto energy efficiency – combining analytics of past behaviourandsensorstotrackwhetheryouarehome ornot–toself-regulatetemperatures.Theresult? Glowingreviewsandgrowingmarketshare15, in an unlikelyproductcategory.

Page 38: Deloitte Tech trends 2013 report - Feb 2013

372013 Technology Trends – Disruptors

Iliveandbreatheandbleeddesign–butI’malsoextremely critical of the formal discipline and programs commonlytaughttoday.Igrewupmakingthings,andgotintodesignbecauseIthoughtitwasaboutcreativeproblemsolving.InschoolIbecamedisenchantedwithhow architecture and product design felt disconnected fromrealworldchallenges.That’swhyIstartedmyownnonprofittopracticethekindofdesignIbelievein: thenitty-gritty,rigorousproblemsolving,physical,makingkindofdesign.

IteachdesignandconstructionskillsatREALMCharterSchoolinBerkeley,California.Dubbed“StudioH,” it’sanengagingprogramthatdevelopsverymarketablepeople, but it’s not about resume building or vocation. It’saboutenablingthe4Csofdesign–critical,creative,complex,andcommunicativeskills.

Previously,ItaughtthesameStudioHprograminruralNorthCarolinawithstudentswhohadnevertakenan art class and could not even read a ruler. After 12 months in our program including one summer with us, theyhaddesignedandconstructedanaward-winningbuilding–acommunityfarmers’marketfortheirhometown that created a dozen new jobs and two new businesses.Manyofourstudentswalkedawayfeelinglikeeverythingispossible,andthattheyhadthetoolstomakethingshappen.Theylearnedthatyoudon’tneedtosettle.Thedesigner’s“yes,and…”mentalitytaughtthemtokeeppushingtheconstraintsofthesituationandthequalityoftheirownworktocreatesomethingboth functional and beautiful.

Whileittakesspecifictraining,skills,andexperiencetobeastrongdesigner,Iarguethatalmostanyonecan–andshould–usedesign-thinkingprinciples. Iequateittobeingabletopullthescientificmethod outofascientist’sprocessandapplyitgenerallyatwork.Somepeoplemistakedesignassolelyaboutthecreativeprocess.Itis,butit’salsoveryrigorous.Youmighthavetostartyourthinkingovermanytimesduringthedesignjourney,becauseyoudon’tinitiallyknowwhereyou’llenduporwhichpathorpathsyoushouldtake. You should be comfortable with that.

Emily PillotonFounderandExecutiveDirectorProjectHDesign

You should be brave, vulnerable, and raw enough to allow change to really happen. You can’t be all about control.Inmanyways,designthinkingisantitheticalto the modes of operation business leaders have been socialised to use – where things are linear, step-by-step,replicable,andhomogenous.

The good news? You don’t have to throw schedule and budget out the window. Some of the best designs typically happen within really tight constraints, so use them in a positive way rather thanasashackle.TheprojectinNorthCarolinahada$70,000budgetforeverything–studentstipends,permits, contractors, nuts, and bolts – and the students had only 90 days to complete the building. Thoseconstraintspushedthestudentstomakereallycreative decisions.

Ibelieveyoucan’tdesignagoodproductunlessyoutalktopeople.Wecaneachbeaspecialistinour own area and have our own awesome thing. It’smoreaboutopennessandcollaborationandahealthycodependence.Adeveloperisn’ttaking awayfromhisabilitiesbytalkingtoamarketer; he’s enhancing his ability to do his job. You can’t do your own awesome thing well unless you open your arms to others.

Incorporatingdesignasanenterprisedisciplinerequiresstrongleadership:youneedachampionwho can help others see the value. Sometimes, those who do embrace design do it with about 10% of the intensity they should. Many people hear “design thinking”andsay“Iwantthatinmyteam.”Butittends to become just another meeting people have to go to, and it doesn’t permeate the culture.

Design as a discipline is not for every business or organisation.Itcanrequirebeingcomfortablewithbeing uncomfortable, and innovating at the core insteadofaroundtheedges.Ifyou’regoingtoattemptit,thenIsay“gobigorgohome.” Not everyone needs to get on the design bandwagon, but if you do, get on and stay on.

Design as a Discipline

My take

Page 39: Deloitte Tech trends 2013 report - Feb 2013

38

Design as a Discipline

Flying car futureLeonardoDaVinciestablishedthecredothat“simplicity is the ultimate form of sophistication”16. Design as a discipline is following this cue – moving towards transparency and smooth integration across computing devices, applications, and increasingly connected physical devices.

Transparency is the evolutionary path of the userinterface.We’vemovedfromcharacter-basedinteraction with mainframe and DOS programs, tomouse-basedinteractionwithclient/serverandWeb-basedsolutions,totouch-basedinteractionwithtoday’smobiledevices.Allrequireanexplicitstep of tactile manipulation of a computing node. Thefuturewilllikelycontinuethejourney,relyingonvoicecontrols,gestures,andcontext–knowingwhoyouare,whereyouare,andwhatyou’relikelytryingtodo–totriggerambientfunctionality.Forexample,walkingthroughthecheck-outwithyourcartfullof goods could trigger: facial recognition to confirm identity, calculation of the amount due, searching through social profiles to determine coupons or other promotions, and processing payment from a mobile wallet–allwithoutrequiringyoutodirectlyinteractwith any explicit piece of technology.

Behindthescenes,thisscenariorequiresastaggeringlevel of integration – in both the design of solutions to pair user experience with the underlying technical demands, and also across the various componentsallowingfortheend-to-endexperience.Intheexampleabove,identityandentitlementmanagement services are performing the user authentication,point-of-salescannersareworkingwith pricing engines to determine amount due forthespecificcartofgoods,salesandmarketingengines are interacting with public social profiles and loyalty services to determine potential savings, and mobile wallet services are interacting with checkoutscannersandback-endpayment processors to settle the transaction.

Manyoftheseserviceswilllikelybedesignedwithoutknowingexactlyhowtheywillbeused,orwithwhatsystemsthey’llbeinterfacing.Theback-endaspectsofdesignasadisciplinerequireaservices-basedapproach–atthebusinesslevel(whatproblemsthey’retryingtosolve)andatthetechnicallevel(havingawell-defined,contract-basedinterfacecompatiblewithWebservicesstandards).SolutioncomponentsneedtorepresentequalpartsLegoandPlay-Doh–well-definedstandardisedbuildingblocks,complementedbysolutionsthatcanadapttoless-prescribedneeds.

Industrystandardswilllikelyevolvetohelpunifydatamodels(similartowhatFIXandSWIFTdidforelectronicexchangeoffinancialinformationintheearly1990s),andtechnicalcomponentswilllikelycontinueto supportopen,standards-basedprotocolsfor session management and information exchange. Butanotherturningpointwilllikelybewhenpoliciesareencapsulated and externalised – the business rules and analytical models that drive the behaviour of companies’ underlying systems. The “plug and play” nirvana of our flyingcardesignasadisciplinecanlikelyberealisedonlyif semantic meanings of data and underlying business logic can be shared and more universally understood – within and across organisational boundaries.

Page 40: Deloitte Tech trends 2013 report - Feb 2013

392013 Technology Trends – Disruptors

Design as a Discipline

Where do you start? Design as a discipline efforts often encounter two broad objections. They are seen as either too daunting given existing talent pools, or too nebulous and fluffy. Modest beginnings can lead to profound changes.

• Userfirst.Beginbytakingapersona-based, user-focusedapproach–understandingwho thestakeholdersare,howtheyliveandwork, and the context of the problem you’re trying to solve. Empathyiscritical–fromfieldresearchonhowusersarebehavingtoday,todivergentthinkingtocapture“out there” ideas about how they might behave tomorrow. Design as a discipline prioritises user stories, conceptual designs, and prototypes to solicit feedbackonpotentialdesignoptionsusing“show,”not“tell,”techniques–oftendiscoveringfeaturesand capabilities that would be missed in conventional requirementsJADsessions.

• Solution design.It’snotenoughtofocusongorgeousvisualsandintuitivefront-ends.Solutionengineers should participate in each phase of the project–fromup-frontvisioningtosolutionideationtofinalisingconceptualdesign.Thishelpskeepthe“art of the feasible” present as concepts are being explored.Technicalcomplexitymightberequiredbecause of truly differentiated features or complex end-userneeds,butitshouldbeaconsciouschoice.Don’t get caught in a situation where technical lightweightsdrivescopingandfront-enddesignwithoutunderstandinghowtomakeconceptsreal.

• Productmindset. Similar to their industrial design brethren,ITshopsshouldadoptproductmarketingand engineering mentalities – committed to frequentincrementalreleases,withfreedomtoreactinatimelymannertoopportunities.Productowners from the business become critical members oftheextendedITcommunity–owningtheproduct vision and roadmap. Goodbye bloated once-a-yearbudgetingandstaticportfolioprioritisationexercises.“Justgoodenough”releases may become standard, releasing partially completesolutionstogarnerreal-worldusagefeedbackanddrivethenextiterationoffeaturesand fixes.

• Avoidtissuerejection.Chooseanearlybusinesssponsor with simpatico sensitivities. The big picture goal of design as a discipline involves extending across the enterprise at large. But manufacturing or finance might not be the right places to start. SomeCIOshaveinitiallyfocusedonmarketingdepartments – groups who appreciate design and UXskill-sets,havegrownwaryoftraditionalITapproaches and solutions, but are charged with makingmassiveITinvestmentsasdigitalchangestheir worlds. Sales is another good place to start, whereyou’lllikelyfindvocaluseradvocatesworkinginwell-definedprocesseswithpotentialimprovementfromauser-based,design-orientedapproach.

Page 41: Deloitte Tech trends 2013 report - Feb 2013

40

Bottom lineIn-house design knowledge is a strategy to stay relevant to business executives who are enticed by new ways of procuring technologies outside of the CIO’s purview – from one-off cloud purchases to departmental and line-of -business technology initiatives. Consumerisation and democratisation can be threats to the IT department, or they can be the impetus for design as a discipline – moving information technology from its existing cross-roads, and moving it forward, with intent, to a preferred state.

For corporate IT, design as a discipline is the “so what” and the “or else” of today’s consumerisation wave. It is a chance to change how solutions are delivered – borrowing from industrial designers and architects – by combining highly complementary skill-sets to foster divergent ideation, innovation and streamlined product build-out. It is also a chance to change perceptions of what to expect from IT, setting a baseline of engaging, elegant solutions that combine intuitive interfaces to reliable, secure, scalable, performing technology stack. And most importantly, it is a way to bring new approaches to the realization of business needs – showing responsiveness to the new normal of usability in consumer technologies.

Jason Hutchinson, Partner, Deloitte Digital

Design as a Discipline

AuthorsJR ReaganPrincipal,Deloitte&[email protected],CISSP,CISM,CRISC,istheU.S.FederalChiefInnovationOfficerandalsoleadstheHIVE(HighlyImmersiveVisualEnvironment),astate-of-the-artdemonstrationanddevelopmentcenterlocatedwiththeCenterforFederalInnovationinArlington,Virginia.

Nelson KunkelDirector,DeloitteConsultingLLPnkunkel@deloitte.comNelsonistheNationalCreativeDirectoratDeloitteDigital,leadingagroupofexperiencedcreativeanddesignthinkerstotransformthepostdigitallandscape.His primary focus is to evangelise the role of design in technology, and the ways inwhichwecanaffectthelivesofothersthroughourclient’swork.

Endnotes 1 AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter5.

2 Schonfeld,E.Jack Dorsey & The Golden Gate Bridge (Exclusive Video).RetrievedDecember9,2012,fromhttp://techcrunch.com/2011/03/24/jack-dorsey-golden-gate-bridge/

3 Herbert A. Simon, The Sciences of the Artificial (First Edition),(Cambridge:MITPress,1969).4 See:http://www.ideo.com/about/5 PollyLaBarre,Inside Stanford’s creativity factory,http://management.fortune.cnn.com/2012/08/17/inside-stanfords-creativity-factory/(August17,2012).

6 AdditionalinformationisavailableinDeloitteConsultingLLP(2010),“DepthPerception:AdozentechnologytrendsshapingbusinessandITin2010”,http://www.deloitte.com/us/2010technologytrends,Chapter9,andDeloitteConsultingLLP(2011),“TechTrends2011:ThenaturalconvergenceofbusinessandIT”,http://www.deloitte.com/us/2011techtrends,Chapter8.

7 AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter1.

8 Ben Mutzabaugh, New Virgin Atlantic suites: More ‘chic,’ less ‘bling’,http://travel.usatoday.com/flights/post/2012/04/virgin-atlantic-shows-off-its-new-upper-class-suites/678355/1(April23,2012).

9 JoeFerry,TheBigRethink,http://www.designcouncil.org.uk/joeferry?WT.dcsvid=NDA5OTYwMzk2NQS2&WT.mc_id=(March2010).Transcript10 Eleven Lessons: managing design in eleven global brands,http://www.designcouncil.org.uk/elevenlessons(2007).11WhatVirginAtlanticDidNext,http://www.designcouncil.org.uk/publications/Design-Council-Magazine-issue-3/What-Virgin-Atlantic-did-next/(DesignCouncilMagazine,Issue3,Winter2007).

12 Daniel Turner, The Secret of Apple Design,http://www.technologyreview.com/featuredstory/407782/the-secret-of-apple-design/(May1,2007).13CatherineKaputa,5 Marketing Tools Apple Exploits To Build The Hype,http://www.fastcompany.com/3001650/5-marketing-tools-apple-exploits-build-hype(September28,2012).

14 Tim Bajarin, 6 Reasons Apple Is So Successful,http://techland.time.com/2012/05/07/six-reasons-why-apple-is-successful/(May7,2012).15Fehrenbacher,K.“Hundreds of thousands” of Nest learning thermostats sold.RetrievedDecember9,2012,fromhttp://gigaom.com/cleantech/hundreds-of-thousands-of-nest-learning-thermostats-sold/

16See:http://www.leonardodavinci.net/quotes.jsp

Page 42: Deloitte Tech trends 2013 report - Feb 2013

412013 Technology Trends – Disruptors

IPv6 (and this time we mean it)5

The backbone of the Internet is straining. And we’re running out of time.InternetProtocol(IP)ishowweconnecttoanyone andanythingontheInternet.Everyparticipatingdevice,application, or service has a distinct address – a way to identify itself and communicate with other devices, applications,andservices.Today’sIPstandard,IPv4, datesbacktothe1970s.Itallowedfor4.3billionuniqueIPaddresses,whichwasmorethansufficienttomeetthecomputingdemandsofthetime.Fastforwardto2013,with more than a billion personal computers in use1, a billion smartphones2, many times as many corporate desktops,laptops,networkequipment,andservers, andagrowingnumberofnon-traditionalsensorandactuator devices, including cars, thermostats, aircraft engines,elevators,andvendingmachines.IPaddresseshave become a scarce resource, already exhausted in someregions:AsiaPacific(APNIC)ranoutinApril2011;Europe(RIPE)inSeptember2012;andIPv4inNorthAmerica(ARIN)willlikelybefullyassignedby spring 20145.

The problem has been understood for decades. ThenextgenerationInternetProtocol(IPng), widelyknownasIPv6,wasannouncedbythe InternetEngineeringTaskForce(IETF)in19956. Thisnewstandardallowedfor340undecillion(1036)uniqueaddresses,alongwithimprovementsin protocol-levelsecurity,routing,andnetworkmanagement.

Unfortunately,therehasbeenlittlesenseofurgencytoadopt the new standard, especially for private enterprises andpublicsectoragencies.Workaroundssuchasnetworkaddresstranslation(NAT),dynamichostcontrolprotocol(DHCP),andprivateaddressinghaveeasedtheburdeninside many organisations – allowing each company to operate comfortably with its own set of private addresses withinitsfirewalls.U.S.federalgovernmentmandateshave set deadlines that have passed7, setting the precedent for a “wait and see” mentality.

Butwe’reapproachingabreakingpoint,fueledbygrowth of mobile adoption, increased pace of public cloud adoption, and the explosion of new end points withInternetconnectivityviaembeddedsensorsonphysicalobjects.ThiswilllikelyforceenterprisesthatworkwithcustomersandbusinesspartnersviathepublicInternettomovetoversion6astheirprimarycommunication method in the next two or three years.

Inresponsetothisdeadline,youmaybesaying, “OK,achangeiscoming,butIstillhavetime.” Notquite.Inreality,themigrationfromIPv4toIPv6maytakeyearstocomplete.Thehardwareimpactissignificant,thoughlikelythisaspectisthemost maturetoday.Networkingrouters,switches, andloadbalancers;servers,desktops,andlaptops;smartphone,tablets,andfeaturephones;printers, web servers, and storage arrays are all affected. Anditdoesn’tstopthere.Theentireapplicationstackshould be assessed – especially with the historical realityofhard-codednetworkaddressesincode,scripts,andconfigurationfiles.Likewithplanningfor Y2K, you should examine, remediate, test, and promote assets that may have gone untouched for years. Security solutions need similar handling. Firewalls,intrusiondetectionappliances,andthirdparty suppliers should be examined. Architecture and engineeringpoliciesaswellasnetworkoperationsshouldbeupdatedtotakeadvantageofIPv6intheconfiguration and management of capabilities.

Thisisadauntingtaskforwhichactionshould notbedeferredmuchlonger.IPv4’ssunsetisnolongeraquestionofif,butofhowsoon.Telecommunications, hardware and systems software providers, and content providers have been leading the way – ahead of customer and enterprise demand. Organisations should follow suit promptly. This time, we really mean it.

Page 43: Deloitte Tech trends 2013 report - Feb 2013

42

History repeating itself? IPv6isanythingbutnew–astandardthatwasconceivednearly20yearsago.FewCIOsareunawareoftheissue,but,outsideoftelcosandhigh-techproviders,itisrarelyhighoncorporateITagendas.ThebarrageofprioritiesassaultingtheCIOispartiallytoblame.Budgetcrunches.ITefficiencies.Costcutting.Pressurefromthebusinesstoexpeditecloud,mobile,andsocialadoption.Unyieldingpressureforanalways-on,incident-freetechnologyfootprint.Andmore.Butfatiguesurroundingthetopicisalsopartlytoblame.TheInternetEngineeringTaskForce(IETF)hasbeenpushingforadoptionforatleastadecade,butthe“smokinggun”tochangebehaviourhasjustnow begun to manifest.

IPv6(andthistimewemeanit)

What were the challenges? What’s different in 2013?

IPv6 • IETFissomewhatavictimofitsownprescriptivevision.Insteadofwaitingfortheissuetomount,theimpending-though-distantexhaustionofIPv4addressesspurredataskforcealmost20yearsbeforetheissuewouldreachclimax.Therealnear-termissue has been diluted by years of posturing, vendorsattemptingtoco-optthetopicwithsolution refreshes, and general confusion ontheimpactasregionalIPauthoritiessawtheirstockpilesofaddressesexhausted(whichhappenedtoAPNICandRIPE), with little evidence of adverse effect.

•ThepremonitionthattheIPskyisfalling is finally coming true – with the combinedstormofglobalisation,cloud/mobile proliferation, and the explosion of embedded sensors and connected objects. FamiliarenterpriseworkaroundssuchasNATandDHCParereachingtheirlimits, and many large organisations are facing yearsofefforttocompletesafeIPv6deployment.CIOsshouldlookbeyondhistoricalbiasandseewhatIPv6meansto their business circa 2013, and how to mitigateriskofcontinuedrelianceonIPv4.

Y2K • IPv6issometimesequatedtothefervoraroundtheYear2000(Y2K).Partofthe rhetoric rings familiar: a potentially catastrophic issue at the core of our computingenvironmentsthatrequiressystematicremediationacrossnetwork,hardware,andsoftwarestacks. Thenon-eventattheactualturnof the century is often cited as proof that such prognostications are nothing but hype.

• Y2K activities were a hedge against a theoreticalissue.IPv6isafact-based,cut-and-driedproblem.Wearerunning outofuniquenetworkaddresses,evenas the number of objects connected to the Internetisgrowingexponentially. IPv6-addresseddevicesarenotanticipatedtobeabletotalkfreelyandeffectivelytoIPv4infrastructurewithoutcontinuedworkarounds.Thiswilllikelyaffectalmostevery corporation, organisation, and governmental agency.

Page 44: Deloitte Tech trends 2013 report - Feb 2013

432013 Technology Trends – Disruptors

Technology implicationsMigrationtoIPv6haswide-reachingimplications–atthenetwork,server,end-point,andapplicationlevels.Planninghastocoverthepotentialneedforopen-heartsurgeryduringthetransition,whilesupportingongoingcompatibilitybetweenIPv4andthenewprotocol.

IPv6(andthistimewemeanit)

Topic Description

Routing IPv6featuresafixed-length40-byteheader.RemovalofoptionsfieldsfromIPv4limitsrouterprocessing.Fragmentationisonlyallowedbythesourceanddestinationnodes.Individualroutersdonothavetospendtimeprocessingchecksumsorhandlingextensionheaders.

Procurement NewhardwareandsoftwareinstallationsorupgradesshouldexplicitlyfeatureIPv6and IPv4compatibility.Operatingsystem,networkinghardware,virtualisationpackages, networkandsecuritymanagementsolutions,andlargecommercialapplicationshavefeatureddual-supportforyears.Cross-compatibilityisnotagivenforsecond-tierproviders.IPv6adoptionisdeemedinevitable.Makesureyou’reprotectingexistingassetsforeventualmigration.

Security IPSecurity(IPSec)isanative,mandatorypartoftheIPv6protocol–authenticatingandencryptingeachIPpacketofasession.Insteadofrelyingonapplication-layeradherencetosecuresocketslayers(SSL)ortransportsecuritylayer(TSL),securityisautomaticallyhandledbytheprotocolitself.IPv4couldaccommodateIPSec,butnotasadefault–requiringupdatestotheIPimplementationofeverydevicealongthecommunicationroute.Thisisimpracticalforinternalnetworks,andlikelyimpossiblefortrafficcoveringpublicnetworks.

Quality of service IPv6includesa“flowlabel”fieldintheheadertoprioritisepacketsthatneedtoarriveattheirdestinationclosetogetherwithlowlatency,suchasvideostreamingandvoiceoverIP.

Deployment options There are three primary deployment options: • Tunneling.IPv6hoststalktoIPv6infrastructureviaanend-to-endtunnelthattraversesIPv4networks,effectivelyestablishingatunnelbetweenIPv6endpoints.TheIPv6trafficflowsareencapsulatedbyarouterwithanIPv6interfaceinsideIPv4packetsandroutedthroughIPv4endpointstotheotherendpoint,whereanIPv6-enabledrouterreassemblestheIPv6originalpacketsandsendthemtotheIPv6target.

•Dual-stack.Infrastructurecomponentsareupgradedtosupportbothprotocols,withdualIPv4andIPv6addresses.IPv4usersandclientswillseeonlyIPv4-enabledcomponentsand vice versa. Beyond hardware and firmware updates, critical applications should be validatedtooperateinthedual-stackmode.

•NetworkAddressTranslation64(NAT64).Building from today’s common practice of mapping one public address to many private addresses, NAT can be used to translate IPv6traffictoIPv4–maintainingdependenciesonapplicationlayergateways(ALGs)tocorrectly monitor and route some types of traffic.

Page 45: Deloitte Tech trends 2013 report - Feb 2013

44

IPv6(andthistimewemeanit)

Lessons from the frontlinesNo more excusesBeforedeployingIPv6,wecanlearnfromGoogle,whobeganmakingthetransitionin2008.Theirinitialapproach involved a small, core team of engineers whospentanadditional20%overtheirregularworkhoursfor18monthstomakeGooglepubliclyavailableoverIPv6.Butitwasn’taseasyasitseemed.LoreznoCollitti,anetworkengineeratGoogle,saidIPv6 needstobeproduction-qualityorit’sofnouse.8 IPv6transitionmustbedoneproperly.

TransitioningservicesovertoIPv6involvesmore than just a software and hardware update. Thetimerequiredforauditing,upgradingsoftware,reconfiguring,andtestingforanIPv6roll-outcantake12months,withassociatedcostslikelytofaroutweighthecostsofanyrequiredsoftwareorhardwareupgrades9.Aneffectivetransitionalsorequiresmanagementbuy-inandaclearunderstandingof itsbusinessvalues.ForearlyadopterslikeGoogle, itrequiredconsiderablesupportfromexternalvendorswhoweren’tyetfacedwithsurgingdemandforIPv6support,furtherexacerbatingIPv6’schicken-and-eggproblem.Google’sefforttodeployIPv6initsownenterprisenetwork,whichhasbeenunderwayforfouryears,wasalargerundertakingthantheteamhad anticipated10. As of December 2011, the project was only half finished, though 95% of the company’s engineershaveIPv6accessattheirdesks11.

VintonCerf,ChiefInternetEvangelistatGoogleandoneofthefoundingfathersoftheInternet,says,“There are no more excuses. You have to be able torunbothIPv4andIPv6allthetime,anytime,becausethisisnotgoingtobeturnedoff.ForanyISPandanyedgeprovider,ifyouarenotcapableofrunningIPv6,youarenotbeingnoticed.Getgoing.GetIPv6running.”12

Brazil’s Silver BulletSilverSpring’searlycommitmenttoanIPv6 standards-basednetworkingplatformhaschangedthe utility industry’s approach to modernising the grid. In2006,SilverSpringintroducedtheindustry’sfirstIPv6-basedsmartgridnetworkingplatform13, and has sincenetworkedmorethan11millionhomesandbusinessesworldwide.RajVaswani,ChiefTechnologyOfficeratSilverSpringNetworks,envisionedanetworkingplatformasthefoundationforsmarterenergynetworksofthefuture.Securingnetworks andassigningIPv6addressestoelementsinthe power grid, such as onsite customer meters, can allow for greater coordination, reliability, and efficiency of electricity delivery and use. AccordingtoVaswani,opencommunicationsprotocolsandstandards-basedinfrastructure

areafoundingprincipleatSilverSpringNetworks.“Ourapproachhasbeentobuildanopennetworkoptimisedforthemassive-scalemachine-to-machine(M2M)communicationsacrossmillionsofdevicesthatarerequiredforthenextgenerationofsmartenergynetworks,”hesays.

InOctober2012,SilverSpringintroducedanewsmartgridofferingfortheBrazilianmarket.PartneringwithBrazilutilities,SilverSpringintegratedstandards-basedcommunications solutions that were tailored to Brazilian utilities. The upgrade has not only assisted BrazilianutilitiestomeettherequirementsoftherecentlypublishedAgênciaNacionaldeEnergiaElétrica(ANEEL)mandate,butalsoestablishedanetworkingfoundationforfuturegrid-modernisationinvestments.

EricDresselhuys,ExecutiveVicePresidentofGlobalDevelopmentofSilverSpringNetworks,says,“Leveragingthesegreatproductsonahighlyreliable,IPv6networkingplatformwillempowerourclientstomeettheANEELmandates while improving operational efficiency and revenue realisation, while also delivering ever greater value to all of their customers.”14 With the accelerating pace of devices being connected online, Silver Spring is helpingtolaythefoundationforamassive-scaleglobalmachine-to-machinenetwork–startingwiththe smart grid.

Not as easy as it looksTwoyearsago,U.S.FederalCIOVivekKundrareleasedadirectiverequiringallfederalagenciestotransitiontheirpublic-facingWebsitestoIPv6bySeptember30,201215. ButbyNovember2012,asnapshotfromNISTrevealedthatlessthanhalfofU.S.governmentdomainswere onIPv616. Among the early leaders was the Defense ResearchandEngineeringNetwork(DREN).DREN’schiefengineer,RonBroersma,saysthatgettinganearlystartwascriticaltokeepingtransitioncostslow.Itstransition in2010wasdoneoverafive-yearperiodwithnoadditional staff.

Speakingatthe2012NorthAmericanIPv6Summitin Denver, Broersma explained that agencies should gainsomeIPv6operationalexperiencetopreventmistakesinimplementation.Hefocusedparticularlyontheoperationalcomplexityofanativedual-stackimplementationandthelackofIPv6/IPv4parityas areas where important lessons must be learned. “ThebusinesscaseforDREN’sIPv6deploymentis businesssurvival,”saidBroesma,butthe‘killerapp’ forIPv6istheInternetitself.17

Kundra’s memo also established a second deadline of September 30, 2014, for federal agencies to upgrade internal client applications that communicate with public InternetserverstousenativeIPv6.

Page 46: Deloitte Tech trends 2013 report - Feb 2013

452013 Technology Trends – Disruptors

John Curran PresidentandCEOAmericanRegistryforInternetNumbers(ARIN)

My take

WhenItalkaboutIPv6(InternetProtocolversion6),peopleoftenthink“technologyniche.”ButwhatI’mreallytalkingaboutisInternet connectivity. A company can choose whether or not to use wireless personal devicesormovetovirtualmachines,butwithIPv6, thequestioncomesdowntothis:“AreyoutryingtoreacheveryoneontheInternet,oraren’tyou?”

CompaniesspendsignificantlytoreachtargetaudiencesontheInternet.Imaginemakingthattypeofinvestmentand finding out you missed the target. When someone lays out a proposal for a new system or application, keepinmindthattheInternetitselfischanging.Ifyoudon’tincludeIPv6inyourplanning,yourinvestmentsmaynotachieveyourdesiredROI.

WorkonIPv6hasbeenongoingfor20years,andthetechnology has been stable and standardised for the last 15 of those years. But now we’re actually running outofIPv4addressesglobally,whichmakesittimeforIPv6tocomeintothespotlight.Inpracticalterms, thatmeansserviceproviderslikelyhavetwochoices:stopaddingnewcustomers,orinvestinIPv6. Forexample,oneU.S.telecommunicationscarrierrecentlyannouncedtherolloutofIPv6overtheirentiremobilenetwork.Thiswasnotfortheloveofnewtechnology,buttokeepbusinessgrowing.Whenyoubuild applications – web, mobile, or traditional – youmaynotknowinadvanceifyourcustomerswillconnectwithIPv4orIPv6,soit’simportanttosupportbothIPv4andIPv6foryourpublic-facingsystems.MakesurethatIPv6ispartofyoursystemsdevelopmentlifecycle,sothatyou’reconnectingtothewholeInternet,notjustthe“old”Internet.

ThetimeframeforinvestinginIPv6hasalreadybegun.Ifyougenerallyupgradeyoursystemseveryfewyears,thenincludingIPv6inyoureffortswillmeanthatyourregularsystemsdevelopmentcyclewillmakeyoursystemsbothIPv4andIPv6reachable.Considertheincrementalexpenseofupgradingnow.IfyourcompetitionisenablingIPv6andyou’renot,itmaywell

get to a point where they will be better able to reach your target customer base with greater performance thancustomersconnectingtoyourantiquatedIPv4-onlysystems.Inthenexttwoorthreeyears,therewilllikelybecustomersthatconnectusingIPv6only.TherearealreadycaseswherenetworksarepredominantlyIPv6-connected.SomenetworksinFrance,Korea,andJapanuseIPv4primarilyforbackwardscompatibility.Asthistrendcontinues, the companies that have planned ahead should progress smoothly, while the ones that haven’t may be left scrambling to catch up via last minute efforts.

Y2KandIPv6aresimilarinmanyways.ButwithY2K,it was happening all at once, and there was only one thing to test: what happened when the date rolledover.IPv6isbeingincrementallydeployedbyserviceprovidersglobally,andrequiresthatcompanies plan compatibility with the rest of the worldbydeployingIPv6connectivityfortheir systems today.

AbigchallengeforcompaniesisthatIPv6isa parallelworldtoIPv4.IPv6worksthesamewayandrunsonthesameequipmentasyourcurrentnetwork,but your systems have to be specifically configured to speakitinadditiontoIPv4.

Iofferthreepiecesofadvice.First,ifyoureceivea proposal from a team for a system that involves Internetconnectivitybutdoesn’tspecifybothIPv4andIPv6,youhaven’tbeengivenarecipeforsuccess. Second, don’t be afraid to experiment and getsomehands-onexperience.TurnonIPv6forsome of your smaller applications, and be prepared to learn. Third, find experts and training. There are professional courses, consultants and advisors, and greatonlineresourcesavailable.Makeitapriorityforyournetwork,application,andsecuritystafftopayattentiontoIPv6–bothforyourcompanyandfortheirowncareers.IPv6knowledgehasbecomehighlysought after, and the time to start is already passing.

IPv6(andthistimewemeanit)

Page 47: Deloitte Tech trends 2013 report - Feb 2013

46

IPv6(andthistimewemeanit)

Flying car futureWeare20yearsintothelegacyofIPv6–withenterprises just starting to pay attention. And yet, aburningquestionlooms.Whatcomesnext? ShouldCIOsexpectanIPv8orbeyond?

Notlikelyfortheforeseeablefuture.Addressablespace will almost certainly not be the driver for thenextiteration.WithIPv6,wenowhave670quadrillionaddressesavailablepersquaremillimeteroftheEarth’ssurface18.

Content,access,andrightsmanagementaremorelikelyfactors–especiallyifthevisionofmass digitisation of content and the evolution of a persistent,transferable,non-reputabledigitalidentitytakesshape19.Withcloud-basedstorageandservices,expanding digital content, and expectations for smooth portability of consumption across a growing expanseofdevices,protocol-levelhandlingofidentity, access, and entitlements could become a necessity.

One reason is performance – allowing advanced compression and routing algorithms to logically improve throughputacrosstheexistingphysicalnetworkandfixed spectrum. A boon for efficiency in today’s world may become a necessity for next generation media, ashigh-definitionvideogiveswaytopersonalised,interactive content and science fiction standards likeimmersivethree-dimensionalenvironmentsorholographs. Another important reason may be that as personas are digitised, protection of identityandcontentrightswilllikelybecomeasimportant as today’s protection of information assets. WhatIPSecstandardisationistoIPv6,contentandidentity management may be to future incarnations –creatingmandatory,low-levelhandlingofacriticalbuildingblockfortomorrow’sdigitalage.

Page 48: Deloitte Tech trends 2013 report - Feb 2013

472013 Technology Trends – Disruptors

IPv6(andthistimewemeanit)

Where do you start? With business strategies inseparable from technology, it’s hard to find a company that is not highly dependent onitsnetwork.ThismakesIPv6abroadissue. Eachcompanyandagencywilllikelyhaveitsowntimeline and path forward, but general leading practices haveevolved:adiscoveryeffortofenterpriseassets;planningandexecutingremediation;testing;researchinto regional, national, and industry constraints and complianceconcerns;assessmentofdeploymentoptionsagainstbusinessstrategy;planningandroad-mapping;andexecutinganiterativerisk-managedroll-out.Andthere’s more.

• Timing.Afirstquestionis“whendoyoustart?”WhilemanyCIOsunderstandtheloomingrealityofIPv6,therehasnotbeenaburningplatformorharddeadline to drive action, especially as the need has lingeredfordecadesandworkaroundshavebeeneffective. Here are some of the common reasons that maysparkaction:expansionintogeographieswithdepletedpublicaddressregistries.Uptickinenterpriseassetsrelyingon4Gconnectivity(whichisbasedonIPv6).Growthinsensorandembeddedconnectivityinitiatives across manufacturing and the extended supply chain. Tight interactions with governmental bodies, many of which are being mandated to adopt.

Evenwithoutaclearforcingfunction,Gartnerestimatesthatby2015,17%ofglobalInternet userswilluseIPv6,with28%ofnewInternetconnections running the protocol20.Eventually you’lllikelybeforcedtomigrateifyouwanttomaintain communication with your customers and business partners.

Asmentionedabove,manyofyourITassetswillinsomewaybeaffected–makingthemoveapotentiallyhighrisktocorebusinessoperations. Bystartingnow,youshouldhaveenoughlead-timeforthedeliberate,phasedroll-outdescribedabove.Waitingcouldleadtoacostly,riskyfiredrill.

• Frontdoor.Regardlessofoveralltiming, thefirststepshouldbetoestablishanIPv6 Internetpresenceforpublic-facingmarketing,sales, and support utilities. The DMZ is a good place to start and firewalls, intrusion protection devices, load balancing devices, and management tools should be addressed. Gartner identifies three choices that enterprises have to implement IPv6supportintheirpublicInternetservices:(1)upgradeallInternet-facingsystemstosupportIPv6;(2)upgradeonlyfront-enddevicesanddeployIPv6-to-IPv4protocolgateways;or(3) buildaseparate,IPv6-only,Internetpresence21. Evaluatethistargetedadoptiontogauge readinessofyournetworkoperations, application operations, and security teams to handle a broader migration.

• Businesscase.Itmaybetemptingtorelegate IPv6toaplumbingplay.Tobefair,userswon’tlikelyseeanimmediateandtangibledifferenceintheirlives.Unlikemobile,social,oranalyticsadoption, much of the impact is behind the scenes. Yet, effective migration can help protect critical infrastructure on which the business is dependent. Networkmanagementandroutingefficienciescanalsobeexpected.Inaddition,theprotocolcan natively handle certain security procedures, allowingindividualsecurityservicessuchasIPsectobephasedout–thoughonlywhenIPv4hasbeencompletelyretired.Explorethesecostandmanagement efficiencies to create a business case that is more compelling than fear, uncertainty, and doubt. Or bundle the infrastructure readiness with a broader mobile enablement ordigitalbackboneeffort–balancingthe allure of new business capabilities and technology-basedinnovationwiththecritical (butperhapsuninspiring)infrastructureretooling.

Page 49: Deloitte Tech trends 2013 report - Feb 2013

48

Bottom lineAsconnectedcomputinghasbecomeaubiquitouspartofbusinessandleisure,partoftheInternetfoundationisfaltering.Internet Protocol has become the universal address scheme for networking, but we’ve run out of new addressable space. With the explosion of mobile devices – especially as asset intelligence and machine-to-machine embedded connectivity inliterallyeverything–uniqueIPaddressesarebecomingascarceresource.Theimplicationsaremany;constraintsoninnovation, unwieldy network management, and security concerns such as the deployment of IPv6/v4 bridges in Asia that strip identity and allow for true anonymity. The IPv6 standard has existed for decades, but we’re at a point of finally having to take the issue seriously. The implications of the migration are across organisations and not simple software upgradesasmanybelieve;theyrequiredetailedplanningandinvestmentswhichhaveoftenbeenoverlooked.

IPv6 is a bit like Y2K – with an ironic twist. A looming-but-unknown deadline, but where the repercussions of no action are precise and potentially catastrophic. Each piece of the migration is manageable. It’s the scope that is complex, as every piece of your IT footprint is potentially affected. Organisations that have already started or start now will have time to take a measured approach and access the scarce resources who understand the issues, limiting risks without dominating the entire IT agenda. Those that wait may be forced to scramble – or get left unconnected.

Sandy Aitken, Partner, Technology Advisory

IPv6(andthistimewemeanit)

AuthorsEdward ReddickDirector,DeloitteConsultingLLPereddick@deloitte.comEddieReddickisaDirectorinDeloitteConsultingLLP’sPublicSectorpracticewithover 20 years of experience as a manager and leader. He has led and contributed to consultingassignmentscoveringbusinessandITstrategy,portfoliomanagement,networkengineering,cloudstrategy,andmigration.

Bruce ShortDirector,DeloitteConsultingLLPbshort@deloitte.comBruceShortisaDirectorinDeloitteConsultingLLP’sTechnology,Strategy&Architecture practice. His areas of specialisation include enterprise data center and networkingdesign,operations,andstrategy,withsupportingcapabilitiesinITassetmanagement,ITsecurity,disasterrecovery,andIToperations.

Endnotes1 TarmoVirki,Computers in use pass 1 billion mark: Gartner,http://www.reuters.com/article/2008/06/23/us-computers-statistics-idUSL2324525420080623(June23,2008).2 Lunden,I.Mobile Milestone: The Number Of Smartphones In Use Passed 1 Billion In Q3, Says Strategy Analytics. RetrievedDecember7,2012,fromhttp://techcrunch.com/2012/10/16/mobile-milestone-the-number-of-smartphones-in-use-passed-1-billion-in-q3-says-strategy-analytics/

3 See:http://www.apnic.net/community/ipv4-exhaustion/ipv4-exhaustion-details4 See:http://www.ripe.net/internet-coordination/ipv4-exhaustion5 IPv4AddressReportavailableathttp://www.potaroo.net/tools/ipv4/index.html,accessedDecember9,2012.6 See:http://tools.ietf.org/html/rfc17527 StevenJ.Vaughan-Nichols,US government gets an “F” for IPv6 Internet make-over,http://www.zdnet.com/us-government-gets-an-f-for-ipv6-internet-make-over-7000005055/(October1,2012).

8 CarolynDuffyMarsan,Google:IPv6iseasy,notexpensive,http://www.networkworld.com/news/2009/032509-google-ipv6-easy.html(March2009).9 Gartner,Inc.,“HowtoUpgradeInternetConnectivityWithIPv6,WhileKeepingIPv4,”BjarneMunchandNeilRickard,June27,2012.10HaythumBabiker,IrenaNikolova,andKiranKumarChittimaneni,Deploying IPv6 in the Google Enterprise Network: Lessons Learned (Practice & Experience Report),http://static.usenix.org/events/lisa11/tech/full_papers/Babiker.pdf(December2011).

11JoabJackson,Usenix: Google Deploys IPv6 for Internal Network,http://www.cio.com/article/696247/Usenix_Google_Deploys_IPv6_for_Internal_Network(December2011).12Huque,S.Are You Part Of The 1%?RetrievedDecember9,2012,fromhttp://www.informationweek.com/infrastructure/ipv6/are-you-part-of-the-1/24000502913“SilverSpringNetworksSuccessfullyCompletesIEEE802.15.4gInteroperabilityTesting,”SilverSpringNetworkspressrelease,September5,2012,ontheSilverSpringNetworkswebsite,http://www.silverspringnet.com/newsevents/pr-090512.html,accessedDecember28,2012.

14“SilverSpringNetworksExtendsGlobalSmartGridLeadershipWithNewOfferingsforBrazilianUtilities,”SilverSpringNetworkspressrelease,October23,2012,ontheSilverSpringNetworkswebsite,http://www.silverspringnet.com/newsevents/pr-102312.html,accessedDecember9,2012.

15See:https://cio.gov/wp-content/uploads/downloads/2012/09/Transition-to-IPv6.pdf16See:http://usgv6-deploymon.antd.nist.gov/cgi-bin/generate-gov,accessedNovember30,2012.17RonBroersma,Enterprise IPv6 Deployment - Lessons, Observations,http://www.v6.dren.net/RMv6TF-DREN-2012.pdf(April2012).18Gartner,Inc.,“InternetProtocolVersion6:It’sTimefor(Limited)Action,”NeilRickard,originallypublishedDecember8,2010;updatedMay24,2012.19Gartner,Inc.,“HowtoUpgradeInternetConnectivityWithIPv6,WhileKeepingIPv4,”BjarneMunchandNeilRickard,June27,2012.20TheFederalCIOCouncilStrategyandPlanningCommitteeTechnologyInfrastructureSubcommitteeFederalIPv6WorkingGroup,Planning Guide/Roadmap Toward IPv6 Adoption

within the U.S. Government,http://www.ipv6forum.com/dl/presentations/USGv6Roadmap.pdf(May2012).21AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,www.deloitte.com/us/techtrends2012,Chapter8.

Page 50: Deloitte Tech trends 2013 report - Feb 2013

492013 Technology Trends – Disruptors

En Enablers

Page 51: Deloitte Tech trends 2013 report - Feb 2013

50

Page 52: Deloitte Tech trends 2013 report - Feb 2013

512013 Technology Trends – Enablers

Finding the Face of Your Data6

Hidden patterns in big data can trigger breakthrough insights – if you have the data scientists to guide discovery InDecember2012,anInternetsearchfor“bigdata”returned more than 100 million results. A 2012 report fromtheWikiboncommunitypeggedthebig-datamarketplaceat$10billionin2012,growingto$48billion in 20151.Inthepastyear,over$1billionhas been invested into private companies that focus on big data solutions2.Themajorityofbig-datamarketgrowthcan be attributed to business’s increasing interest in related analytics capabilities to drive improved decisions through improved insight. Not surprisingly, some businessexecutivesfeelbigdataisover-hyped. Othersclaimitsvalueisunder-realised.

Asearlyas2001,Gartner’sDougLaneycoinedthree Vsthatmakedata“big”–volume,velocity,andvariety3. NowotherVsarebeingputforward.Validity addresses reliabilityandlackofACID4 transactional characteristics. Venuespeakstocomplexityfromahighdiversityof data sources. Visualisation is an effective tool for putting big, complex data sets and analyses into actionableforms.PossiblythemostimportantV,though,is value. How do organisations extract real business value on a repeatable basis?

Your data should have a face – to be made personal, to foster a more meaningful relationship, and to be expressive.Thatfirstrequiresknowingyourdata–understanding what exists inside and outside of your walls,withsomesenseofaccessibility,quantity,quality,andcontext.Italsorequiresinterpretingyourdataforbig(andlittle)insights.Manyleadingorganisationsrecognisethatharnessingdatarequiresaspecialblendof talent and technology – man and machine – to create themagicofbreakthroughinsights.

Humans can do many things really well, things that machines have yet to master: visual feature detectors foranalysingadjacencyandsymmetry;andcontextual,

symbolic, and idiomatic semantic analysis for sentimentandmeaning.Empoweredbyvisualizationtools, the human mind can also carry out initial pattern discovery and supervise cleansing, correlation, refinement, and anomaly identification. Machines are suited for pattern mining, running complex analytical models, and exposing possible insight areas inafeedbackloopwiththeirhumancounterparts.The cycle of consistent refinement is important – supplementing sophisticated programmatic learning with human experience to discover the potential of your data assets.

Theimportanceofhumanthinkingtocombinedataand technology is significant – as many organisations have learned – and the talent is in short supply. FindingdatascientistsanddataprofessionalswithbothITandline-of-businessknowledge(e.g.,supplychain,claims,customer)canbefrustratinglydifficult.Infact,HarvardBusinessReviewrecentlycalledthedatascientistthe“SexiestJobofthe21st Century.5”Experiencedprofessionalsinthenewinformation landscape are similarly scarce across various disciplines: storage, transmittal, mining, visualisation, automated heuristics, and predictive modeling.Publicityaroundanalyticsinthe2012U.S.presidential election has further raised the profile of – and demand for – advanced pattern discovery6.

Big data alone, however, creates no new value ifitdoesn’tleadtoinsights–aboutquestionsyou haven’t answered before, or perhaps more importantly,aboutquestionsyoudidn’tknowyoucouldask.Forthat,you’llneednewwaystocaptureand explore data, to enrich data and to interact with data. You should also identify new patterns in areas you’ve never explored, anticipate potential value and insights, and zero in on specific crunchy questionswhoseanswerscanliftperformanceandcompetitiveness.Manandmachine,workingtogether, to find the face of your data.

Page 53: Deloitte Tech trends 2013 report - Feb 2013

52

History repeating itself? Finding the Face of Your Dataisanevolutionoflong-standingresearchpractices–includingsense-making,artificialintelligence,ontology,machinelearning,patternmatching,andvisualisation.Italsorepresentstheculminationofenterprise data disciplines – from data management to information automation to business intelligence. Beyond core technicaladvances,adifferencein2013isthereadinessofthebusinesstoexploreadvancedinformationtechniques–andcombinethesefoundationalelementsintoadeliberate,multi-tieredapproach.

FindingtheFaceofYourData

What were the challenges? What’s different in 2013?

Data mining • Was focused primarily on internal structured data with early exploration of external unstructured data.

• Outcomes were focused on inventorying andcataloging;build-outofmetadata,tagging, and taxonomy is important, but onlyvaluableiftheground-work is harnessed for business insights.

• Recognitionthatfourdimensionsofdata–internal,external, structured, and unstructured – are valid assetcategories;miningeffortsexpandingacross all data universes.

• Tagging evolves into taxonomy discovery and opens new insights to both structured and unstructured data.

• Emergenceofpatterndiscoverytechniquesgoesdeepin structured, unstructured and the seam in between –semi-structured.Discoveringnewanswers,andevennewquestions.

• Domain experience has been recognised as indispensableinguidingdiscovery–withrequisiteskillsaddedtoeffortsforcontextandguidance.

Big data • Hundreds of terabytes of information are produced each day across internal and external data sources. Organisations are struggling to decide what data to enter,andhowtodeterminedataquality,persistence, and archiving strategies.

• Ethicalandlegalrepercussionsare oftennotwellunderstood.Isthereassumed liability if insight was available in data that was analysed? Does it matter if the insight was discovered or not? Are you obligated to report information that was discovered, even if it was not related to the originalquery?

• Hundreds of vendors – both new and old guard – are aggressively investing aroundbigdata.Beyondmarketconfusion,thelackofreferencearchitecturesandleading practices has helped curb adoption.

• A talent shortage has limited the benefits organisations are seeing from early investments. Because organisations don’t have history with big data, it is challenging toknowifanidentifiedpatternisananomaly or truly a trend.

• Sector-specificleadingpracticesareemerging,loweringcomplexityandthesubsequenttalentlearning curve – while providing precedents for legal liability and compliance implications.

• Universitieshavenewcertificationanddegreeprograms for big data disciplines.

• The mixed approach of human governance and automated pattern mining can provide an effective balance, allowing controlled tactical responses to be autonomously triggered, while allowing human counterparts to combine pattern discovery with traditional analytics and business intelligence to informmorestrategicdecisionmaking.

Analytics • Analytics remains a huge opportunity area, but many companies are still struggling with foundational data management layers – and find themselves struggling to generate operational reporting, much less predictive and prescriptive analytics.

• Confusionaroundtherelationship betweentraditionaldatatechniquessuch as data warehouses, business intelligence, and operational data stores versus emerging topics such as big data, visualisation, and machine learning has contributed to stalled investment momentum.

• Coredatamanagementdisciplineslieattheheartof Finding the Face of Your Data. They can also accelerate analytics adoption.

• Growing understanding about the complementary nature of traditional data disciplines, big data, visualisation,andanalytics.Withadoptionwilllikelycome industry standards, leading practices, and reference architectures to further clarify relationships andinter-dependencies.

Page 54: Deloitte Tech trends 2013 report - Feb 2013

532013 Technology Trends – Enablers

Technology implicationsDiscoveringusefulpatternsinbigdata–andknowinghowtoexploitthem–oftenrequiresabaselineofdataquality,governance,andstewardshipoftherawinformationassets–aswellastheabilitytounderstandandcorrelate relationships between data sources. “Garbage in, garbage out” remains a truism – and can undermine effortstoempowerdiscovery,automatedecision-making,andtakeadvantageofhumanintuitionandinsight.

FindingtheFaceofYourData

Topic Description

Data governance Taxonomiesandrelationshipsarecriticalforunderstandingdatasources.Crawlersandknowledgediscoverytoolscanhelpcategorisedatasourcesbothwithinandoutsideofcategoriseboundaries.Hadoop,HPCC,Disco,andotherdistributedsystemsallowfordatacaptureatspeedsappropriateforthedatasource–batchorreal-time,asynchronousorstreaming. Detailed data processing is possible to change, refine, aggregate, analyse, and report during transmission – allowing relevant signals to be persisted and acted upon, bypassingtorrentsofextraneousdata.Inadditiontotoolsfordiscoveringandsharingcoredataattributes,cleansingandstewardshipshouldbeenactedfordataqualityandintegrity.Solutionsvaryfromhighlyautomatedtopredominantlymanualscrubbingandupkeep.

Methods, modeling, and statistical data professionals

Manyorganisationswilllikelyneedtosourcedatasciencetalentfromoutsidethebusiness–especiallyinearlystagesofadoption.Whilebusinessdomainexperienceisequallyimportantand may be found within the company or industry, advanced mathematical, statistical, and computingskillisalsooftenrequired,includinginnaturallanguageprocessing,informationretrieval,knowledgerepresentationandreasoning,machine-learningtechnologies,andcognitive computing.

Master data management Understandingrelationshipsbetweenmasterdataentitiesacrossandbeyondtheorganisationiscriticaltoidentifyingadvancedpatterns.Techniquescanbeassimpleasmanaginglook-uptablesorassophisticatedasprobabilisticmatchingalgorithmsandbidirectional automated maintenance of updates across systems of record. But without correlation of master data, associations could be missed – leading to incomplete or incorrect conclusions. Availability of shared digital identities can help simplify master data disconnect –eitherinternally,orusingcommonsocialplatformidentifierssuchasLinkedInprofilesorFacebookConnectauthentication.

Data architecture This involves the physical manifestation of data governance and master data relationships. Newcapabilitiesinbigdataandanalyticsintroducenewtoolsandtechniques–includingin-memorycomputing,appliance-basedhardware/softwarecompositesolutions,distributedcomputing,andnon-relationalandcolumn-baseddatabases.Compression,archivingstrategies,andsourcingoptions(includingvendorsandcloudversuson-premisesolutions)can further complicate the picture.

Visualisation Visualisationtoolsallowtheanalysisofunstructureddata,withinteractivitytoexplorehighvolumesofmulti-dimensionaldata.Approachesvary–fromcustomframeworkstoallowcustombuild-outofHTML5ornativemobilerenderings,toprepackagedtoolssuchasClickview,Microstrategy,Spotfire,andTableau.

Flows versus stocks The velocity characteristic for big data – sometimes called “fast” data – has implications forthenetworkaswellasforrawprocessingspeed.Theemergingneedistoprocessflowsversusstocks.Thatis,extractinginsightsandsignalsfromdatastreamsinnearreal-timeinsteadofstoring“everything”forlaterconsideration.Combinedwiththebasictransmittalchallenges of unstructured data types, such as video and raster image, there are still fundamentaltechnologychallengesinthedatacenter,thecorenetwork,edgeand contentdeliverynetworks(CDNs),andlast-mileandhigh-bandwidthinterconnects.

Page 55: Deloitte Tech trends 2013 report - Feb 2013

54

Lessons from the frontlinesWinds of changeFromtrackingcrimestatisticsandreportsofgraffititobuildingpermits,thecityofChicagohascollectedenough data to fill more than 400 servers in its multiple data centers scattered through the city8. And now the city is pulling together their data sets intoonepublicplatformtofindnewwaysofmakingthe city a better place to live.

The city began building a massive data portal, using primarilyopen-sourcesoftware,pullinginunstructureddatasuchasreal-timetranscriptexcerptsfrom911and 311 calls, as well as structured data from disparate systems across 30 agencies and departments. The goal of the portal is to give city officials a way to combine data from different agencies to reach new conclusions. Forexample,ifcrimeistrendingupinonearea,analystscanlookforcausalfactors,suchasthe densityofliquorlicensesorchangingpatternsof policeprotection.Cityofficialscanthenusethedata topredictandpreventnewproblems.Forexample,one investigation revealed that garbage cans in a particular zip code often disappeared when the alley lightswentout.Ifthecitycouldreplacealleylightsmorequickly,theycouldavoidhavingtoreplacegarbage cans as often9.

The data portal has the added benefits of increasing governmental transparency and enhancing its ability todeliverservicesinatimelymanner.Forexample,the city analysed what information is most often requestedusingtheFreedomofInformationAct(FOIA),andpublishedthosedatasetsfirst.Toincreaseaccountability,thecitybuiltthePublicPerformanceManagement Dashboard to evaluate how well each department delivers services. Built using feeds from the portal, the dashboard is already helping some departmentsmakeimprovementsinoperations10.

The city is continuing to develop the platform over the next couple of years and has already seen progress in soft metrics, such as increased public trust and collaboration with the developer community.

A prescription for insightRecombinant11 began as a company focused on cohort identification for health care systems – identifying patients with specific characteristics needed forclinicalresearchstudies.TheRecombinantteambuilt a practice on the implementation and extension of i2b2, an open source software application funded by the NationalInstituteofHealththatprovidesclinicalandresearch analytics.

Whileworkingwithpharmaceuticalcompanies,Recombinantrealisedthatanalytictoolsbeingusedbyhealth care systems could also be used to improve clinical trials.Pharmaceuticalcompaniesfacemanyofthesameproblemsashealthcaresystems,notably,thatworkisbeingcompletedinsilos.Forexample,adrugmaybetested in clinical trials for both rheumatoid arthritis and psoriasis – but the data from the clinical trials for the two diseases aren’t analysed together or with outside data setstoidentifydeeperinsights.Recombinantusedi2b2to create a database that added genomic signals to the clinical information with the goal to identify correlation signalsinsidelargedatasetsandtocreatedataliquidityacrossstudiesandwithinanorganisation.Recombinantthen extended the platform for use at multiple pharmaceutical companies under a new open source projectcalledtranSMART.

RecombinantiscontinuingtoworkwithclientstoextendtheapplicationsoftranSMART.Forexample,acompanymay want to conduct new studies for drugs that fail to gainFDAapproval.SayadruggetsapprovedinPhaseIandIIofclinicaltrials,butfailsPhaseIIIbecause5-10%of patients benefitted and many experienced side effects. tranSMARTcouldbeextendedwithrelevantdatasetstoidentifypredictivebiomarkersthatwouldhelpidentifypatientstoincludeinthenexttrialwhowouldlikelysee desired results with the drug. By discovering hidden patterns in the biological data, the next trial could benefit 90% of patients with adverse side effects for 2%. This could rescue and reposition the previously failed drug and provide patients with a new drug to fight their disease.

Computersaregreatatdetectingpatterns, butthesestudiescomewithariskoffalsediscovery.Bioinformaticists and other experienced team members are critical. They can determine what signals are valid and reproducible, and refine the analytics in way in whichcomputersaren’tcapable.Pharmacogenomicpattern discovery is a new discipline for the pharmaceutical industry and opportunity abounds for those who embrace it.

FindingtheFaceofYourData

Page 56: Deloitte Tech trends 2013 report - Feb 2013

552013 Technology Trends – Enablers

Surveying the data landscapeWith a commitment to customer service, American Expresscontinuouslylooksforwaystoenhancetheircustomers’ experiences with their products. The Global Advertising and Brand Management team at American Expressadministersasurveytoitscustomerswhichessentiallyasks,“Howlikelyareyoutorecommend our products to others?” The survey contains both structured data and unstructured data in the form of comments about customers’ experiences with its products.AmericanExpressusesthesurveydatato drive product changes to continue to meet their customers’ needs.

Customercommentsrangefromhigh-levelthoughts to specific, detailed experiences with a product. Untilrecently,thecompanythatadministeredthesurveyonbehalfofAmericanExpresswasmanuallyreviewinghundreds of thousands of survey responses. The process wastime-consumingandsometimesspecificinsightsandtrendswereoverlookedduetothevariationwithwhich employees at the company interpreted comments fromaroundtheworld.SoAmericanExpress’RiskandInformationManagementteaminvestedinbigdatainfrastructureandinnovativetextminingtechniquestoimprovetheprocess.Theyshortenedthetimerequiredtoconducttheanalysisofsurveydatafromweekstohours.

Automating the survey analysis with text mining techniques,AmericanExpresswasabletomore quicklyprocesssurveydataandidentifynew patterns in customer experiences such as cardmembers’ appreciation of features and services that help them improve the management of their personalfinances.Aself-servicetooldevelopedfortheMarketingorganisationallowedthemtosee,first-hand,generalcustomerpreferencesataspecificmoment as well as how those preferences changed overtime.Addingvisualisationtools,AmericanExpresswas able to see trends in the data that are leading them to build products that fit customers’ changing needs.AndalthoughAmericanExpresshasonlyusedthistechniqueforcustomerproductsurveydata,the method is scalable across the company’s other services, such as travel, rewards, and corporate cards.

FindingtheFaceofYourData

Page 57: Deloitte Tech trends 2013 report - Feb 2013

56

FindingtheFaceofYourData

AtJPL,wehaveafundamentalphilosophythat“IT”shouldstandfor“InnovatingTogether.”ThejobsoftheITleadersaretoprovidetheenvironmentforthattohappen–whereouremployeescanworkwithvirtuallyanyone, from anywhere, with any data, using any device, at any time.

Consumer-drivenIT,bigdata,andmobileareimportantfactorsforourincreasinglyIT-savvyusers.Byaddingpervasive cloud and immersive visualisation and interaction,wehaveaformulaforInnovatingTogether.Whentalented,curiouspeopleinteractwithhigh-Vdata(highvolume,velocity,and/orvariety)inhigh-performingcollaborative environments, they can discover valuable newthings(thefourthVisforvalue).Assembleateam of scientists from different disciplines such as oceanographers, climate change specialists, statisticians, aerospace engineers, and economists – either in person orvirtually–andtheywilllikelyuncoverinsightsthatwouldn’t otherwise be found. Human behaviour is what really drives analytics – the computers bring the data to the people who can sense the results.

Thechallengeisthatthesemulti-disciplinaryteamsshould include data scientists – individuals who can teach the data to tell an interesting story we didn’t alreadyknow.Theseareindividualswhocanlookat data – both structured and unstructured – manipulate it, use data mining and machine learning capabilities, determine statistical relevance, and then model and communicate the results so that others care. That’s a tall order for one person – and so the data scientist may actually be a group of people.

Weusedthismulti-disciplinaryapproachatJPLandcreated collaboration centers, which are essentially “ConferenceRooms++.”Forexample,wethoughtitwas about giving visualisation tools to our mechanical engineers, but they were already accustomed to translatingblueprintsintothree-dimensionalimagesin their minds. Those who really benefitted from the visualisation tools were the electrical and propulsions systemsfolks.Withthevisualisationtools,theteamwas able to see the same thing together, enabling breakthroughinsights.ThetrueBig Value from Big Data cancomewhenweprovidereal-timevisualanalyticstoco-locatedspecialistsfromdifferentdisciplinesandletthem innovate together.

Tom SoderstromITChiefTechnologyOfficer,OfficeoftheCIOJetPropulsionLaboratory(JPL)

My take

Foroutreach,weputinformationinpublicclouds in order to share interesting information about NASAandscience.We’vealsodonemission-criticalworkthisway,puttingMarsExplorationRoverdatain the cloud to assist scientists all over the world to collaboratemoreeffectively.Itwassecure,andsavedus an order of magnitude on cost and two orders of magnitude on response time – which is critical when you can only communicate with spacecraft once a day.

IfIweretogiveadviceonthistrendtoothertechnologyexecutives,Iwouldfocusonfourthings:

1.Redefine“IT”asInnovatingTogether. WehaveunexpectedlyIT-savvypeoplewithin ourorganisations.Forexample,wehadalibrarianwho turned out to be a closet developer and made publications collaboratively available on tablets. Ifyoutapintothoseskills,bothcustomersatisfactionandoverallproductivitycanskyrocket.

2.UseInnovatingTogethertomakeITaconsultingarm to the business. A customer focus and a consulting mindset can result in solutions that areco-createdandfitforuse.It’softeneasierforan end user to convince another end user that a solutionisgood.Usingthisapproach,wecangetmany prototypes going simultaneously.

3. Start with analytics in a novel way – maybe somethingmobile–anddevelopahighReturnonAttention(ROA).Especiallywhenprototyping,an investment is often worthless unless you have attention from interested users. Once you have results somebody cares about – once you have their attention – funding further investment is straightforward.

4. Get started. There are many startups now with resourcesforbigdata,andthereislikelytobeconsolidation later. Don’t wait on the sidelines for the “perfect” tool. Strive to learn from fast failures to create lasting achievement. Be nimble, avoid big bets,andyou’llbemorelikelytosurviveandthrive.

Page 58: Deloitte Tech trends 2013 report - Feb 2013

572013 Technology Trends – Enablers

Flying car futureMakingthemostofbigdatarequiresastrongfeedbackcycle between human analysts and automated engines – allowing manual manipulation and evaluation of new andevolvingdatasets,andconsistenttweakingoftheunderlying machine learning, associated models, and results thresholds.

The future appears to be heading toward advanced natural language processing, semantic analysis, andcognitivecomputingthatwilllikelyreducedependencies on the human operators and scientists. Ambient, continuous analysis, and refinement – withbackgroundscenarioplanning,knowledgeengineering, pattern detection. As context, biases, andnon-linearrelationshipsareidentifiedthroughsemi-autonomouspatterndetection,self-learningwilllikelycontinuetobuildataxonomyandontologyableto achieve goals in pattern discovery on the first try – without offline intervention or guidance.

Willartificialintelligenceandknowledgediscoveryreplace the need for human intervention and judgment? Notanytimesoon.Thatsaid,consumersolutionslikeSiriand Google Now are already demonstrating the power of natural language processing – allowing business users toaskconversationalquestionswithoutasophisticatedknowledgeofthehuman-machineinterface. These solutions are limited by the small number of data sources and services available to inform context andcontentofanswers.Fast-forwardtosimilarsystemswith broad data and service access. When coupled withcognitivemachine-basedlearningalgorithms, the potential can boggle the mind.

Which leads us to the real flying car future. Onewherebehind-the-scenes,prescriptiveanalysiscandrivenotjustdecision-support,buttransactionalexecution for an increasing number of business processes.Liketheauto-pilotontheairlines,ahostof core services across sales, finance, manufacturing, andcustomerservicefunctionscantakeadvantageof trusted autonomous processing, creating an autonomicnervoussystemforthebusiness.Userscanshift their focus to a very broad range of information available for a highly specialised domain specialist to explore using voice and gesture controls – where a dizzying combination of machine learning and raw statistical analysis is being delivered across zetabytes ofdatatosmoothlyrenderresultsinreal-time.Thinkofasymphonyconductor–onesurroundedby potential relationships and data patterns instead of musicians, allowing insights to be uncovered to refine the automated core, or lead to more significant strategicshiftsaccordingtomarketdynamics.

One byproduct of increasingly autonomous systems ismachineethicsandmorality.On-the-flydecisionswillrequireacombinationofpre-scriptedbusinessrules and tolerance thresholds, and confidence for the machine to interpolate desired action for unprecedentedencounters.Aself-drivingcarmayneedtomakeadecision:doIhitthechildwhodarted in front of me or swerve into oncoming traffic?12 The soul of the machine will inform the character of the business as much as it will drive itsperformanceinthemarket.

FindingtheFaceofYourData

Page 59: Deloitte Tech trends 2013 report - Feb 2013

58

FindingtheFaceofYourData

Where do you start? InformationhasbeenthewhitewhaleofthelastdecadeofITinvestment,butfeworganisationshave mastered core data management across the enterprise–muchlesshigher-orderdisciplineslikebusiness intelligence, visualisation, or advanced analytics. Does that mean you shouldn’t press forward? Hardly.

Couplingdatascientistsandmachinelearningwithvisualisation and other data interaction tools can allowtimelyresultswithlessinfrastructurebuild-out–andgivesahighertoleranceforerror.Imperfectionsof data sources and the limitations of machine learning are hedged by intuition and cognitive insights of human counterparts. Technology advances allow for data crunching that would have crippled sophisticated servers just five years ago. Some specific areas to start the journey:

• Stackthedeck. Don’t play without talent. Start with business domain experience – people to help inventory and categorise the information assetsatyourdisposal,understandline-of-businesspriorities,andworkwithtechnologyspecialiststodetermineshort-andlong-termneeds.

• Looktothesource.Finding the Face of Your Data begins and ends with data sources. The problem is thatthosesourcesareoftenanunknownquantity.You should understand not only your own data, butalsothethird-partysourcesavailabletosupplement and extend your own purview. Opensource,governmental,andsubscription-basedfeedsmayprovidecrucialmissinglinkstodiscover new patterns and insights.

• Starttheclock. Big data projects can spiral incomplexityandscope.Identifyingsources,integrating the data, massaging the data, running models, and creating visualisations and reports can exhaust an enthusiastic business sponsor’s appetite. Start small – delivering something quicklybeforethebusinessusersloseinterest.

• Manageexpectations. Trying to launch this effort withenterprise-wideplanswouldlikelybedaunting.Choosespecificdomainsinwhichtobegin (e.g.,customer,product,pricing,risk).Focuson places where your available people are most knowledgeable.Insteadofdealingwithhypotheticalsuper-sets,focusontangible,boundedfocusareas.Runsomeexperimentstotestthedataanddeliverresults. But once the scope has been anchored, don’tlimityourselftojustonedomain.Investigateseeminglyunrelateddatasets.Youneverknow wherean“aha”relationshipmaybelurking.

• Goodhygiene.Big data is still data, and you’ll still needdatadisciplines.Coredatamanagement,masterdata management, integration, and stewardship are important – even if only for the small domain slices upon which early initiatives are sighted. This is the structuralfoundationforfutureefforts.Enoughofastrategic roadmap should be laid out to monitor that short-termenablementisinlinewithlong-termvision.

• Stayontarget. Before you can determine the right questionstoask,you’llneedtoilluminatethepossiblequestionsthatcouldbeanswered.Thendefinerelative priorities and associated metrics to assess what changes could be enacted based on insights. Earlyfocusshouldbeonareasthatinvolvenomorethanfirst-orsecond-degreeinferentialanalysis.

Page 60: Deloitte Tech trends 2013 report - Feb 2013

592013 Technology Trends – Enablers

Bottom lineInformation as an asset is moving rapidly to the forefront of the business agenda. From basic analytics to sophisticated visualisation. From taking advantage of big data to pattern discovery and sense-making. Despite many advances we remain a long way from completely automated discovery and contextual analysis – from having analytic driven decision making across the business as whole. Machines are very good at finding patterns, but we still need humans - augmented by visualisation tools - to determine real meaning and value by providing context and helping translate analytic outcomes into business outcomes.

In Finding the Face of Your Data, we are building on the foundational elements of previous cycles and trends, while recognising the importance of balancing people, data and computing to discover questionsthatpreviouslycouldn’tbeanswered–orevenasked.Thegoalremainsthesame:data-driven decision making, with higher speed-to-value.

Anthony Viel, National Managing Partner, Deloitte AnalyticsTim Nugent, National Lead Partner, Enterprise Information Management

FindingtheFaceofYourData

AuthorsVikram MahidharDirector,DeloitteLLPvmahidhar@deloitte.comVikramMahidharisaDirectorinDeloitteLLP’sinnovationgroup,whichfocuseson the development of next generation business intelligence products and services comprising big data, semantic intelligence, analytics, and mobile.

David SteierDirector,DeloitteConsultingLLPdsteier@deloitte.comDavidSteierleadstheDeloitteAnalyticsSolutionsGroup.Usingadvancedanalyticandvisualisationtechniques,David’steamofspecialistshelpclientsacrossavarietyof industries to solve complex technical problems.

Endnotes1 Kelly,J.Big Data Market Size and Vendor Revenues.RetrievedDecember11,2012,fromhttp://wikibon.org/wiki/v/Big_Data_Market_Size_and_Vendor_Revenues

2 CBInsights.Big Data Companies Pull In $1.1B from Venture Capitalists Since Q2 2011.RetrievedDecember11,2012,fromhttp://www.cbinsights.com/blog/venture-capital/big-data-companies-venture-capital-fundinc

3 Brian Gentile, Why Are B2B Social Media Firms So Hot?,http://mashable.com/2012/06/19/big-data-myths/(June19,2012).4 ACID:Atomicity,Consistency,Isolation,Durability5 ThomasH.DavenportandD.J.Patil,Data Scientist: The Sexiest Job of the 21st Century, http://hbr.org/2012/10/data-scientist-the-sexiest-job-of-the-21st-century(October2012).

6 Michael Scherer, Inside the Secret World of the Data Crunchers Who Helped Obama Win,http://swampland.time.com/2012/11/07/inside-the-secret-world-of-quants-and-data-crunchers-who-helped-obama-win/(November7,2012).

7 StuartK.Card,ThomasP.Moran,andAllenNewell,The Psychology of Human-Computer Interaction (UnitedStates:LawrenceErlbaumAssociates,1986).

8 YevgeniySverdlik,Chicago CIO: Big Data for big-city problems,http://www.datacenterdynamics.com/focus/archive/2012/10/chicago-cio-big-data-big-city-problems(October22,2012).

9 Ariel Schwartz, 5 Outside-The-Box Ideas To Change U.S. Cities For The Better,http://www.fastcoexist.com/1680855/5-outside-the-box-ideas-to-change-us-cities-for-the-better

10 Brett Goldstein, Chicago’s Smarter City Transformation,http://www.socrata.com/discover/chicago-open-data-webinar-transcript/(April26,2012).Transcript

11DeloitteacquiredRecombinantDataCorp.inOctober2012.PressRelease:http://www.deloitte.com/view/en_US/us/press/Press-Releases/3a04a4722c89a310VgnVCM2000003356f70aRCRD.htm

12 Gary Marcus, Moral Machines,http://www.newyorker.com/online/blogs/newsdesk/2012/11/google-driverless-car-morality.html(November27,2012).

Page 61: Deloitte Tech trends 2013 report - Feb 2013

60

Gamification Goes to Work7

Moving beyond points, badges, and leaderboards Leveling,point-tracking,andbonusescanrecogniseandrewarddesiredactivity.Leaderboardsandprogressionindicators can steer individuals to the next tier of personal and business performance. Quests and countdowns can shapebehaviour.It’sallpartofgamification–andit’shaving a real impact on businesses worldwide. Gartner predicts that by 2015, 40% of Global 1000 organisations will use gamification as the primary mechanism to transform business operations1. Unfortunately,manyearlyeffortsnevermoved beyond tactically layering on points, badges, and leaderboardstopocketsofthebusiness.Infact,Gartner predicts that by 2014, 80% of current gamified applications will fail to meet business objectives primarily due to poor design2. Gamification’s potential is much bolder – systematic adoption within and across the business, tightly integrated with the core systems thatdrivefront-andback-officefunctions.

Gamificationcaninstillchallenge,pay-off,andnewperspectiveintoday-to-daytasks,tappingintothesamehuman instincts that have led to centuries of passionate competition and engagement – our innate desire to learn, to improve ourselves, to overcome obstacles, and to win. As business becomes increasingly social, our professional and consumer lives are being built using digital interactions. This momentum can be tapped to augment performance by embedding gaming mechanics intotraditionalprocesses.Technologyintheworkplacecanberewarding,and(gasp)evenfun.

Increasingindividualengagementinwork,team, and outcomes is a common business goal, and games have demonstrated to be one of the most influential teaming and communication activities across generations and cultures. Organisations can harness gaming principles to improve morale, influence behaviour, and get stakeholderspassionatelyengagedineverythingfromfinance,sales,HR,manufacturing,andmore.Usingthetransparent rules and boundaries that come with gaming, organisations can accentuate compliance and leading practice adoption by aligning game objectives with the desired outcomes of the enterprise. Or, more powerfully, to have gaming mechanics almost imperceptible to the user, who instead find themselves incented to find new waystoteam,towork,andtodrivebusinessoutcomes.

One important ingredient in gamification is identifying potential users and related use cases, then understanding their progress paths – the narratives that define growth from novice to star performer. That way, incremental challenges can be defined to steer personal growth. Ingames,thenextdesiredactionisusuallyclear. Howcanthatsamethinkingbeappliedinbusiness? Gamification provides immediate indications of goal achievement.Amoveinagameprovidesreal-timefeedback.Youfindyourkingincheck.Yourescuetheprincess. You collect the last gold coin and complete the level.Inmanybusinesses,however,muchoftheactivityonthepartofemployeesandcustomerswilllikelygounnoticed or, if noticed, unrewarded.

Many games also have a social element. Similarly, gamification efforts should tap into social connections to spur engagement through competition and providesupportchannels.Increasingcommunication,collaboration, and sharing ideas across your social business should be an explicit objective of gamification.

Finally,gamificationshouldbetakenseriously. Gamedesignisasmuchartasscience,requiringabalanced blend of game mechanics and a deliberate approachtodefining“win”conditionsthatcanworkacrosstherangeofpersonalitytypesinyourstakeholders.Ill-conceivedinitiativeswilllikelyhavereverseeffects–wherethefocusshiftstogamingthegameitself.Inonescenario,thatmeansemployeesmaytakeadvantageofloopholesorpoorgamemechanics.Inanother,theymayactively sabotage the game or their “competitors,” whoaremostlikelycolleagues.

Historically,gamificationhasbeenconsumer-driven. M2Researchreportedthatin2011,91%ofthegamificationmarketwasconsumer-drivenandonly9%enterprise-driven3. But it can be much more – systematic, integrated, and a driver of enterprise engagement. Andinfact,M2Researchestimatesthatbytheendof2013, game design within the enterprise will become the dominant segment of gamification4. The essence of gamificationisanewwayofthinking,designing,andimplementing solutions – and it may even force you to startthinkingofyouremployees,partners,andsuppliersas consumers. Many organisations are already moving to putgamificationtowork.Movenowtosecureyourplacein the winner’s circle.

Page 62: Deloitte Tech trends 2013 report - Feb 2013

612013 Technology Trends – Enablers

History repeating itself? Games, challenges, and competitions have been consistent features of human society. Similarly, companies have longtriedtomeetobjectiveslikeengagingclientsorencouragingemployeestoworktogethermoreeffectively.Despite a compelling case for how embedding gaming mechanics in business can benefit these corporate goals, the history of effective gamification is just beginning. That’s because it is difficult to entrench gamification firmly withintheorganisation.Effectivegameprinciplesoftenrelyondeepandaccurateunderstandingofinternalorganisationalworkings,aswellastheneedsofcustomersexternally.It’sultimatelyaculturalchange. Overcoming this barrier may be critical in 2013.

GamificationGoestoWork

What were the challenges? What’s different in 2013?

Behavioural economics • Behaviouraleconomicshascaughttheattention of a number of industries. Principlesincludenudgetactics,gradualengagement, and framing. These principles seektoapplybehaviouralchangesbasedon how choices were presented to people. A limitation of behavioural economics hasbeennotacknowledgingthe effects of customers’ and employees’ socialnetworks.

• Gamificationshiftsthefocusfromjustbehaviour,to behaviour and experience. Behaviour economics try to affect an outcome. Gamification aims to design a journey that evolves, engages the participant, and tries to create a sense of fun. This ties in well with the general shift from product interface to user experience in the corporate world.

Early gamification efforts • Earlygamificationeffortsfocusedonsingle,non-gameprocesses.Commonexamplesweremarketingteamsusingitasatechniquetoattractandretaincustomers,orHRusingittosupplementperformancemanagement processes. However, the number of players and scope of activities that had been monitored and shaped was limited.

• Datacollectionisinplaceinmanyorganisations;manyalreadycollect click-levelbehaviour,butitwasrarely usedtotriggerfeedback,feedrewards, or guide personal growth.

• Gamificationseekstounifyanindividual’svariouspersonae to guide growth, behaviour, and engagements.Isolatedinstancescanbeeffective,but a broader, integrated approach can give a richer view of performance and incentives, and can yield more than incremental improvements.

• Points,leaderboards,andbadgescanstillbevaluable.Butfirstorganisationsshouldtakeahardlookatobjectives,processes,solutions, andplayers–feedbacksandrewardstieddirectlyto the employee, customer, or consumer.

Process engineering • Processengineeringshareshistoriclinkswithsystemsthinkingandmanagementscience. Over the years, however, process engineering has often been misinterpreted bymanagement;co-optedbyexecutivestodesign and enforce processes with austere rulesetsthatseektoallowthem to command and control.

• Gamificationhastheopportunitytoincreasethevisibility of processes within an organisation and acrossitsvaluenetwork.Itcanincorporatethereal experience of interacting with colleagues, customers, and suppliers such that players have a far deeper feel for their roles and the roles of others.Itmakesvisiblethecompetingobjectivesof various departments and facilitates an equitableoutcome.Inshort,therealsystemcanbemadevisible.Gamificationacknowledgesthattherearethosewhowouldseekto‘game’thesystem,andincludesthisinthereckoning.

Simulation and serious gaming

• Forseriousgaming,practitionersinnon-entertainmentfieldssawpotentialindeveloping heavy business simulations and war-gamingapplicationsassophisticatedmodels to emulate complex behaviour. However, there is a high barrier to entry, asaseriousgameislikelyonlyasgoodasitsunderlyingrulesandmodels.Inaddition,these simulations are more apt to be point-in-timestudiesindedicated, “safe” environments versus integrated withrealworkprocesses.

• Seriousgamingcontinuestobeaneffectivetrainingandriskmanagementtoolforseveralindustries and business functions. However, gamificationlookstotakegamingprinciples from the walled garden of a simulation intoday-to-dayoperations,affecting (andunderstanding)employeeandcustomerengagement, and behaviour as business is conducted.

Page 63: Deloitte Tech trends 2013 report - Feb 2013

62

GamificationGoestoWork

Technology implicationsAs gamification expands, organisations should embed game elements into core systems and processes across thebusiness.Thishasfar-reachingimplications–forsecurityandprivacy,integration,data,andsocialplatforms.Butpenetrationwillnotlikelybeimmediate.Alayeringapproachshouldbeapplied,wherefocusandpaceofadoptionislikelytodifferbyindustryandindividualcompanydynamics.

Topic Description

Game mechanics platform The success of game element deployment lives and dies within the design and user experience of the game itself – the underlying rules engine, event monitoring and triggering, and an engaging user interface to drive player behaviour. A number of solutions have emergedthatprovideplug-insorthird-partyservicesforpiecesofgameelements. Many organisations are also building their own – tightly aligned with policy engines and digital content management systems for consistency and ease of maintenance.

Social business Gamesareinherentlysocial.Sogoesgamifiedbusinessprocesses.Integrationintocollaboration and social enterprise tools is important for internal efforts – sharing motivation,creatingsupportmechanisms,andtappingintoexistingreal-worldrelationships.Additionally it can circumvent hierarchies to bring diverse teams together to do their jobs differently.Hooksintopublicsocialmediaplatformsareequallyimportant–forenterpriseconnectivity, as well as for authentic interaction with customers and third parties.

Integration Forgamificationtotrulygotowork,itislikelytorequiredeepintegrationwithenterprisesystems.Gamemechanicsarefueledbyfeedbackandrewards–requiringvisibilityintoindividuals’day-to-dayactivities.ExposingtransactionsanddatafromunderlyingERP,customer,andanalyticssolutionsisachallenge,particularlyifgamificationwillbeexternalisedorcentrallymanaged.Equallychallengingisembeddinggamificationelementsinto the native logic of current platforms. The challenge for designers is to determine the platforms through which the system or business process will manifest. The complexity canincreaseforglobalormultinationalcompanieswithlanguage,cultural,market, and infrastructure nuances in each geography.

Cloud and open external systems

Withthetrendtowardshyperhybrid-cloudsandopenAPIs,organisationsshouldhaveclearly defined policies and governance structures to accommodate flexible application portfoliosthatembracegamification.Itislikelyonlyamatteroftimebeforecustomers andstaffstarttodeploytheirownapplications–bringyourownapplication(BYOA). This essentially gamifies the enterprise application build and deployment process.

Big data and analytics The current use of badges, virtual gifts, rewards, leader boards, and the social commentary that accompanies the implementation of these game dynamics often results in a sizeable increase in the amount of data that is available both internally and externally for an organisation to analyse. You should develop a data taxonomy system that allows meaningful tags. Once established, this data can be used to determine behavioural, business, product, and organisational patterns that – if acted upon – may lead to a more agileorganisation.Thestorage,privacy,andaccessibilityoftheselargedatasetsarelikely tocontinuetochallengetheCIOandthegovernanceofficerswithinanorganisation. Finally,whatgetsmeasuredusuallygetsdone.Newbusinessintelligenceandanalyticscapabilities should be stood up for visibility into desired business outcomes – to help fine-tunethegamificationelements,aswellastounderstandtheeffectivenessoftheeffort.

Mobile Withtheubiquitousnatureofthemobilephoneandtheadoptionofbringyourowndevice(BYOD),workersareoftennolongerdesk-bound.Thisopensupmultiplenewdimensionsofgamedynamicsthatcanbeincorporatedintoabusinessprocess,rangingfromgeo-tagging,video,photo-embedding,andsocialplug-ins.Securityoverwhatispublished,stored,andrecorded becomes critical for brand, reputation, and potentially business continuity. Mobilealsoallowsadvancedtechniqueslikeappointmentdynamics,wherespecificactionsor rewards are available only if a user is in a predetermined physical place at a specific time5.

Page 64: Deloitte Tech trends 2013 report - Feb 2013

632013 Technology Trends – Enablers

GamificationGoestoWork

Lessons from the frontlinesGamifying digital exhaustInstitutionalknowledgeoftenlivesinthemindsofemployees. Bluewolf, a global technology consulting firm, uses gamification principles to entice employees to buildandmaintainapublicbrand,encourageknowledgesharing, and help capture experience.

The company surveyed employees to understand how they interacted with social media, and from that informationbuiltthe#GoingSocialPortal.Thegoaloftheportal is to educate employees on how to use the major socialnetworksmoreeffectively,andtoinstillprinciples for managing online reputations.

Employeeprofilesdisplaybiographicalinformation and include the “digital exhaust” of social media activity, suchasTwitterupdatesandlinkstoauthoredcontent(blogposts,whitepapers,etc.).Theseprofilesweremade public on the company’s website to showcase theknowledgeofemployeestoclients.Tomonitorthatprofiles were created and maintained, the company gamifiedtheuseofpackprofilesbyawardingpointstoemployees for activities such as publishing a blog post. Since collaboration was a critical driver for creating #GoingSocial,eachpackprofilewaslinkedtosocialmediaanalytics.Employeescouldearnpointsbasedonpopularityofcontentthroughclicksandcomments.Specific challenges also netted points, such as the “spread the word” challenge to get employees to use their networksandlinkthembacktothewebsite.Employeesreceived badges and recognition for completing challenges, and if they accrued enough points, they could cash in for rewardssuchasgiftcards,lunchwiththeCEO,ticketstoconferences, and flight upgrades6.

Oneimportantaspectofthe#GoingSocialprogramwas the use of employees to build Bluewolf’s thought leadership.Inthefirstfourmonthsoftheprogram,website traffic from social channels increased 100% and socialtrafficincreased20%.Thecompanysawa57%increase in collaboration through their internal social network,andhasbeenabletomaintainthislevelofcollaboration through continued use of game principles.7

Now serving: an engaged customer baseEngineYard,aPlatformasaService(PaaS)company,needed to increase customer service support to their growing client base. They decided to use gaming mechanicstobuildaself-helpcommunity.EngineYardhad previously been responding to customer issues throughsupporttickets,aprocessthatwasslow.Customersoftenhadtowaituptoafulldayforaresponse – which didn’t help the company with the additional goal of getting them engaged in using their knowledgebaseandforums.

The first step completed was centralising the featurescustomersneededtoanswerquestions,which was accomplished by moving user forums and

documentation into the customer support portal. To monitor that customers would continue to use andrefreshtheportal,EngineYardimplementedgaming technology to reward users. By integrating gamification elements with the customer support portal, customers can earn achievements for specificbehaviours,suchassearchingtheknowledgebase,readingarticles,andcreatingtopics.Userscanalsocompletemissions–whereaseriesoftasksaregrouped together – to win special rewards or badges. As users accumulate achievements or complete missions,theycanlevel-upinexperience. Forexample,ifausercompletesthemissionof finding bugs, they can move from ‘lightning bug’ to ‘fly swatter’ status.

Inthefirsttwomonthsofthegamificationeffort,EngineYardsawa240%increaseinpeoplewho wereabletofindanswerstotheirquestionswithin one minute of starting their search8.Customersgotwhat they needed in a timelier manner, without relying onEngineYard’ssupportteam–whichwasthenableto focus on more complex issues. On average, the numberoftickerspercustomerdroppedby20% andthesupportteamreducedticketresponsetime by 40%9.

Ready conference oneBox,acloud-basedfilesharingplatform,wasplanningaday-longtrainingconferenceforemployees, but they wanted to avoid the typical parade of slide presentations. To help ensure that employees absorbed theinformationandwereabletonetworkamongtheirpeers easily, Box decided to gamify the conference.

Overatwo-weekperiod,Boxdevelopeda platform-neutralwebsitethatwouldappealto theiryoungworkforce.Participantsusedtheirmobiledevicestoearnpointsforansweringquestionscorrectlyduringtrainingsessions.Inaddition,Boxwantedtopromotenetworkingbecausefastgrowthhadmadegettingtoknownewandcurrentemployees difficult. The company created an app to awardpointsforanswerstotriviaquestionsaboutcolleagues, such as “who was a White House intern?” Employeesweregroupedintoteamstopromotecollaboration,andrankingsweredisplayedin real-timeonaleaderboardwithprizesgoingtothe top individuals and top teams10.

After the training, Box was able to use the data gathered in the game to further support operations, improve communications, and reinforce areas where employeesincorrectlyansweredcontent-drivenquestions.Thewebsitealsoincludedasurveyaspartofthegame,whichgaveBoxvaluablefeedbackabout the event11.Bythinkingcreativelyabouttheconference environment, Box was able to transfer knowledgeandpreventpresentationfatigue.

Page 65: Deloitte Tech trends 2013 report - Feb 2013

64

GamificationGoestoWork

Inthetechnologyindustry,whereI’vespentmycareer,ideasareprocessedquickly–from“hotnewidea”to“everybody has this figured out already” and the range in between. Gamification has become a buzzword, for sure, but many enterprises have just scratched the surface of its potential. Over the next year, gamification islikelytomorphfromatacticaltoastrategicconcept.

Currently,gamificationhasspecificuses,suchasforhelpdeskorsalesprocessenablement.Inthenextphase,gamificationwilllikelybeusedtofundamentallyreengineer human capital and the way systems interact withpeople.Thehardwork–thestrategising– hasn’t been done yet.

Insideenterprises,traininganddevelopmentfolksaretheearly adopters of gamification, in response to employee dissatisfaction with training programs. You can easily pictureit.Someonesays,“Everybodyintheconferenceroomforsoftwaretraining!”–withnothingbutblankstares as people file in.

Foragamificationstrategytoignite,ithastobegin withtheC-suiteaskingthisstrategicquestion: “Howdowerewirewhatwedo?”TheCIOshould be the first strategic actor, as he or she has the enterprise software problem to solve.

Gamification both resembles and differs from other new movements, such as social. Many early gamification startups gained tremendous momentum with their energy, capital, and entrepreneurs, shaping the discussionattheoutset.Largersoftwarecompanies may not be nimble enough to engage early, so they mayacquirecompaniestoenterthespace. Thebuzz-and-investmentcyclecanraiseawareness and enterprise experimentation – first tactically, andeventuallystrategically.It’safamiliarstory, playing out anew.

What’s different about gamification? Many large companies were already well down the path of home-growngamificationprojectsbeforetheyreallyknewwhattheyweredoing.Itwasn’tuntilthegamification community started to coalesce – and the termenteredthepopularparlance–thatpeoplespokeupandsaid,“I’vebeendoingthisforyears.”

Gabe ZichermannCEOGamificationCo

My take

One dynamic that has fueled gamification vendor growth is the “double dip”: a company engages with a focus on customers, and then, seeing results, it engages the vendor again to employ gamification programs for its employees. This is great for software companies, but it’s another reason enterprises should startthinkingaboutgamificationstrategically.

Asyouembarkonthatstrategicjourney,animportantthing to understand is the demographic trend underpinning gamification. Millennials are dramatically different.Theylikelywon’tacceptaboringapproachtowork,toleratedelayedgratification,norworkforthe same company for 15 years – unless they have thoughtful rewards, progress, and incentives.

Workingasbothastrategyandatactic, gamification has demonstrated itself to be cost-effectiveandscalable,disciplined, andmetrics-oriented.Organisationscanadoptit and receive significant benefit, notably strategic competitive advantage when it comes to recruiting, retaining and training top talent, and gaining customer adoption. These early leaders are also increasingly turning gamification into a source of revenue, atrendIseerepresentedbythecasestudiesinleadership presented at the industry’s main conference, GSummit12.

Withallthisinmind,Iseeanewroleemergingintheenterprise – partly tied to gamification but also going beyondit.WecallthisroleTheChiefEngagementOfficer: a leader focused on engagement science, techniques,anddesigndisciplinestoengageemployees and customers of the organisation. Andifitisn’tasingleperson,itwilllikelybea cross-functionalworkinggroup.

Itbearsreminding,however,thatwearestillinearly days. New insights based on gamification and, more broadly, behavioural psychology are just now emerging. Are there limits to where gamification can takeus?We’llfindout–buttoday,thetrendlineheads straight up.

Page 66: Deloitte Tech trends 2013 report - Feb 2013

652013 Technology Trends – Enablers

GamificationGoestoWork

Flying car futureThefutureofgamificationwilllikelyblurvirtual personas and reality – where much of what we do istracked,measured,andlinkedtopersonalandprofessional rewards. At present within our corporate lives,averysmallpartofwhatweknowandwhatwedo is used to measure relative worth and performance within the organisation. What is evaluated is often done, so through the subjective lens of a supervisor ormanager,itislikelyremovedfromthevastmajorityof our daily routine. Gamification allows for granular, consistent,andreal-timefeedback,rewards,andgrowth–drivingconsistentindividualandworkplaceimprovement.

Somewilllikelyfiercelyresistdissolvingthe boundariesbetweenwork/lifebalance. Privacyissuesareimportant.Justbecause something can be measured, should it be? And who should control disclosure to your employer, to your insurance provider, or to local authorities?

Finally,refereeingandadjudicationingamifiedbusinessprocesswilllikelybecomeafull-timefunction.Peoplemaybendrulesto“win,”outrightcheat, be accused of cheating, and accuse others of cheating. How will disagreements be resolved, and how will game dynamics evolve over time? But then again, how does it really differ today?

Page 67: Deloitte Tech trends 2013 report - Feb 2013

66

GamificationGoestoWork

Where do you start? Thebuildingblocksforgamificationarefamiliar–starting with business objectives, desired outcomes, andunderstandingtheaudience.Forgamification totrulygotowork,however,itisimportanttounderstandtheinnerworkingsoftheorganisation,process interdependencies, and behaviours, including the interplay between human actors and the underlying technologies. Some initial steps:

• It’sasocialbusinessthing.Likeanysocialbusinessinvestment, the first step is to clearly articulate the business problem to be addressed. Next, identify the socialnetworksrelevanttothatobjective–spanningboth the virtual and the physical world. Third, explore incentivesthatmaycausethenetworkstoengageonthatobjective.Finally,exploreopportunitiestogreatlydecrease traditional constraints with the methods, technologies, and media of gamification. These steps may seem pedestrian, but many failed gamification efforts start with a specific game mechanic or platform they want to introduce – not the “why,” “for whom,” and “so what.”

• Designisateamsport. The construct of a game will likelytouchonindividualincentives,operationalandorganisationalgoals,analytics,end-userinterface,andunderlyingITsystems.Amulti-disciplinaryteamis needed to represent these dimensions – including socialscientists,marketers,gamedesigners, line-of-businessmanagers,datascientists, back-endsystemsengineers,andarchitects. Business systems are complex and have causation. When applying game dynamics to a business process or the business as a whole, designers should understand the complexity of the rules that govern the organisation – and how to increase interaction and engagement with audiences. The game design itself should maintain clarity of its benefits to users – as well as to the organisation.

• Measure,tweak,anditerate.Intangible effectsandlackofmeasurementcriteriahave led to the perceived failure of some early gamificationefforts.Benchmarkcurrentperformance, measure the output once the application is activated, and don’t hesitate to revise assumptions, approaches, or tools in response.Almostnothingkillsaninnovationinbusinessprocesslikefailuretomovetheinitiativebeyond the pilot implementation. There are three dynamicswhichneedmonitoring.First,besure to maintain momentum within the “interest corridor.”Ifthegamedynamicsaretoodifficult,theparticipantwilllikelyloseinterestanddisengage. The same is true if the dynamics are too simple.

Secondly, by gamifying a process, the organisation willlikelyhaveaccesstoasignificantamountofnew data that was previously unavailable. Through afeedbackmechanism,youmayhaveinsightsonhowtoadaptinrealtime.Ifharnessedcorrectly,organisationwilllikelybeabletorefinetheirstrategy in real time.

Finally,keepaneyeonlong-termobjectives.Tweaking,measuring,andenhancementshould be an ongoing process – not a one and doneeffort.Besuretofine-tunethemodel. Butmoreimportantly–tokeepplayersengagedovertime.Whatwillkeepthisprocessexcitingandinteresting after the first level or achievement is reached? And how will the data that is analysed regarding behaviours and outcomes cause one to rethinktherewards,incentives,andrecognition?

Page 68: Deloitte Tech trends 2013 report - Feb 2013

672013 Technology Trends – Enablers

GamificationGoestoWork

Bottom lineGamification is not about turning everything into a game or making games, it is about taking the key components and mechanics that we see in games, such as continuous feedback, personal dashboards, leaderboards, rewards, social knowledge sharing and learning, and applying it to business. The aim is to createhighperformingteamsthatarecontinuouslylearning,innovatingandimproving.Understandwhoyou’re trying to engage, what motivates them, and how gamification can change the way they look at – and work with – the organisation. If passion and engagement are important to your organisation, this is a trend that can’t be ignored or it could be game over.

Peter Williams, Chief Edge Officer, Centre for the Edge Australia

AuthorsDoug PalmerPrincipal,[email protected]“social”hasbeenaphenomenoninthebusinessworld,Dr.DougPalmerhas been helping clients leverage its potential for competitive advantage. Doug currently leads the Social Business practice, advising clients in areas related to social media, collaboration, gamification, and the adoption of emerging technologies.

Andre HugoDirector,[email protected] Director of Deloitte Digital in South Africa, Andre assists clients in leveraging disruptive digital technologies, enabling them to cost effectively deploy new business models and accessnewmarketsorrevenuestreams.

Endnotes 1 Gartner,Inc.,“Gartner’sTopPredictionsforITOrganizationsandUsers,2013andBeyond:BalancingEconomics,Risk,OpportunityandInnovation”,DarylC.Plummeretal,October19,2012.

2 “GartnerSaysby2014,80PercentofCurrentGamifiedApplicationsWillFailtoMeetBusinessObjectivesPrimarilyDuetoPoorDesign,”Gartner,Inc.pressrelease,November27,2012,ontheGartner,Inc.website,http://www.gartner.com/it/page.jsp?id=2251015,accessedDecember20,2012.

3 M2Research,“Gamificationin2012MarketUpdate-ConsumerandEnterpriseMarketTrends,”May2012,Page9,accessibleviahttp://gamingbusinessreview.com/wp-content/uploads/2012/05/Gamification-in-2012-M2R3.pdf,accessedDecember20,2012.

4 M2Research,“Gamificationin2012MarketUpdate-ConsumerandEnterpriseMarketTrends,”May2012,Page16,accessibleviahttp://gamingbusinessreview.com/wp-content/uploads/2012/05/Gamification-in-2012-M2R3.pdf,accessedDecember20,2012.

5 “Gamification”ontheGamificationWikiwebsite,http://gamification.org,accessedDecember9,2012.6 GingerConlon,Inbound marketing success is child’s play for Bluewolf,http://www.dmnews.com/inbound-marketing-success-is-childs-play-for-bluewolf/article/267774/(November9,2012).

7 DavidKirkpatrick,B2B Social Media: Gamification effort increases Web traffic 100%, employee collaboration 57%,http://www.marketingsherpa.com/article/case-study/gamification-effort-increases-web-traffic#(May2,2012).

8 GregoryLoveandWilliamPlatt,Gamification for Enterprises: How Badgeville Gamifies,http://fora.tv/2012/06/21/Gamification_for_Enterprises_How_Badgeville_Gamifies(June21,2012).Video

9 CaseStudy:“EngineYard”,http://www.badgeville.com/casestudy/engineyard10Landis,D.GuestPost:Preventing Death by PowerPoint.RetrievedDecember11,2012,fromhttp://www.bunchball.com/blog/post/825/guest-post-preventing-death-powerpoint

11Whitepaper:“EnterpriseGamification:TheGenYfactor”,http://www.bunchball.com/resources/enterprise-gamification(registrationrequired)12See:http://www.gsummit.com/

Page 69: Deloitte Tech trends 2013 report - Feb 2013

68

Reinventing the ERP Engine8

With a super-charged engine, businesses can drive new performanceERPisnostrangertoreinvention,overhauling itself time and again to remain relevant through disruptivewavesofclient/serverandtheWeb. Itsformulaforsuccess?ExpandingtheverydefinitionofEnterpriseResourcePlanning(ERP)fromfinancialsto manufacturing to supply chain management toCRMtoHRandmore.Beyondnewfunctionalcapabilities, it has also expanded into information – business intelligence, reporting, and analytics allow organisations to build predictive models. Forawhile,thefocuswasextensibilitythroughintegration platforms, application servers, and orchestration suites. Today’s momentum is around ubiquity.OrganisationsarestrivingtomakeERPaccessible in many ways – on your mobile device, in your collaboration suite, or in your social streams.

This manifest destiny of the service catalog has beenanimportantpartofERP’sstrategy,andwilllikelycontinue.Butthat’snotourtrendthisyear.Something else has been happening, with roots closertoMoore’sLawthantoPorter’sFiveForces.TheengineofERPisbeingreinvented.

TheunderlyingdrivetrainofERPhadremainedconstantthroughoutitspastevolution–on-premise,licensed,single-tenantedsoftwarestacksbuilton transactional relational databases, running on enterprise-classmachinesindedicateddatacenters.This time, though, that drivetrain is being changed, withtorque-richupdatesattheinfrastructure,data,and application layers.

In-memory,column-baseddatabasesallow sub-secondresponsetimeforthemany complicatedqueries.Distributedcomputing,virtualisation,andcloud-basedinfrastructurearedrivingtotalcostofownership(TCO)reduction,a shift from physical to logical, and from fixed to variable expense. Appliances and engineered systems have led to impressive levels of integration across thehardwareandsoftwarestack–makingthelandscape not only potentially easier to manage, butyieldinghigherprice/performanceefficiencies.

Multi-coreandmassivelyparallelCPUs,adventofcellCPUs,incorporationofadvancedGPUs,durableandaffordablesolid-statestorage,moreefficientnetworkinfrastructure, and hybrid memory architectures allow real-timeprocessingoftorrentsofbothstructuredandunstructureddata,andreal-timemobileenablementofcomplexback-officetransactions.Eventhecrownjewelsare not exempt. Some enterprise applications themselves arebeingrewrittenwithcolumnardata,multi-tenant,subscription-basedservices.ThesearchitecturalshiftsreflectthechangingroleofERPfromaprocess-driven toanevent-drivenmindset.

Thetraditionalindustrial-gradeengineofERPmadesensein the days of rigid, automated, highly standardised businessprocesses.Processesareasequenceofactivities– planned, predictable, repeatable, and often inflexible. They should have a big, powerful engine to drive scale andefficienciesonwell-definedtracks.

Thenewevent-drivenworldstillusesprocesses, but they have become flexible, agile, and configurable based on the event that just occurred – within the core, or at the edge. The old engines could not process billionsofeventsatnearreal-timespeedsandallow this maneuverability. Thus the reinvented engine – anecessaryconditionforreal-timeprocessingofdisparate data at competitive price points.

But that doesn’t mean every part of the business should be reimagined – or that the upgraded foundational layer doesn’t have benefits in the old way of doing things. Many organisations may find themselves with a mix of thenewandtheoldengines–takingadvantageof point technical upgrades for “locomotives” to help driveefficiencies,andmakingstrategicbetsonagile “sports cars” to reshape business as usual. Unprecedentedspeedandflexibility–coupledwith ERP’songoingfunctionalexpansionintoinformationdomainsandubiquitousmobileaccess–aretogetherleadingtotheendgameofhyper-productivity. Ineithercase,thereinventedERPengineisatthe heart of the investment – and revitalising one of thebusiness’moststrategic(andexpensive)assets: the enterprise application suite.

Page 70: Deloitte Tech trends 2013 report - Feb 2013

692013 Technology Trends – Enablers

History repeating itself? TheevolutionofERPhasbeenfeaturedasatechnologytrendinpreviousyears,sowhyistheretoolingoftheengineheadline-worthynews?Andhowisitdifferentthanpreviousreincarnations?

ReinventingtheERPEngine

What were the challenges? What’s different in 2013?

Best-of-breed enterprise applications1

• Extensibilitywasabouteasing integrationinto/outofthecoreERP– and accommodating distinct other services tofulfillanend-to-endprocess.Itwasa sensible approach – especially with innovative edge offerings emerging in the cloud. But it is essentially a “surround strategy”forthecoreERPoffering–providing neither efficiency nor cost gains for the core, nor offering avenues for innovation of how business transacts those core processes.

• Theleadingapproachpromotesanincreasingly heterogeneous footprint – featuring a host of operating systems, hardware configurations, databases, applicationservers,andsoftwarepackages.The efficiencies of integrated, engineered systems were nearly impossible to realise.

• Aggressiveacquisitionshavesimplifiedthevendor landscape, though new players are emergingintargeteddomains.Consolidationprovides the opportunity for disparate services from different modules to share the same operatingenvironmentandtakeadvantage of the engine’s reinvention.

• Heterogeneityisnotgoingaway,withmostorganisationslandingonahyper-hybridcloudmodel2–amixofon-premiselicensebasedsoftware and cloud services. But opportunities to improve cost performance of the core remain – as do chances to introduce some significant changestohowthebusinessoperatesbytakingadvantage of the geometric improvements in the engine “power to weight” ratio.

End of the “Death of ERP”3

• Thepredictionthatlarge,global,complexorganisationswouldlikelyretainexistingon-premise,license-basedtraditionalERPsoftware for the core of their business has demonstrated itself to be true. But while the processesareservedbythetraditionalERPmodel, they do not have to remain stagnant on the traditional engine. Opportunities for newefficienciesandimprovedTCOmayhave been ignored in the philosophy of preserving the predictability and stability of the core.

• Engineeredsystems,in-memorycomputing,and a broader shift to cloud infrastructure and platform enablement of parts of the core ERPlandscapehavethepotentialtoimprovecost and performance characteristics of the preserved core.

• Ad hoc and de jure standards adoption of conceptssuchasMapReducereflecttheshifttoaddress not just the application tier but also the data tier, both integrated with and parallel to thein-suitecapabilities.

• Importantly,thereareopportunitiesto introduce the newly overhauled engine without open-heartsurgeryofexistingcoreprocesses– either by focusing on adjacencies to the transactionallayer(e.g.,bigdataoranalyticsextensions to core financials, manufacturing, supplychain)orbydrivingadoptioninthenon-productionpartsofthesolutionlandscape(stage/test/developmentenvironments, or potentially even phasing the new engine intodisasterrecoveryinstances).

• 10xoreven20xperformanceimprovementsatthe data, transactional, or analytics tier can be translated to inverse levels of cost savings for a givenworkload.ThismayallowERPnodestobe deployed in more granular and agile fashion around the globe.

• TheblackboxnatureofengineeredsystemsmaysignalareturntothedaysoftheAS/400systems administration being an extra duty for the payroll supervisor or shop floor manager.

Page 71: Deloitte Tech trends 2013 report - Feb 2013

70

ReinventingtheERPEngine

Technology implicationsInaworldofstandardisedrigidbusinessprocesses,ERPengineswerebuilttobeindustrial-grade:hightransactionalscale;poolsofdedicatedprocessingresourcestodealwithsporadiclarge,long-runningbatchcycles;racksofspinningdiscstomanageproductionvolumes(andsilosoftapetohousedataarchives);expensiveactive-activeredundantsystemlandscapesatmultiplelocationsforfaulttoleranceanddisasterrecovery;infrastructureprocured to handle edge cases of volume, concurrency, and growth. All pulled efficiently by the big locomotive enginealongsetrails.Thenewworldlooksdifferentateachlayerofthestack,withimplicationstotherestofyourITportfolio.

Topic Description

Virtualisation Virtualisationplaysanimportantroleatthecompute,storage,operatingsystem,platform,terminal,andapplicationlevels.Manyvendors’reinventedERPenginesallowformoreadvanced virtualisation approaches than organisations may have previously encountered, moving above the infrastructure and OS layers into the platform and application space, andpromotingcross-hypervisorportabilityofworkloads.Monitoringandmanagement tools should be updated for visibility and control over the new footprint. Orchestration is the next frontier, and governance is important to guide adoption, preempt instance sprawl, and enforce policy infringements discovered via monitoring and environment maintenance.

In-memory solutions ConventionalERPsolutions(transactionalandinformational)havebeendependentonphysicaldisc,throttledbyinput/outputcallsandseparateresource-intensivecyclesfordataretrieval,synthesis,andanalysis.In-memorysolutionsshiftthedatafromphysicalbitsonspinningdisctologicalunitslivinginrapid-accessmemory(RAM).Withthedatauniverse incache,querying,aggregation,andprocessingcanbedramaticallyimproved–bothin responsetimesfortraditionalrequests,andintheabilitytoprocessmorecomplicatedqueriesacrossamuchwiderdatadomain.Todayin-memoryisoftenusedforanalytics,butseveralvendorsarelookingtoextendtheirreachtotransactionalprocesses.Ashifttoincludecolumn-orienteddatabaseenginessupportstheanalyticsqueryimprovementsandoffersinterestingnewpotentialfordesignofthetransactionprocessing.NewERParchitectures are leveraging large memory segments to store and retrieve large portions ofthecoredatabase,thusreducingtheI/Orequiredtoretrievedatafromdisk.

Integrated infrastructure systems

Appliance-likesolutionsprovidingintegratedsolutionsacrossthecompute,storage,networking,andmanagementstacks.Advantagesincludecertifiedinteroperability,consolidatingmonitoringandmaintenancesolutions,apotentialdecreaseinrequiredbenchmarkingandtesting,and–forsomevendors–theabilitytotakeadvantageofnewtechnologiesfortimely,secure,low-latencyconnectivitybetweenthelayersoftheinfrastructurestackandcommunicationsbackplane.

Unstructured data Sometimeslumpedundertheheaderof“notonlySQL”(NoSQL),thenewERPbackbonecanreconciletheneedforschema-basedrelationaldatabasesfortransactionalrecordswiththeever-growingimportanceofsemi-structuredandunstructureddata.Datadisciplinesneedtoadapt to an inevitable mix of structured and unstructured data – affecting data architecture (includingsemanticrelationships,correlation,andcontext),datastewardship(cleansing,upkeep,andarchiving),anddatagovernance(metrics,ownership,andoversight).

Integration Beyond the growing functional heterogeneity of business processes being fulfilled by a collection of leading products and solutions, there is also potential for foundational heterogeneityasorganisationsfindthemselvesmigratingtheirERPenginesovertime. This creates an even greater sense of urgency for integration capabilities to orchestrate the interaction of services and data, inside and outside of the organisation, across a changing collection of subscribers and providers.

Page 72: Deloitte Tech trends 2013 report - Feb 2013

712013 Technology Trends – Enablers

64

Lessons from the frontlinesERP at light speedA global glass and ceramic manufacturer wanted to consolidatemultipleERPapplicationstocentralisetheir global operations and create a more reliable infrastructure to support their global manufacturing.

Inthepast,thiskindofERPinfrastructurewasbuiltbyacquiringhardwarecomponents,oftenfrommultiplevendors, and spending months integrating them to operateasasinglecohesiveunit.Forthismanufacturer,apre-integrated,engineeredsolutionwasadoptedinstead.RapiddeploymentoftheinfrastructurehelpedacceleratetheimplementationoftheunderlyingERPapplication as well, shortening the schedule from monthstoweeksincomparisontotypicalsystemsimplementations. Once the hardware arrived at the datacenter’sloadingdock,thesystemwasupandrunning in two days, greatly reducing installation time of the system.

With the single integrated system, the company has reduced maintenance needs and lowered the total cost of ownership. And with performance improved by a factor of 15 times over the legacy system, they are able to process orders in a more timely manner, execute demand planning reports more efficiently, and alter their supplychainprocessesinrealtime.Insteadoffocusingtheir technology and experience on managing complex ITsystems,theycanfocusontheinnovationthatdefinesperformance in their operations – and respond more effectivelytomeetchangingmarketneeds.

A roadmap for improved performance4

Garmin, a leader in navigation and communication products, wanted to reduce the cost and increase theperformanceofitsbusiness-criticalsystems.One of the company’s specific goals was to reduce the cost of ownership of supply chain and demand management systems that were processing 13 million queriesand30,000batchjobsandreportseachmonth.Management also wanted to fix reliability issues with GarminConnect,whichsupportsthecompany’sfitnesssegment,processing40millionqueriesperweek. Inaddition,Garminwantedtobuildafoundationtosupportaggressiveyear-over-yeardatagrowth, reduce unplanned system outages, and provide timely system and data recovery should an outage occur.

To realise these objectives, Garmin deployed two massive-memorydatabasemachines.Consolidating fourproductiondatabasesand20non-productiondatabases led to maintenance and energy cost savings, with database performance increasing up to 50%.

EvenasGarminConnect’scustomertrafficgrewby400%–withasubsequentdataexpansionfromthreeto 12 terabytes – planned and unplanned database outageswerealsoreduced.Storageareanetworkbackuptimeswerecutinhalf,andthetimerequiredtoduplicate Garmin’s largest database was reduced from 8daysto10hours.Inaddition,Garminwasableto more accurately forecast demand, efficiently processorders,andeffectivelysupportjust-in-timemanufacturing.

Answering the big data call Thewirelesscarriermarketisafast-movingindustry with customer churn a concern of providers. To stay competitive, one wireless carrier wanted to gain a greater understanding of their customers to improve theirmarketingeffortsandretaintheircurrentcustomerbase. However, the company faced challenges with the ability to provide timely, actionable information and analytics with their existing technology systems.

The company decided to implement a scalable, analytics solutiontoprovidecustomerinsightsinnearreal-time.In-memorytechnologysupportsdataprocessingandanalysiswithinseconds–takingadvantageoftheengineofnextgenerationERPsystems.Oneofthecarrier’smarketinggoalswastoincreasethenumber of customers upgrading to smartphone data plans. But understanding if customers responded to service offerstookuptooneweek.Thecarrier’snewplatformshortened the time to 15 minutes, allowing the companytomakemoretimelydecisionsonmarketingoffers.Generatingotherreportswentfrom10-15minutesto10-15seconds.Themarketingteamisnowabletorunon-demandsearchesallowingthemtointeract with the data to discover new insights. The new system can also run analytics over 24 months of historical data, versus the previous system’s three monthwindow.Thisallowsthemarketingteamtoimprove the accuracy of their predictions.

Theresultsinthemarketingdepartmenthaveencouraged the company to explore other areas for potentialimplementationofin-memorycomputing and analytics efforts – including mobile offerings to allow executives to access information on the road. By reimagining the capabilities of modern enterprise systems, this wireless carrier can deliver greater value to its customers and shareholders.

ReinventingtheERPEngine

Page 73: Deloitte Tech trends 2013 report - Feb 2013

72

ReinventingtheERPEngine

Thistrendbringsoutthetechnologistinmeandtakesmebacktomysystemprogrammingdays.Butit’sreally the business implications that are important tometoday–abetter/faster/cheaperERPengineallowing the business access to more and perhaps different capabilities. The underlying technology aspects–appliances,engineeredsystems,in-memoryarchitectures,etc.–shouldbekept“underlying.” Iftechnologyinnovations(thenewenginestuff)makemy primary job delivering business value easier and moreresponsive,I’lltakethetimetoassessandinvest.Otherwise?Justkeepthehoodclosed.

Havingsaidthat,Idoappreciateanytrendthat can enable me to spend less time and energy on the question,“Whatisthenextserverweshouldbuy?”or,“Howdowemakeallofthesepiecesperformtogether?”and, instead, to spend more time answering, “How do wefulfillthenewbusinessrequirementthatgeneratesrevenue at a low cost?”

AtEnPro,eachofourbusinessdivisionsoperatesin awaytoeffectivelyservetheircustomers.Eachhas its own set of products, customers, and suppliers. Itdoesn’tmakesenseforallsixdivisionstooperateasingleERPsolution,aseachoneneedsdifferentthingsfromERP.Partofourgrowthstrategyinvolvestargetedacquisitions,whichpresentsadditionalopportunities.

We’veorganisedITtorespondtothat.Oneteamconcentrates on commodity technologies, and the other focuses on business solutions. The business solutions team isnotdistractedbygeekyarchitecturestuff,isprimarilybusiness analysts versus programmers, and concentrates on the importance of external experience and resources todeliverleading-edgesolutions.

Larry FreyChiefInformationOfficerEnProIndustries

My take

Inaddition,weprioritiseourinvestmentfirstinto“orthodox” capabilities, which enable core operations of the company. My first goal is to deliver and maintain the orthodox solutions so that our company continuestooperatelikeawell-oiledmachine. Goingbeyondorthodoxisnotoftenrequiredtoachieve operational excellence. Then, on top of our orthodox capabilities, we may gain further competitive advantage by investing in “unorthodox” capabilities – those advanced or emerging technologies that allow us to deliver more to the businessusingtargeted,leading-edgesolutions. It’simportanttonotethatit’snotonlyaboutfaster orcheaper;it’salsoaboutbetterandeasier.

Appliancesandengineeredsolutionskeepmefromhavingtoreinventthewheeleverytime.Theytakeadvantage of what we call the “power of plenty” –anexternallyfueledmarketplaceofexperienceand innovation on which we can call. While it may bealittle“backtothefuture”intermsofone-stopshopping,attheendofdayIwanttowriteonecheckforasolutionthatshouldworkandperform.

Myadvice?Makesureyoucandeliverthetable stakesbeforedivingintothelatestinnovation. Focusontheneedsofyourbusinessandbring in external experience when you need it. Takeadvantageoftheemergingtechnologies thatareabletoenhanceperformance.Don’tmakeadecisionbasedon“cool”in-memory,engineeredsystems, or other technology factors alone. And,importantly,dowhateverittakestodelivervalue to your organisation by delivering game changers – giving your business a competitive advantage.

Page 74: Deloitte Tech trends 2013 report - Feb 2013

732013 Technology Trends – Enablers

Flying car futureERP’srecenthistoryhintsatwheretheindustrywilllikelystandinfiveyears.Pushesintheareasofusabilityandubiquityarelikelyinevitable.Enterprisedataandtransactionswilllikelybeavailableinmanyareas–withpresence,butalsowithcontext.Theformerwilllikelybecomewell-traveledground,focusedonaccesstoERPfunctionsfrommobile,social,andcollaborationchannels.Thelatter,context-awareness,iswherethereinventedERPenginebecomescritical.

Advances in data compression, storage and memory costs,anddistributedcomputingwilllikelyallow real-timeprocessingandanalysisofinternaland externaldatafeeds–allowingactiontobetakenonintelligent signals gleaned out of torrents of noise. The cost of not monitoring physical operations is beginning to eclipse the cost of introducing sensors and actuatorsacrossassets–fromfacilitiesandequipment,tosuppliesandfinishedgoods.Locationawareness,digital identities, and the growing automation of businessoperationsallowfine-grainedknowledgeofwho’s doing what, where. And social business’ growth acrosstheenterpriseshinesalightonwhoknowswhatandwhoknowswhom.Thenexusoftheseforcesprovidescontexttoinformeachactiontaken,eachqueryanswered, and each analytical model.

ERP’ssupportinginfrastructurewilllikelyallowformulti-tenantpubliccloud,cloud-baseddedicatedappliances(virtualprivate),andon-premiseappliancesforsolutionsintheircatalog–aswellasoptionsforin-memoryversusdisc-basedsolutions.Vendorconsolidationwilllikelycontinue, but a handful of players may remain, touting competing platforms for owning the new world of broad enterprise enablement.

Perhapsthemostsignificantchange?ERPisshiftingfromstrict process automation based on scale and repeatability, totheorchestrationframeworkforanagile,adaptablesetofoften-changingevents.Piecesofthebusinesswilllikelyrelyonhighlyautomated,autonomous,predictive,andprescriptiveanalyticalmodels.Otherswilllikelyrelyon human insight and intervention, where tools are there tohelpknowledgeworkersvisualiseandexplorecomplexor sensitive data. This presents a much different scale problem – where advanced intelligence potentially should be deployed against feeds, and is accessible by employees. Today’sbackboneswouldlikelyeithercrumbleunderthe volume, or be financially untenable if conventional horizontal and vertical growth strategies were followed. Hence the need for a fundamentally different engine – builtforoutside-inintegration,expectingunpredictableand intermittent growth, and capable of handling the exploding volumes of data and service interactions.

ReinventingtheERPEngine

Page 75: Deloitte Tech trends 2013 report - Feb 2013

74

ReinventingtheERPEngine

Where do you start? ERPcanbeasensitivetopicinmanyorganisations.And for good reason. Significant financial and political capital has been spent in getting to today’s currentstate,withpersonalcareersmade(andlost)basedontheoutcome.ItislikelythebiggestsinglepartoftheITlandscape–influencingabigpercentageofITspend,andinvolvedinanevenbigger percentage of the business’ operations. ReinventinganypartofERPshouldcausepause,andwilllikelydrawscrutiny.

But that doesn’t mean it shouldn’t be broached. Vendorsalreadypositioningforthenextpotentiallydisruptivewave–onewhereTCOistransparentandhyper-competitiveandubiquityisexpected.Marketsarebeingdisplacedbycompanieswhereold problems are getting solved in new ways, new questionsaregettingaskedandanswered,andnewbusinesses are being explored. Here’s what you can do to prepare:

• Experimentattheedge.ExploreopportunitiestoadoptrevampedERPenginesinareasthatsurround your core transactional layer – business intelligence,analytics,ornon-productionlandscapes. Additionally, use the adoption of the revamped engine to introduce new disciplines thatmayhaveimmediatebusinessimpact,likecreating new capabilities around unstructured big data to improve customer sentiment or sales force effectiveness.

• Experimentatthecore.Exploreopportunitiesforrunningcoreworkloadsonmuchlessgear,makinghot/hotanddistributedself-healingarchitecturesmore practically affordable. Similarly, performance leapsinruntimesofferopportunitiestorethinktraditional limitations on batch windows, run booksequencing,andevenbusinesscycles.Ifforecasting,close-the-books,orMRPrunsare10xor20xfaster,howmightyourethinkyourbusinessprocesses to create advantage?

• Versionhygiene.Ifyouhavehedgedagainsttechnical upgrades and are generations behind the latest versions, now’s the time to get compliant aheadofabusinessagendathatmayrequirethenewenginetofulfillthevision.Pureplumbingupgradesarepossible.Youcanalsotakeadvantageoftheneedtotouch the core to reach new features and potential – speed,ubiquity,andflexibility.

• Evangelise.Become the change agent of the “so what”byaskingwhatthebusinesscandodifferentlyand how the organisation’s mission can be better served.Understandtheimplicationsofthe“what”and“how” so you don’t oversimplify the migration effort oroverpromisetheexpectedoutcomes.Vendorsandpartnerscanprovidescenariosandbenchmarksofpotential business impact because of the foundational changes.Competitorandcross-industryexamplesare good, but rarely does something compare to a handful of impactful use cases from your own business.

• Cometotermswithcompetingviewpoints.Today’s leading vendors are placing nuanced but different bets.SAPonextensibilityandubiquity.Oracleonconvergence and integration. The various cloud players on edge disruption bleeding into the core. Eachisvalid,andlikelytoachievegoalsinthemid-term–andmarketconditionsareunlikelytosettlethedebate and force anyone’s hand. Which leaves the onus on the organisation to gain visibility into vendor roadmaps, articulate their own business’ vision into similar terms, invest where alignments are clear, and makeintelligentbetswherethereisuncertainty.

Page 76: Deloitte Tech trends 2013 report - Feb 2013

752013 Technology Trends – Enablers

Bottom lineERP’s reinvented engine improves the process-driven ways of old, and enables the event-driven possibilities of tomorrow. Overhauled technologies allow cheaper and faster passage along the well-worn tracks of your existing automated processes. But technological breakthroughs suddenly mean industrial-grade performance can be coupled with manoeuvrability. This gives you more than efficiency and cost gains. It allows the underlying business problems to be approached in new ways. Itallowsaccesstodatamoreefficiently,leadingend-userstoaskadditionalquestionsandexplorenew ways to exploit their ERP’s data – and unlock the potential of their information through analytics and mobile access.

Ofcourseyoucanrationaliseyourinfrastructureandapplicationfootprint.Buttherealquestionsaremore strategic. What would do differently if you could close your books in seven seconds instead of seven days? How would your sales strategy change if your store managers could be individually executing daily sales forecasts5? What could you learn from real-time monitoring of the social-sphere interactionsaroundyourindustry?There’sasimpleanswertoallthesequestions:thenewERPengines have the potential to change everything.

Peter Ryan, Partner, Technology

ReinventingtheERPEngine

AuthorsBill Allison Principal,DeloitteConsultingLLPwallison@deloitte.comBillAllisonservesastheConsultingGlobalTechnologyServicesleader,responsiblefor the delivery of full life cycle technology services to clients. He has more than 25 years of experience in the analysis, design, and implementation of information systems, systems strategy, and business process improvement.

Richard Kupcunas Director,DeloitteConsultingLLPrkupcunas@deloitte.comRickKupcunasisaDirectorinDeloitteConsultingLLP’sTechnology/Oraclepractice.HeisrecognisedasatechnologyandknowledgeleaderwithrespecttoOracledatabase, infrastructure, integration, and application server technologies.

Endnotes1 AdditionalinformationisavailableinDeloitteConsultingLLP(2010),“DepthPerception:AdozentechnologytrendsshapingbusinessandITin2010”,http://www.deloitte.com/us/2010technologytrends,Chapter4.

2 AdditionalinformationisavailableinDeloitteConsultingLLP(2012),“TechTrends2012:ElevateITfordigitalbusiness”,http://www.deloitte.com/us/techtrends2012,Chapter5.

3 AdditionalinformationisavailableinDeloitteConsultingLLP(2011),“TechTrends2011:ThenaturalconvergenceofbusinessandIT”,http://www.deloitte.com/us/2011techtrends,Chapter5.

4 Casestudy:“GarminInternationalInc.ImprovesDatabasePerformanceupto50%byConsolidatingontoHardwareandSoftwareThat’sEngineeredtoWorkTogether”,http://www.oracle.com/us/corporate/customers/customersearch/garmin-international-1-exadata-ss-1561598.html

5 ChrisKanaracus,SAP unveils HANA-powered performance management apps in the cloud,http://www.pcworld.com/article/262062/sap_unveils_hanapowered_performance_management_apps_in_the_cloud.html(September10,2012).

Page 77: Deloitte Tech trends 2013 report - Feb 2013

76

No Such Thing as Hacker-proof9

You’ve been breached, or you soon will be. Now what?Who can forget that great line from the movie Field of Dreams?“Ifyoubuildit,theywillcome.” It’saninspiringincentiveoffuturerewardstobereapedforchallengingworktoday.Butintherealmofcyber-threatdefense,itisalsoanunfortunatelikelihood.Ifyoubuildsomethingofvalue,otherswilllikelycometostealit.Nomatterhowyousecureyour environment. No matter how many redundant walls or how many futile moats you have.

Cybercriminalsareoftenwell-resourcedandpotentiallyevennation-statesponsored.Theycanbe highly capable, methodical, and patient – and theirtacticskeepshifting.Tobesure,“smashandgrab”attacksstilloccur,withhackerscompromisingasystemtostealsomethinglikecreditcarddata,and then moving on. Now, though, there is growing occurrenceofthe“long-termdwell.”Adversariescangain undetected access and maintain a persistent, long-termpresenceincriticalITenvironments,operating below the radar of the victim organisation’s cyber team.

The motivation? There are sophisticated, lucrative marketsformonetisingawiderangeofstolenintellectual property. Symantec placed the cost of IPthefttoUnitedStatescompaniesat$250billiona year, with global cybercrime costing $114 billion annually – $388 billion after factoring in downtime. McAfee estimates that $1 trillion was spent globally for remediation.1 BeforeheretiredastheExecutiveAssistantDirectoroftheFBI(anditsleadagentoncybercrime),ShawnHenrytoldcongressofone situation in which an American company had allthedataassociatedwitha10-year,$1billionresearchprogramcopiedbyhackersinonenight.General Keith Alexander, head of the military’s cyber command and Director of the National Security Agency, called the continuing, rampant theft of intellectual property and trade secrets “the greatest transfer of wealth in history.”2Cybercriminalsareoften targeting research and development data, marketingandproductstrategies,intellectualproperty,andotherbusiness-sensitiveinformation

forfinancialgainandcompetitiveadvantage.Infederaland critical infrastructure industries, their ultimate goal is often to disadvantage our national security.

Meanwhile, many organizations may have a false sense of security, perhaps even complacency, resulting fromtheirinvestmentsinnon-agilesecuritytoolsandprocesses they have relied on for years. Yet firewalls, antivirus,intrusiondetectionsystems(IDS),andintrusionpreventionsystems(IPS)areincreasinglylesseffectiveasattackersleverageencryptionandotherinnovativetechniquestoevadethem.Manycompaniesarefailingtodetectlong-dwellcybercrimesintheirITenvironmentsand misallocating limited resources to lesser, more genericthreats.Basicsecurityblockingandtacklingisvaluable,butisinnowaysufficient.RichardClarke,former cyber security advisor to the White House, believes“everymajorcompanyintheUnitedStates has already been penetrated3.”

Organisations across many industries need to up theirgames.Thatcanrequirechangingthelensthroughwhichtheyviewcyberrisk–notrelyingupontraditionalsecuritycontrolsrevealingtell-talesignsofaneffectiveattack–butleveragingintelligenceandadvancedtechniquestoidentify the coming threat and proactively respond.

Movefromreactivetoproactive.Leverageintelligencefrombothinternalandexternalsources.Useforensicandanalytictechniquestodrivetimelydecision-makingand proactive responsiveness to hostile activities in thenetwork.Mineintelligenceforimprovedincidentattribution to develop a deeper understanding of the originoftheattacksandtrackspecificadversariestoenhancefutureriskanalysis.Quicklydetect,isolate, and contain an event when it occurs.

And remember: there is no such thing as hacker-proof.

Does that mean we should surrender the fight? Ofcoursenot.Therehavebeenandwilllikelybebreaches. Move forward boldly, advance your tactics tomeetthoseoftheadversary,andcontaintheriskagainst your valuable assets.

Page 78: Deloitte Tech trends 2013 report - Feb 2013

772013 Technology Trends – Enablers

History repeating itself? Networksecurityanddataprotectionhavebeenthefocusofinformationsecurityprogramsformanyyears.Additionally,complianceinitiativessuchasSOX,PCIDSS,GLBA,andHIPAA4 have further stressed the need for accesscontrols,vulnerabilitymanagement,securitypatching,andmore.Inresponse,manycompanieshavedeployedawiderangeoftechnologiestoprotectthemselvesandmeetcompliancerequirements.Manystartedby hardening the perimeter defense. That wasn’t sufficient, so investments were begun – though not always completed–tobuilddefense-in-depth.Manycompanieshavemorerecentlystartedtoaddressissuesofinsiderthreats and advanced persistent threats. Again, not always with the rigor needed.

Today the cybercrime landscape represents a set of highly specialised criminal products and services that are often able to target specific organisations using sophisticated malware exploits and anonymisation systems, which routinely evade many of the security controls established over the last several years.

NoSuchThingasHacker-proof

What were the challenges? What’s different in 2013?

Threat detection and intelligence

• Hardening and detection efforts were focused on the perimeter – expecting threats to emerge from external forces.

• Breachresponsewasevent-based,triggeredwhen systems or people detected the effective exploit of an identified vulnerability.

• Standing budgets for security remained small, in some cases dwarfed by the sum of costsforfire-drillresponsestoincidents.

• Companiesdidn’tfocusonunderstandingtheir information assets, collecting and correlating threat intelligence, and devising solutionscommensuratewithrisk. Toomanysecurityagendaswere(andinmanycasesstillare)basedongeneric, non-specificthreats.

• Security technology focused on broad signature-basednetworksecurityandendpoint protection solutions to identify attacks,combatvirusesandworms, and protect against incidents.

• Detectionsystemsarelikelyinsufficient–asarepreventionsystems.Tacticalskillsshould change. The focus now should be on understanding internal and external activities – integrating today’s threat detection into an event management systemandintelligence-drivenapproach.

• Itisnotenoughtoprotecttomorrowfromyesterday’s threats. Solutions should be put inplacetounderstandandmitigaterisks–notjustascompliancechecks.Cyberattacksand security breaches are increasing in frequencyandsophistication,withdiscoveryusually occurring well after the fact, if at all.

• Security should now be viewed as a smokedetectorinsteadofafiretruck, withproactiveagendasbasedonriskandvalue.Incidentresponseshouldberequired,butisnotlikelytheprimaryobjectiveoftheChiefSecurityOfficer(CSO).

• Many organisations are initiating “cyber-threatintelligence”assessmentstounderstand how information is managed internally – and valued externally. They are alsodeployingcontinuoussense-and-adaptapproachesthatleveragenext-generationnetworksecuritytechnologies.

• Tools and processes should move from managing incidents to recognising patterns, allowing automated identification, prevention,andclosureofrisks.

• Currentperimeter-intrusiondetection,signature-basedanti-malware,andantivirussolutions often provide little defense and arebecomingobsolete.Forexample,cyber criminals now often use encryption technologyandmalwareproductiontoolkitsto avoid detection.

Cyber criminals • Driversforsecurityattackswerefairlystraightforward(notoriety,financialgain,etc.),widelydispersed(targetsofopportunity),andoftenquitenoisy–thedigitalequivalentof the “smash and grab.”

• Increasinglythereappearstobeanexusbetween cybercrime and a variety of other threats including hactivism, terrorism, industrial espionage, and cyber warfare. Commercialandfederalorganizationsarelikelytargetsofchoice,notchance.

Page 79: Deloitte Tech trends 2013 report - Feb 2013

78

NoSuchThingasHacker-proof

Technology implicationsBuildingtomorrow’sintelligence-driven,proactivecyberprogramrequiresasystematicenterprise-wideapproach–equalpartsgovernance,changemanagement,processredesign,andtechnology.Thepeopleandoperationalimpactscanbesignificant.Butsoaretherequiredunderlyingtechnologiesneeded.Organisationsshouldbuildout capabilities to defend, detect, model, predict, respond, isolate, and recover in order to prepare for today’s advancedthreats.Whatdoesamodernised,battle-readycyber-threatprogramlooklike?

Topic Description

Identity, Credential, and Access Management (ICAM)

Coresecurityrequirementscontinuetobecriticallyimportant,buildingfromtraditionalenterprise identity, credential, and access management solutions. Authenticating users, assets,andsystems;managingentitlements;andencryptingdataatrest,inflight, andinuse.Theserequirements(andotherssuchasvulnerability,assetandpatchmanagement,etc.)helpformthefoundationoftechnicalriskmanagementandare tablestakesindevelopinganadvancedcyber-intelligencecapability.Manyleadingorganisations are also integrating logical and physical security – another step towards one unifying view of authorisation and entitlements for individuals, and a more holistic treatment of the threat landscape.

Threat awareness Automatednetworkandmalwareforensicanalysisareneeded,aswellasintelligencecollectionfromhoneypotsorother‘baiting’operations.Thiscanrequiredynamicandcontinuously evolving threat registries, as well as dedicated security analysts that can correlateexternalthreatintelligencewithinternalthreatanalysisbasedonknowledgeof the business.

Security Information & Event Management (SIEM) solutions

DetailedloggingandSIEMarealsotablestakeswhenitcomestobuildingadvanced cyber-threatmanagementcapabilities.Thestreamofeventdata,whencombinedwithinternalandexternalintelligence,canallowcorrelation,analysis,andsubsequent detection of threats that would otherwise go unnoticed.

Additionally,aSIEMsolutioncanserveasafundamentalbuildingblockindevelopinga threat defense architecture and related automation to monitor the evolving threat landscape,andtakeprecautionarymeasuresbeforeincidentsoccur.

When incidents do occur, event data is critical in order to triage what has transpired and respond in a timely manner.

Unstructured and semi-structured inputs and intelligence

Developsourcesforintelligenceinternallyandexternally.Leverageopensourceandcommercialintelligenceregardingknownbotnetsignatures,maliciousIPs,hostile domains,malicioushashvalues,etc.HarvestdatafrominternalsystemsviaSIEM,aswell asdirectlyfrominfrastructurecomponents(e.g.,DNSlookupdata,DHCPleaseinformation,andproxylogs).

Investindatacollectionandanalysissolutions–allowingautomatedcrawlingandinformationparsingfromweblogs,email,RSSreaders,socialnetworks,andtransactionalsystemactivity.Usecyberanalytics–linkedtothreatrostersandknownbusinessrisksandfraudissues–toidentifypotentialareasofescalatingrisk.

Cyber intelligence Rendertheintelligenceactionable–addcyberforensicsandanalyticstodevelopacyber-threatintelligencedatabaseandanalystportalwithintegratedthreatresponseplaybooks.Improvethequalityoftheintelligencethroughanalystcontributionandintelligencetagging.Cultivatestrongrelationshipswithsecurityresearchers,lawenforcement,andCERTteamstoshareinformationandextendyournetwork–whichcanbecriticalduringinvestigationand takedown.Finally,addresscyberlogistics–securesupplychain,operationalsecurity, personnelsecurity,andfacilitysecurity–asthefourthlegofthecyber-intelligenceapproach.

Asset protection Acombinationofchange,device,rights,andcontentmanagementisneeded.Forphysicalassets, focus on the need to maintain inventory, monitor usage, and promote firmware andoperatingenvironmentupdatestoservers,desktops,mobiledevices,andequipment. Fordigitalassets,classify,encrypt,andprotectstructured,semi-structured,andunstructuredcontent from being accessed or manipulated.

Page 80: Deloitte Tech trends 2013 report - Feb 2013

792013 Technology Trends – Enablers

NoSuchThingasHacker-proof

Lessons from the frontlinesTo the thief go the spoilsTheoilandgasindustryintheU.S.hasfounditselfthetargetofseveralmulti-yearcyber-attackcampaignsthattargeted business leaders in order to compromise field exploration and bid data, as well as field production information. The tactics have varied in small ways but appear to follow the same general approach:

• ConductdirectattacksagainstInternet-facingsystems,aswellasspearphishing(targetedemailattacks)ofmanagersandofficersinthecompany, in an effort to gain access to systems that open the doortothebroadernetwork

• Onceaccessisgained,theattackdeploysadditionaltools to harvest user credentials and identify sensitive dataonnetworkdrivesandinemail.Thiscanbe done in ways that avoids detection and remains in thenetworkformonthsorevenyears

• Oncesensitiveinformationisobtained,thedataisextractedfromtheorganisation’snetworkwithoutraising alarms or suspicion

The weakest linkAnumberofeffectiverecentattacksoftenstartednot with the victim organisation itself, but a ‘trusted’ partner or service provider. Adversaries will often profile an organisation, including its business partners and service providers upon whom the company relies, lookingforthepathofleastresistance.Forexample,theeasiestwayintoacorporatenetworkmaybethroughapartner’sVPNconnection.Thoughapartneris often seen by the victim as a trusted source, such partners may not have the same degree of protection in place and little ‘real world’ visibility into their partner’s security posture.

Additionally, cyber security companies themselves arenowcomingunderattack,asadversariesseektocompromise the products that organisations use for protection. Without transparency into the broader ecosystem, organisations may be missing important parts of the security picture.

“Free” IPThere’s no shortage of examples of advanced persistentthreat(APT)breachesattechnologyproduct companies, where intellectual property is a recognisedasset–andaprimaryhackerobjective.In2009,OperationAuroravictimisedmorethan30companies, including some of the largest technology brandsknowntoday5. What were the adversaries after?Productsourcecode–arichtargetfor multiple reasons:

• Stealingthetime,talent,andmoneyinvestedinrequirementsgathering,design,development, and refinement of a commercial software product

• Preparingacompetitortogettomarketfirst,leveraging what you already built, without the timeorcostassociatedwithIPdevelopment

• Embeddinghostilecodewithintheapplicationand then pushing the code ‘into the wild’ to compromise a larger number of companies

Forasoftwareproductthatiswidelyused,accessto source code may allow the adversary to identify generallyunknownvulnerabilitiesandleveragethatknowledgetoattackabroaderarrayofcompanies.

Page 81: Deloitte Tech trends 2013 report - Feb 2013

80

NoSuchThingasHacker-proof

Gary WarzalaChiefInformationSecurityOfficerVisa

My take

When it comes to information security, our adversaries have become much more sophisticated and greater in number,fromnation-statesexercisingroguediplomacyacrossthousandsofmiles,to“hacktivists”infiltratingsystems in the name of political demonstration. Moreover, many have moved away from “smash and grab” tactics and now try to embed themselves in networksindefinitely,leadinginformationsecurityprofessionals to put a focus not only on preventing breaches before they happen, but on detecting them – asquicklyaspossible,notinweeksormonthsorevenyears after the fact.

Despitethisever-changinglandscape,wecontinue to hear about new technologies purporting to “hacker-proof”corporatesystems,evokingthecentury-oldclaim–tragicallydebunked–thattheTitanicwasunsinkable.Soratherthanmeasureourselves against what is an elusive goal, it is incumbent on each of us in the security profession to raise the levelofskillswithinourorganisationsonadailybasis– by strengthening the technological and cultural infrastructure to thwart our adversaries, anticipating threats on the horizon, and empowering our team to decisively address breaches in security as they happen.

The first step is strengthening barriers to entry into our organisations – not by deploying whatever new security technology is the flavour of the day, but by focusing on the basics and doing them well. The initial compromise in90%ofbreachesrequiresalow-to-mediumskilllevel,which demonstrates the importance of having the security fundamentalsfirmlyinplace–suchasasecurenetwork,timely patching, robust logging and monitoring, strong accesscontrols,andend-usereducationandtrainingdesigned to enhance the culture of security within your organisation.

Second, with a stronger culture and security infrastructure in place, protecting an enterprise requiresaclearunderstandingofwhotheadversariesare, their methods and objectives, and what assets they may target. Since there is no way to spend your way to total security, this “threat profile” can help organisationsmakerisk-baseddecisionsaboutwherethey can invest in security programs and where to introducecontrolstomitigatethemostlikelythreats.Periodicallyupdatethisthreatprofiletokeepupwithnew innovations and processes throughout your organisation,whichoftenintroducenewrisksthatshould be considered and managed.

Finally,butmostimportantly,surroundyourself withateamofsecurityprofessionalsthatareasskilledand passionate as your organisation’s adversaries – a team of “digital first responders.” Time and time again organisations often deploy security technologies assuming that, on their own, the technologies will somehow protect their enterprises. But without capable security professionals who can articulate thethreatsandrisks,identifythedetectiveandpreventativecontrols,andworktooperationaliseeffective solutions, these technological investments are often in vain.

Whilethereisno“hacker-proof”silverbullet, if history is any indicator, the ingredients for successlikelylieintheday-in,day-outfocusonimprovedsecurityskillswithinourorganisations. By having a dedicated focus on the fundamentals of information security, anticipating threats on the horizon, and developing the best talent possible, enterprises can be prepared for the worst.

Page 82: Deloitte Tech trends 2013 report - Feb 2013

812013 Technology Trends – Enablers

NoSuchThingasHacker-proof

Flying car future Today’scyber-threatsolutionsarereminiscentofclinicalmedicine.UndertheHippocraticoathof“donoharm,”much attention is placed on identifying symptoms, triaging to root cause, and judiciously prescribing treatment based on the specific diagnosis.

Butdefendingdigitalassetswilllikelyonlybecomemorechallenging.Enterprisenetworksareexpandingto include partners, customers, suppliers, and mobile employees. A growing number of mobile devices are in play.Cybersecurityteamsarechallengedwithfunding,talent, and resource constraints. And with the coming explosion of sensors, biometric, and nanotechnologies, thethreatlandscapewilllikelyonlybecomemorecomplex and increasingly difficult to understand and control.

As a result, cyber intelligence of tomorrow should operatemorelikethehumanimmunesystem.Whena foreign agent is detected, antibodies are produced, withwhitebloodcellsattackingtheintruder.Thebodyaccelerates blood flow and increases temperatures to create an inhospitable environment for the threat. The identityofthethreatisnotalwaysknown–noritssource, intent, or potential ultimate effect. The body isolatesandattackstheintruder,destroyingtheforeignparty, and extends its own protections to be prepared if the threat reemerges.

A similar approach can be envisioned in our cyber landscapes, with systems that won’t need to identifysomethinginabsolutetermstoknowthatit should not be there. Detected incidents would be quarantined,allowingthethreattobeunderstoodand traced – cyber forensics from a controlled environmentwherebusinessriskhasalreadybeencontained. More extreme measures may become mainstream–shuttingdownnetworksegmentsorpurgingafflictedsystems.Fingersmaybelosttosavethearm–whichmayrequireavastlydifferentmindset than today’s perimeter defense approach to security and privacy, where the “answer” is sometimes still higher castle walls and deeper moats.

This more aggressive posturing may lead to more aggressivecounter-attacks.Withincidentsourcesattributed,cyber-offensivetechniquesmayemergefurther – retaliatory measures in response to verified maliciousactions.Thiswilllikelyrequiresomecross-nationalbodytoadjudicatedisputesandkeepthecyber peace.

With the blurring of national and economic concerns, a more sophisticated, aggressive posture towards cyber assets suddenly becomes a global concern – and,unfortunately,onewhoseimportwilllikelyonlygrow over time.

Page 83: Deloitte Tech trends 2013 report - Feb 2013

82

NoSuchThingasHacker-proof

Where do you start?SecretaryofDefenseLeonPanettasaysthat America’s critical infrastructure systems have been breached already6. This is not defeatism – it is a catalysttosparktherecognitionthattheworldhaschanged. Organisations should view cyber intelligence as a strategic priority. The threat is real. We are under attack.Yettheimpactcanbelessenedbyasystematicresponse.Potentialplacestostartinclude:

• Identifythejewels.Understandtheexternal cyber-threatbeaconofyourorganisation– themarketvalueofstolenintellectualproperty in your industry and, specifically, in your company. Tap into external intelligence to understand the broaderthreatlandscape.Thenlookinwardandcatalogyourhigh-riskassets–eitherbecauseofhigh potential for monetisation if stolen, or critical business impact if breached.

• Knowyourbaseline.Assess your current cyber-threatmanagementprogramacrossspecificdimensions in order to identify strengths and gaps. Includeintelligencecapabilities,emergingthreatresearch and modeling, brand protection, andnetworkandmalwareforensics.

• Firstthingsfirst. Develop a roadmap for enhancing your target threat defense architecture, prioritisedbasedonperceivedriskofhigh-valuebusinessassets.Updateyourthreatassessmentprocesstofocusontheselectbusinessriskstotheorganisation, and then model how those business risksmaybeaffectedbyspecificcyberthreats.

All too often organisations group a series of threats togetherintoasingle‘cyberbucket’–focusedonthe general security threats various companies deal with, not those use cases that could impact their own business in a material fashion. This approach typically doesn’t allow for targeted mitigation, often resulting in important threats to the business that are not addressed.

• Don’tforgetthebusinesscase.Based on the program assessment and updated threat scenarios, articulate the business case for enhancement of the cyber-threat-managementprogram.Thisseemslike an obvious step, but many information security teams lookattheirmissionasapre-ordainedmandate. Clearlyarticulatingthereasoning,justification, and business impact can breathe new life into the securityorganisation,andincreaselikelihoodof funding to expand capabilities.

• Think“extend,”not“replace.”Seektogainthemost leverage out of the technologies and processes already in place before building or implementing new ones.ItislikelythatthereareanumberofexistingSIEMcapabilitiesthatcanbeenhanced,aswellastheability to dig additional functionality and intelligence out of tools including endpoint protection, vulnerability assessment and patch management, content monitoring, data loss protection, intrusion prevention, andcorenetworkservices.Determinewhichpiecesofthe target threat defense architecture are in place today – or could be with additional tuning and integration, versusnet-newtechnologyandprocessneeds.

Page 84: Deloitte Tech trends 2013 report - Feb 2013

832013 Technology Trends – Enablers

Bottom lineCyber security may sound technical in nature, but at its core it is a business issue. Any company’s competitive position in the market and financial health may be at stake.

Business and technology leaders need to engage in effective dialog about what the business values most, how the company drives competitive advantage, and which information and other digital assets are the most sensitive. Brand, customer trust and strategic positioning are at risk.

Thisnewrealityrequiresanewattitudearoundsecurityandprivacy.Anticipateandpreventwhenpossible, but be ready to isolate and encapsulate intrusions to reduce impact. There may be No Such Thing as Hacker-proof, but there’s a chance to reduce your cyber beacon, be less inviting to attack, and proactively set-up outward- and inward-facing measures around your most valued assets.

Tommy Viljoen, National Security and Resilience Leader

NoSuchThingasHacker-proof

AuthorsKelly BissellPrincipal,Deloitte&[email protected]’sInformation&TechnologyRiskManagementandGlobalIncidentResponsepractices.Inhis25-yearcareer,hehaslednumerousprojectsrangingfromBreachForensics,CyberSecurity,andIdentityManagement,toPrivacyandDataProtection,andITRiskManagement.

Kieran NortonPrincipal,Deloitte&ToucheLLPkinorton@deloitte.comAstheU.S.CyberThreatManagementleader,KieranNortonassistsclientsintransforming their current efforts into advanced cyber threat management programs,buildingthreatdefensearchitectures,cultivatingactionablecyber-threatintelligence, and responding to cyber incidents.

Endnotes1 EmilProtalinski,NSA: Cybercrime is ‘the greatest transfer of wealth in history’,http://www.zdnet.com/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history-7000000598/(July10,2012).

2 RichardA.Clarke,How China Steals Our Secrets,http://www.nytimes.com/2012/04/03/opinion/how-china-steals-our-secrets.html?_r=0(April2,2012).

3 RonRosenbaum,Richard Clarke on Who Was Behind the Stuxnet Attack,http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-Behind-the-Stuxnet-Attack.html(April2012).

4 SOX:Sarbanes-OxleyPCIDSS:PaymentCardIndustryDataSecurityStandardGLBA:Gramm-Leach-BlileyActHIPAA:HealthInsurancePortabilityandAccountability Act

5 Kim Zetter, Google Hack Attack Was Ultra Sophisticated, New Details Show,http://www.wired.com/threatlevel/2010/01/operation-aurora/(January14,2010).

6 J.NicholasHoover,DOD: Hackers Breached U.S. Critical Infrastructure Control Systems,http://www.informationweek.com/government/security/dod-hackers-breached-us-critical-infrast/240008972(October12,2012).

Page 85: Deloitte Tech trends 2013 report - Feb 2013

84

The Business of IT10After reengineering the rest of the business, IT’s children deserve some shoesWithshrinkingbudgetsandincreasedscrutinyoverROI,manyITorganisationsareunderpressureforbottom-linecompanyearnings.Thismanifestsin two ways: enabling the business to be more effective inthemarket(ITforthebusiness),anddrivingefficiencyofIToperations(The Business of IT). Todoboth,ITorganisationsshouldautomateandintegrate their core processes and services, just as they’ve done previously for manufacturing, finance, and sales.

When it comes to supporting business performance, IThasathirty-plusyearrecordofdeliveringwhat’sneeded.Firstitwasthetransitionfrommanualprocessestotechnology-drivensolutions. Then, from standalone systems to integrated offerings.Andnow,ITisstrivingforsimilar returns from information, digital, and innovation.

Intheyearsahead,however,IT’svaluepropositionwilllikelyincreasinglybeshapedbyhowwellitaddresses its second mandate: to improve operationalefficiencyinthebusinessofITitself.

FormanyCIOorganisations,operationalefficiencyisnotarosystory.AsIThasfocusedonmakingline-of-businessoperationsefficient,theunderlyingmechanicsofthebusinessofIThaveoftenbeenignored.Fromhowsolutionsarebuiltandmanaged to how resources are deployed to how

accomplishments get measured and reported, it’s time forCIOstoinvestintheirownshops.Thatmeansdrivingtools to capture, report, and manage their full portfolio of projects, vendors, and resource pools – across planning, implementation, and ongoing operations.

Itwon’tbeeasy.Thelargeinformationtechnologyorganisation of today is a complex beast, with many ad-hocprocesses,fewexternallydefinedstandardsand leading practices, and limited integrated software suites.Indeed,businessunitleadersandtheC-suitecanseldomlisttheservicesITprovides,muchlessquantifythevalueofITspending.ThisrunstheriskofmakingITseemlessrelevanttothebusinessovertime.InternalITorganisationswilllikelybecompetingmorewith third-partydemocratisedITservicesandcloud-basedsolutions that promote themselves to be feature rich, timely, and cheap – and in many cases, rightly so.

Thegoodnews?TherearefinallytoolsinthemarketthatcansupportrunningITlikeabusiness.JustasERPhadwide-reachingeffectsonpeople,process,andunderlyingtechnologies,theimpactofthesetoolsonIT’soperatingmodel can be significant.

Not surprising, the maturity of these tools doesn’t approach“ERP-levels”ofsuitedeliveryandintegration.Itmayevenseemmorelikepre-manufacturingresourceplanning(MRP)“roll-your-own.”Butthepotentialbenefitislikelyworththeinvestment–notonlyindrivingdowncostsandmanagingrisksmoreeffectively,butinpositioningITasabusinesspartnerinprovokingandharvestingdisruptioninthePostdigitalera.

Page 86: Deloitte Tech trends 2013 report - Feb 2013

852013 Technology Trends – Enablers

History repeating itself? Twenty-plusyearsago,manybusinessesinvestedinsolutionstoautomatepiecesoftheirdomains.Theydidsoinpocketsoffunctionality:accountspayable,generalledger,inventoryplanning,fixedassets,warehousemanagement,andaccountsreceivable.ITwasaskedtonotonlyautomatethesilos,butalsotodriveintegrationtoMRP,whichbecameERP,onceHRandfinancialswereaddedtothemix.

NowthebusinessofIThasstartedanawakening–wherelooselygovernedprocessesandoperatingmodelsarefindingpointsolutionstomanagepartsoftheITservicecatalog.Butwe’restillatthecuspofatrulyintegratedapproachtomanagingthebusinessofIT.

TheBusinessofIT

What were the challenges? What’s different in 2013?

IT Service Management (ITSM) •Engineersareinstructedtostrictlyadheretoprocess,end-to-end.Well-intentionedprocesses can trump sound business judgment, as compliance is seen as the end, not the means.

•ITILandCMMIprocessesareintentionallyrigid,standard,consensus-driven,andriskaverse.Moreover,theirscopeandimportance are difficult to understand bothinsideandoutsidetheITorganisation,makingithardtodefineandmeasure their value.

•Awell-definedservicecatalogisanimportantpart of the overall management of the business ofIT,butlikelynotsufficientinandofitself.

•AligningITservicesobjectivesandoutcomesto actual business results is gaining favor, extending the underlying standards with meaningful context for the business.

•Toolshaveevolvedthatallowmanagementofday-to-daytasksalignedwithITservicestandards.Insteadofburdensomeadjunctprocesses,ITSMstandardsarebakedintodevelopment and run operations.

Project Portfolio Management (PPM)

•Improvedunderstandingofinvestmentrequests,budgetprioritisation,andin-flightprojectsfocusedonmanagingscarceresourceswhileprioritisingworkefforts.PPMgivessignificantvisibility,butrequiresothercomplementaryeffortstodefine and enforce delivery models and managementstandards,gainreal-timevisibilityintothemetricsaffectingIToperations, and close the loop between monitoring and continuous improvement.

•ITbusinessprocessmanagementhasevolvedasasuper-setofrelatedcapabilitiestomanagemanyfacetsofthebusinessofIT.PPMisonedimension, but it should be coupled with efforts to automate and standardise operating and delivery model, as well as financial, service, and lifecycle management.

Enterprise Systems Management (ESM)

•Fromdevice-centricmanagementinformation base monitoring to instrumentedsystemsand“SPOG”(singlepaneofglass)approaches,theESMfocushastakenasiloedviewofoperations. While monitoring became fairlysophisticated,root-causeanalysisand resolution remained manual and experience-driven.

•ITBPM(businessperformancemanagement)takesabroadviewofplanning,managing, andreportingthebusinessofIT.

•“ERPforIT”addressesautomation(today)andintegration(future)ofimportantITbusiness cycles, including finance, demand management, application management, infrastructure,sourcing,workforce,servicemanagement,andend-usercomputingmanagement.

Page 87: Deloitte Tech trends 2013 report - Feb 2013

86

Technology implicationsOrganisationsthatwanttoincreaseoperationalefficiencyandproductandservicesqualityshoulddeploysystemsandapplicationsthatallowthemtorunITasabusiness.Thegoalistohaveintegratedapplicationsandconsistentdatadefinitionsthatsupporttheusecases.YetnoonevendoroffersanERP-like,all-in-onesolution.Somearemakingprogressinintegratingandfillingthegapsoftheirexistingproductsuites,butchoicesarelimitedandnotyetintegrated.CIOsshouldconsiderintegratingITsupporttoolsfromdifferentleadingvendors,whethertheapplicationsarehostedin-house,inaSaaSmodel,orbyanoutsourcedITserviceproviderwiththeirownenablingITapplications.

As you can see in the table below, the path forward recapitulates the history of automating the finance function: firsttransactions,thenanalytics,then(now)accessandusability.

Topic Description

Data standardisation Standarddatadefinitionsarefundamentalto ITprocessintegrationandsupportingtechnologies.IThasgrownupoverdecadeswithcompetingframeworksandso-called“standards” for demand planning, services catalog development and management, operationsmanagementandreporting,andchargeback.Torealisethepotentialofefficiency,datadictionaryreconciliationandintegrationareoftenrequired.A datamodel fortheITfunctionisinvaluable.

Cross-vendor application interoperability

Along with data standardisation, multiple vendors’ applications should be able to exchange data, synchronously or asynchronously. These applications may sit inside or outside of a company’sfirewall.Or,inthecaseofmultipleoutsourcedITserviceproviders,therewouldbemultiplesourcesforITmanagementdatathatshouldflowup,down,orsideways.

Analytics Acommondatarepositorymayberequiredforreportingandanalysis.Thiswilllikelypullindatafrommultiplesourcesinanormalisedandreconciledway(withcommonlanguageandconsistentmetrics),andalsobetherepositoryforstoringhistoricaldatafortrendreporting.

Mobile OptionsforusingmobileapplicationsinsupportofthebusinessofITarepossiblewithamoreintegratedtechnologyfootprint.Today,somesoftwarevendorsofferdashboard-likereportingformobiledevicesofITmanagementinformationtiedtotheirtoolsets.Butmobilecomputingwilllikelyemergetodriveinter-processsupport,speedingupmanagementdecisions in ways that are rarely seen today.

Enterprise architecture EnterprisearchitecturebecomestheRosettaStoneforhowtheunderlying,interdependentITassetsworktogether.ArchitectureshouldserveasthecontextswitchbetweenthevariouscomponentsrunningthebusinessofIT,monitoringdownstreamoutcomesarebeingmetthroughout portfolio, project, lifecycle management, and ongoing operations.

Believable service-based costing

ByintegratingITfinancialswithservicemanagement,projectmanagement,andprocurement,anITorganisationcandefinetotalcostofownershipforanapplication,appliance,orservice.ManyleadingITorganisationsdependonITfinancialmanagementproductsthatsupportacomplexsetofallocations.Buttomakethiswork,datastandards,aservicescatalog,andtheinstrumentationofprocessesandinfrastructureareoftenrequired–allowinggranular, low latency visibility into the usage and performance of resources.

TheBusinessofIT

Page 88: Deloitte Tech trends 2013 report - Feb 2013

872013 Technology Trends – Enablers

Lessons from the frontlinesVisualisingchangeBusinessTechnologyServices(BTS)atOntario’sWorkplaceSafetyandInsuranceBoarddefinedaboldvisionforitsfuture:tobecomethebestITorganisationinCanada’spublicsector.Toaccomplishthis,CIOJohnHillisleadinghis $80 million division to change everything from cultural DNA and delivery methods, to supporting processes and more.Inshort,theyarechanginghowtheydeliveronthebusinessofIT.

BTSisadoptingcutting-edgetoolsandprocessesina program that combines elements of Agile, Kanban, andLeanmethods.BorrowingfromEricRies’TheLeanStartup1,leadershipinstituteda“build-measure-learn”loopforquickevaluationsoftheviabilityofagivenstrategy. Once BTS determines that a strategy is effective, they begin to scale out the approach.

IntegratingKanbanwithAgileandLeanallowedemployees to visualise current and upcoming workloads,usingvisualcuestorepresentobstructions (suchasdefects).TeamsphysicallygatheraroundtheKanbanboard,formingqualitycirclestotriageandresolveissues.Theyalsousebi-weeklystand-upstoreviewtickets and issues, brainstorm closure, and share lessons learned. Achievements spread Kanban from a handful of teams totheentireenterprise–resultinginreal-timedeliverythat models the project lifecycle from inception through production.Leadershipcanvisualisetheenterprise’sportfolioofprojectsandeasilyidentifyrisks,issues, and obstructions across projects. The approach has torn downorganisationalsilosandshiftedpeopletoco-locateddeliverypods,staffingteammemberstolines-of-businessbasedonrequiredskillsandtechnicalspecialties.

Insixmonths,BTShasseensignificantorganisationaland cultural changes with positive results: increased transparency and collaboration within BTS and with the business;timelydeliveryoftoolsandservices;improvedability to redeploy resources against shifting business priorities;anda40%improvementindeliveryleadtimeand throughput. This goes to show that reengineering the businessofITcanproducerealbusinessresults.

Incremental change, big resultsTheITdivisionofaglobalinvestmentandsecuritiesfirmisresponsibleformanagingabillion-dollarportfolio of projects. But in an environment where business priorities often change, its ability to effectively budget for, and allocate resources to, the appropriate ITprojectswaslimited.Toaddressthischallenge,ITsetout to align expenditures and resources with business priorities.Theirapproach?BreakdownexistingsiloswithintheITdivisionandintegrateprocessestoflexwith the goals of the business.

Usingphasedimplementation,ITteamsselectedfour initial business processes to improve – project demandmanagement,in-flightprojectportfoliomanagement, resource management, and forecasting. They used a prototype to test concepts within a single business unit, an approach that increased buy-inandpreparednessacrosstheorganisation.Usinglessonslearnedfromtheprototype,theyselected and piloted an enterprise tool to facilitate roll out of the improvements. They traded an annual budgetingapproachforathree-monthrollingforecast;implemented a project portfolio management dashboardtoassistexecutivestomakebetterprioritisationdecisions;andstreamlinedtheresourcepipeline to fulfill business needs. The result? Integratedprocesseswithsupportingtoolsthat provide improved budgeting accuracy, improved decisionmaking,anda30%re-appropriationofprojectresourcesfromlessvalue-alignedin-flightprojects to more pertinent needs.

TheBusinessofIT

Page 89: Deloitte Tech trends 2013 report - Feb 2013

88

TheBusinessofIT

Balancing the IT checkbookWhen the corporate finance department of a global entertainmentcompanyneededtojustifyITcosts, theCIOwasaskedtoproduceusage-basedcostallocations to each business unit within each country ofoperation.TheCIOimplementedaprocessandsolutiontotrackandbillITcosts(labor,assets,license,infrastructure,expenses).Furthermore,allocatedcostswere provided with budget variance and revised forecasts each fiscal month.

AmajorcomponentofthetrackingeffortinvolvedimplementinganITBusinessPerformanceManagement(ITBPM)solution,whichintegratedProjectPortfolioManagement(PPM),ITServicesManagement(ITSM),andITFinancialManagement(ITFM)capabilities.Specificsolutioncapabilitiesincludedtrackingcapitalandoperating project expenses, asset management, system configuration management, project management, helpdeskmanagement,resourcemanagement,budgeting, forecasting, and allocations.

The initiative delivered more accurate budgeting and costallocationtobusinessunits;improvedtrackingofITinventory;theabilitytoimplementITservicelevelagreements;thestrategicrealignmentofITresources;and decommissioning of costly systems. By implementing systemsandprocessesthatallowedITtomanagecostsatagranularlevel,thecompanywasabletoreduceitsITbudget up to 20% annually over the past eight years.

Page 90: Deloitte Tech trends 2013 report - Feb 2013

892013 Technology Trends – Enablers

TheBusinessofIT

Kevin KessingerExecutiveVicePresident,CIO,andHeadofCorporateSharedServicesTDBankGroup

My take

Whenexplaining“runningITasabusiness,”Iliketousetheanalogythatbuildinganddeliveringcodeislikerunningafactory.Peoplemayhaveahardtimevisualisingthatbecausetherearen’tanyphysicalproductslikecarsortelevisionscomingofftheproductionline.Butmakenomistake–thereisaproductionline.Youcangetlostinthetechno-speak,butit’sprettysimple.Wehaveproductowners who want to modify or build new products. There is designing, planning, building, testing, and rolling outtoproduction.Unlikesomemanufacturers,wedon’thave the option of shutting down the production line tore-toolforanewproductsowehavetorunthe bankevenasweapplychanges.

OurorganisationhasafederatedITmodelwithInfrastructureandITOperationsinthecenter. Sevenline-of-businessCIOsbuildanddeploysolutionsinresponsetobusinessrequirementsfromproductmanagers. Our manufacturing line is the flow from businessrequirementstoapplicationdevelopmenttodatacenteroperations.Ourgoalistoimprovetheend-to-endviewofthatproductionline.Fromthegleaminyoureyeabout feature and function to the time it’s delivered, we want better predictability, lowest appropriate cost, andhighestappropriatequality.MyviewisthatCIOsshouldadopttheprinciple,“Ifit’sIT,anditrunsinside the company, we own it. No matter where it started or how it was inherited.”

For2012,weused“RunITasaBusiness”asatheme.One of our first steps was to extend and enhance measurementsandaccountability.AcrossIT, weenhancedMonthlyOperatingReviewswithadefinedstructuretoreviewallCIOaccountabilitiesduringthediscussions.WemorecloselyinterlockedITfinancialsacrosstheenterpriseIToperatingareas, andthenextendedtheinterlocktothelinesofbusiness. When we discuss financials, we have the total cost of ownership and matching numbers between areas, so we don’t begin with an exercise in rationalising numbers. We’ve expanded this approach from financials to resources and headcount and furthertoourcapitalcommitments.Inthecomingyear, we plan to develop more sophisticated demand management as a broad tool progressing from basic reporting to proactive management capabilities.

Ilikethephrase“ERPforIT.”EventhoughITisnotyetat that level of maturity, it helps frame the next phases for us. As we expand the processes and tools for runningITasabusiness,integrationofbothprocessand data will progress the conversations even further from data reconciliation to focus on the substantial issues of platforms, priority, and timing. The plan is to manage to a comprehensive view of technology at TD.

I’vebeencalleda“bluecollartechnologist”becausemyinterestinITliesincapabilitiesthatenablecustomer interaction, increase customer satisfaction, driverevenue,orreducerisk.Tomethat’swhatitmeanstorunITasabusiness.

Page 91: Deloitte Tech trends 2013 report - Feb 2013

90

TheBusinessofIT

Flying car futureOvertime,true“ERPforIT”maymovefrommarketingslidestosoftwarereality.BMC,CA,HP,IBM,andmanyothersoftwareprovidersarebuilding,buying, and sometimes relabeling their solutions forCIOsseekingtoautomatetheirowndomains.At some point a truly integrated suite solution may emerge,runningtheITshopliketoday’sERPsystemsrun supply chain and financials.

Justaslikely,asetofstandardsmayevolvetoallowconsistent definition and handling of the lifecycle ofbusinessprocessmanagementintheworldofIT.MuchlikewebservicesstandardssuchasWSDL,XSD,andXSLTenabledself-describingdataandinterfaceobjects, a layer of management and implementation standards could solve for today’s closed, proprietary handlingofAPIsandmaintenancetasksacrossthetechnology landscape.

Ifdiscovering,invoking,andmeasuringITservicesat the infrastructure, platform, data, application, or business service layers had common handling, the backboneofthebusinessofITcouldbereimaginedas an open utilities layer. The majority of effort could be put on analysing and managing actual business outcomes,insteadofstrugglingtomakedisparateITassets open, visible, and manageable.

Eitherway,theflyingcarfutureofITislikelymovingtowardreal-timeunderstandingofthehealth,capacity,performance, and lifetime value of each asset – be ithardware,software,humancapital,orthird-partyservices. Where individual assets are governed by open marketprinciples,with“plugandplay”potentialtomigrate any part of the broad business process. Where ITresourcescanrespondtobusinessneeds,driveoperationalefficiencies,orboth.TheCIOassumesaroleasaportfoliomanager–whichencompassesriskmanagement, financial management, and business stewardship.

ThebusinessofITisthebusinessofthebusiness.JustastheCFOisresponsiblefortheenterpriseassetofthecashposition,theCIOshouldbemanagingtheenterprise assets of information and technology – even as their direct control and ownership of that information ischangingovertime.CIOswithoutamethodforcapturing,reporting,andmanagingthebusinessofITmaybeblindatthewheel–relegatedtoChiefDataCenterOfficertocareandfeedthosephysicalITassetsand resources that remain on the balance sheet.

Page 92: Deloitte Tech trends 2013 report - Feb 2013

912013 Technology Trends – Enablers

TheBusinessofIT

Where do you start? ManyITorganisationshavedonesmallamountsof business process reengineering and have some supportingautomationinplace,likelyrelyingonfragmented,one-off,pointsolutions.Thevisionofafullyautomated,integratedsolutionstackcanseemdaunting.ButjustasBPR,Y2K,andSOXfueledaboomofERPandline-of-businessprocessstandardisation,thereisa“burningplatform”intheworldofIT–thesurgeoftechnology spend to capitalise on the convergence of postdigital forces of mobile, social, cloud, analytics, and cyber intelligence.

ThebusinessofITshouldhaveanoverhaultoaddresscost and efficiency sensitivities driven by changing macroeconomic conditions. This is important in order forITtoremainrelevantinthenewworldoftechnologyinnovation.Firststepsshouldinclude:

• Servicesmindset.IT’sfirstconcernshouldaddresstaxonomy and ontology – being able to define whatitdoes,andwhyit’simportant.ExpressingthebusinessofITinacommonlanguagewithtangible,measurable,andattributablevalueisarequiredconditionforhigher-orderfinancemanagement,portfolio management, and process efficiency improvements.ITILandCMMIcompliancearelikelylessimportantthanwell-defined,discretedescriptionsofhowtointeractwithITservices,andwhattoexpect as a result.

• Doitlikeyoudidwiththefinanceormanufacturing function. Once a common vernacularisinplace,takeapulseonhowwellthevariouspiecepartsareworkingtoday.Aquickmaturity assessment can shine a bright light on opportunities. Areas that are manually driven or based on aging, fragmented technologies may not betheprimarypainpoints.PrioritiesaremorelikelytobedefinedbythesplitofITspendbetweendiscretionaryinvestmentsand“keepthelightson”activity,aswellasthedispositionofITprojectsandassets across the organisation.

• Slowandsteady.Feworganisationswillhavetheluxury – or the appetite – for a big bang overhaul oftheirITfunction.Instead,takearoadmapview with an iterative approach to improving individual business processes and their supporting technologytoyieldsignificantgains.Integrate,over time, the individual processes and data to drive broader effectiveness and efficiency.

• Outside-in.Recognisethattomorrow’stechnologyfootprintwilllikelybeevenmorecomplexthantoday’s – with less direct control over assets (increasingdependencyonexternaland,likely,cloud-basedservices),moreambiguityaroundboundaries of data and offerings, and a desire to dynamically realign and recompose a broad set of businessprocessesbasedonmarketconditionsandresearch-basedinnovation.Theneteffect:disciplineslikecontractmanagement,vendormanagement,releasemanagement,andOSS/BSSoftechnicalserviceswilllikelybecomecritical(e.g.,ordermanagement,provisioning,metering,billing,mediation).Thesemaynotevenbeapartoftoday’sITcharter,butwilllikelybethenexusofcompetition in the new normal.

Page 93: Deloitte Tech trends 2013 report - Feb 2013

92

AuthorsBryan FunkhouserPrincipal,DeloitteConsultingLLP [email protected]&PortfolioManagementofferingwithinDeloitte’sTechnologypractice,andisalsoanationalleaderfortheClientExcellenceprogram,whichsetsthestrategyandprofessionaldevelopmentstandards for the organisation’s client leadership roles.

Peter VanderslicePrincipal,DeloitteConsultingLLP pvanderslice@deloitte.comPeterVanderslicecurrentlyleadstheCIOprogramforDeloitte.Hehasover25yearsofexperienceinhightechnologyandstrategicITmanagementconsulting,includingthealignmentofbusinessandITstrategyandthestructuringoflarge-scaleITtransformation programs.

Bottom lineThe postdigital era should be great news for IT – a chance to expand their scope of services, and reinvent their brand as the business looks to technology to play a more strategic role. But fragmented IT processes and systems of the 1980s won’t allow IT organisations to effectively deliver on the changing demands of the business. IT needs to transform its management disciplines and deploy systems and applications that allow IT to run as a business. This will help IT to keep up with the pace of change – and to keep its own efficiency competitive to stay relevant against increasingly viable options for external fulfilment of technology services.

Kaylene O’Brien, Partner, Technology Advisory

TheBusinessofIT

Endnote1 EricRies,The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses (UnitedStates:CrownPublishing,2011).

Page 94: Deloitte Tech trends 2013 report - Feb 2013

932013 Technology Trends – Enablers

ConclusionFaithfulreadersofourTechTrendsreports will find some familiar topics in these pages. The postdigital forces have seen extraordinary attention in the past four years – and each is still intheearlystagesofadoption.Thebookon how each can fundamentally reshape business is still being written.

Although the topics are familiar, the underlying trends continue to evolve at an astounding pace. Takemobile,forexample.In2010thestorywasaboutubiquitousconnectivityanddevice(i.e.,smartphone)advances.In2011,thefocuswasonthe“app”– andtheadventofthetablet.In2012,wecoveredenterprise implications for prioritisation of opportunities, as well as the operational realities of governing, managing, and delivering mobile solutions. And now in 2013, we consider mobile’s place as an utmost strategic priority. The very notion of “devices” isexplodingintonear-ubiquitousconnectivityofmany physical objects. The fundamental element of mobile still applies – the innovative idea of removing limitations based on physical location, and of a truly untethered enterprise. But the supporting nuance anddetailsaremovingatarapidclip,makingitparamountforITexecutivestokeeppacewithchange.

Postdigital’spotentialcanspurbothoffensiveanddefensive responses. On one side lies opportunity for innovation. On the other, the existential threat ofdisruption.Everyindustrymaybeaffectedbytheunderlyingdigitalforces.Everymarketmay be reshaped by their controlled collision.

Whowillleadthecharge?ThereportsofIT’sdemisemay be exaggerated, but there is often truth behind therhetoric.HowwillCIOsreimaginetheirrolesinbusinessstrategy?WhatwillthecorrespondingITdepartmentlooklike?Onethingisforcertain: the elements of postdigital will play a foundational role.

Weclosethisyear’sreportwiththefamiliarquotefrom futurist William Gibson: “The future is already here…itisjustnotevenlydistributed.”Ourhopeisthat the Tech Trends reports will help you discover the elements of postdigital in your enterprise.

Page 95: Deloitte Tech trends 2013 report - Feb 2013

94

JeffAnderson,RajeswariChandrasekaran,IanClasbey,GregComline,TeresaDannemiller,AlexDea,LeeDittmar,RafeDyer,ChrisGaribaldi,MichelleHernandez,JonHoehler,DanHousman,KristiLamar,NicoleLeung,AndrewLuedke,ChrisMartin,TaimurMohammad,BlairNicodemus,IzzyPark,AaronPatton,AaronReabow,FarhanSaeed,GordonSandford,TerryStuart,TammySwartz,VikashTiwari,EmadToukan

Research Leads:ChrisChang,JustinFranks,TomGleason,NickJohnson,AbhishekMishra, JoseMunoz,ParidhiNadarajan,SamSoneja,JeremyYoung

Team Members: JacobArtz,FelixChang,JennaChen,JosiahDavis,PhilipDavis,KevinDowns,JeffEiden,JasonFebery,AndrewFisher,RamyaGaneshan,DwijGarg,LeksiGawor,AnilGopala,TaylorHedberg,SamJamison,CoreyKe,KanishaKhaitan,RebeccaKim,AdrianKosciak,KarthikKumar,JoyLi,RyanMalone,SimyMatharu,EstefiMedina,SeanMullins,HollyMusemeche,AbhishekNarula,AudreyNguyen,DanNieves,ChinyeluOffodile,AkshaiPrakash,NathanRabold,AdamRe,TalalRojas,BradShivley,DilysSun,YairTon,JennyZheng.

Special ThanksHeidiBoyer,CyndiSwitzer,andStuartFano–theveteranheartandsoulofourTechnology Trends team. You continue to amaze with boundless energy, selfless teamspirit,andpushingustoconstantlyraisethebar(andhitdeadlines).MariahnaMoore,JillGramolini,andKellyGanis–formakingahugeimpactinyourfirstyearTech Trending. This year’s report would not have been possible without your drive, enthusiasm,andwillingnesstotakeon(anddeliver)meatycontent.

Contributors

Page 96: Deloitte Tech trends 2013 report - Feb 2013

Frank FarrallNational Lead PartnerDeloitte Digital Tel: +61 3 9671 [email protected]

Tim NugentNational Lead Partner Enterprise Information ManagementTel: +61 3 9671 [email protected]

Kaylene O’BrienPartner Technology AdvisoryTel: +61 3 9671 [email protected]

Robert HillardNational Leader TechnologyTel: +61 3 9671 [email protected]

Dean KingsleyNational Lead Partner Technology RiskTel: +61 2 9322 [email protected]

Contacts

Anthony VielNational Managing PartnerDeloitte AnalyticsTel: +61 2 9322 [email protected]

Peter BarsNational Lead PartnerTechnology AdvisoryTel: +61 3 9671 [email protected]

Tommy ViljoenNational Security and Resilience Leader Tel: +61 2 9322 [email protected]

www.deloitte.com/au/techtrends

Scan the QR code to download the report or access additional online content

This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively the “Deloitte Network”) is, by means of this publication, rendering professional advice or services.

Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication.

About Deloitte

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/au/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.

Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte has in the region of 200,000 professionals, all committed to becoming the standard of excellence.

About Deloitte Australia

In Australia, the member firm is the Australian partnership of Deloitte Touche Tohmatsu. As one of Australia’s leading professional services firms, Deloitte Touche Tohmatsu and its affiliates provide audit, tax, consulting, and financial advisory services through approximately 6,000 people across the country. Focused on the creation of value and growth, and known as an employer of choice for innovative human resources programs, we are dedicated to helping our clients and our people excel. For more information, please visit Deloitte’s web site at www.deloitte.com.au.

Liability limited by a scheme approved under Professional Standards Legislation.

Member of Deloitte Touche Tohmatsu Limited. © 2013 Deloitte Touche Tohmatsu. MCBD_Mel_01/13_048315

Deloitte

Tech Trends 2013 Elements of postd

igitalEd

ition 4