11.12.2012 Views

Technology Perspectives - Fujitsu

Technology Perspectives - Fujitsu

Technology Perspectives - Fujitsu

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Technology</strong><br />

<strong>Perspectives</strong><br />

A thought-provoking look at<br />

key forces of change<br />

As of November 2010<br />

shaping tomorrow with you


<strong>Technology</strong> <strong>Perspectives</strong><br />

Table of contents<br />

Introduction p. 04<br />

Who we are p. 04<br />

Who you are p. 05<br />

Why we prepared this document p. 06<br />

Context p. 07<br />

Where we have come from p. 07<br />

How to prepare for the future p. 09<br />

Four scenarios for the future of IT p. 14<br />

Nine key trends p. 20<br />

1. Organic collaboration p. 21<br />

2. Real-time insight p. 25<br />

3. Borderless security p. 31<br />

4. Invisible technology p. 36<br />

5. Connecting the consumer p. 42<br />

6. Off-the-rack software p. 48<br />

7. Changing rules of business survival p. 53<br />

8. New cultural values and expectations p. 59<br />

9. A workforce in motion p. 65<br />

02


Twelve key predictions and their implications p. 71<br />

On the horizon: Things on their way in p. 78<br />

Rest in peace: Things on their way out p. 80<br />

Conclusions p. 82<br />

Credits p. 85<br />

03


Introduction<br />

Who we are<br />

This document pulls together the thoughts of the <strong>Fujitsu</strong> CTO Community, which is made up of<br />

the Chief <strong>Technology</strong> Officers and their teams from the various regions within the <strong>Fujitsu</strong> organization<br />

around the world.<br />

<strong>Fujitsu</strong> is the world’s third-largest IT services provider and the number one company in this category<br />

in Japan. With research facilities in Japan, the U.S., the U.K., Germany and China, <strong>Fujitsu</strong>’s R&D spend is<br />

$2.4 billion.<br />

Our innovative power stems from 1,500 research scientists and 14,000 development engineers worldwide.<br />

Together, they have produced more than 34,000 patents around the world.<br />

You can learn more about <strong>Fujitsu</strong> at www.fujitsu.com<br />

04


Introduction<br />

Who you are<br />

We certainly hope that this content will be of interest to anyone seeking to pull the future into<br />

sharper focus. Nevertheless, we have written this to meet the needs of those who make or support<br />

technology-related strategy decisions. This includes, but is not limited to:<br />

■ C-level executives and their staff;<br />

■ IT decision makers;<br />

■ Analysts and journalists.<br />

We would like to invite you to use this document as a reference work. Just flip through it to get an<br />

overview of the key topics and then invest some additional time to read the sections most relevant for your<br />

work. If you have not already seen it, you might also want to visit www.technology-perspectives.com for<br />

an overview of the material.<br />

05


Introduction<br />

Why we prepared this document<br />

At <strong>Fujitsu</strong>, we pride ourselves on being a forward-looking company that not only seeks to anticipate<br />

the future, but also to form it. We do this through close cooperation with our customers in order to meet<br />

their needs today and tomorrow.<br />

We want to put you in the driver’s seat by making it easier to obtain the insight and tools needed<br />

to prepare for a competitive future. Together, we can work toward realizing your vision for serving<br />

your customers.<br />

Our vision is to develop and build networks of intelligent systems that work together in a way that touches<br />

and improves everyday life for people all around the globe. To make that a reality, we invest significant<br />

resources to identify the patterns of change that are paving the way for the future.<br />

The challenge<br />

With change comes uncertainty. The big challenge for us all is to make sense of change and see it with<br />

clarity in order to understand it and plan for its implications.<br />

<strong>Technology</strong> <strong>Perspectives</strong> is intended to provide some background context for strategic planning. Above all,<br />

we hope that these thought-provoking ideas will spark a debate about planning for the future. It’s a<br />

debate that we would be delighted to join you in.<br />

06


Context<br />

Where we have come from<br />

Waves. Three of them.<br />

Innovation has long been a key driver of change in our society, and digital and information technologies<br />

are now catalyzing change at an unprecedented rate. Today, IT underpins every business transaction, and<br />

it is increasingly underpinning our social interactions as well. Over the past 40 years, this technology has<br />

been carried forward by three waves of development that set the context for the developments that we<br />

are examining:<br />

■ The computer-centric wave: Big, powerful machines dominated until they ultimately gave way to the<br />

personal computing revolution.<br />

■ The network-centric wave: Computers became connected. First in island clusters, then as the global<br />

Internet.<br />

■ The people-centric wave: Mobile and network technologies as well as the burgeoning consumer market<br />

are putting individuals firmly at the center of a technology enabled world. We are currently in the midst<br />

of this wave.<br />

The technology timeline<br />

<strong>Technology</strong> will continue to play a prominent role in shaping our society. But the innovation we see today<br />

and in the future has its roots in this timeline. It sets the context for how we shape tomorrow and we will<br />

refer to many of these events in the following parts of this paper.<br />

Computer-centric wave<br />

■ 1965 Intel co-founder Gordon E. Moore introduces the concept of Moore’s Law – that computing power<br />

will double every two years.<br />

■ 1969 The Apollo 11 Lunar Module lands on the moon with the aid of a guidance computer with 2K of<br />

RAM and weighing 30kg.<br />

■ 1970 Bell Labs introduces Unix.<br />

■ 1973 Xerox Parc develops a computer with a graphical user interface, but sees no future in it.<br />

■ 1974 Intel releases the 8080 processor, the basis for the first personal computers.<br />

■ 1975 Ed Roberts releases the first personal computer, the Altair 8800, launched – with software written<br />

by Microsoft.<br />

■ 1979 Sony introduces the Walkman.<br />

■ 1980 IBM announces its first PC; it is released with DOS, an operating system written by Microsoft.<br />

■ 1981 <strong>Technology</strong> prices fall: 256k of RAM costs $1,000 and a 5 MB hard disk costs $3,000.<br />

■ 1982 Time magazine names the personal computer as its “man” of the year.<br />

■ 1984 Apple introduces the Macintosh.<br />

■ 1984 The number of hosts on the Internet reaches 1,000.<br />

■ 1985 Microsoft releases Windows.<br />

Network-centric wave<br />

■ 1988 TCP/IP becomes a standard.<br />

■ 1989 There are now 100,000 hosts on the Internet.<br />

■ 1990 Tim Berners-Lee of CERN creates HTML, HTTP and URLs.<br />

■ 1993 The White House, the UN and the World Bank go online.<br />

■ 1993 Text messaging first appears on mobile phones as a utility for phone engineers.<br />

07


■ 1994 Jeff Bezos writes the business plan for Amazon.com.<br />

■ 1996 Netscape and Microsoft fight the browser wars.<br />

■ 1997 The Kyoto Protocol limiting greenhouse gas emissions is issued.<br />

■ 1999 Shawn Fanning creates Napster, prompting a copyright war in the music industry.<br />

■ 2000 NASDAQ peaks at 5132.5 on March 10 when the dot com bubble bursts.<br />

■ 2000 Google indexes one billion pages becoming the world’s largest search engine.<br />

■ 2001 Wikipedia is launched by Jimmy Wales and Larry Sanger.<br />

■ 2002 Microsoft drops its mission statement “a PC on every desk and in every home.”<br />

■ 2004 Mark Zuckerberg launches Facebook.<br />

■ 2005 “To Google” enters the English dictionary.<br />

■ 2006 Wikipedia passes 1,000,000 articles.<br />

People-centric wave<br />

■ 2007 Apple releases the iPhone.<br />

■ 2007 1.12 billion mobile phones are sold globally; 437 million of them are made by Nokia.<br />

■ 2007 In the U.S., more electricity is now used to power servers than TVs.<br />

■ 2007 Cloud Computing appears on Google trends for the first time.<br />

■ 2008 Laptop sales exceed desktop sales for the first time.<br />

■ 2008 China now has more Internet users than the U.S.<br />

■ 2009 Internet advertising exceeds TV advertising in the U.K., the first major economy to do so.<br />

■ 2009 One in every two people in the world now carries a mobile phone.<br />

■ 2009 Twitter is used by the pro-democracy movement in Iran.<br />

■ 2009 Global Facebook membership now exceeds the population of the U.S.<br />

■ 2010 Ten billion songs and three billion apps have been downloaded from the Apple Store.<br />

■ 2010 Apple unveils the iPad.<br />

■ 2010 Microsoft launches Azure.<br />

■ 2010 China overtakes Japan as the world’s second-largest economy.<br />

■ 2010 The Internet is nominated for the Nobel Peace Prize.<br />

■ 2010 Moore’s Law is still holding true ...<br />

Dead ends ...<br />

■ “A small, unostentatious car will be the workhorse for commuting and shopping.” Time Magazine, 1973.<br />

■ “There is no reason for any individual to have a computer in his home.” Ken Olsen (DEC), 1977.<br />

■ “Home Taping Is Killing Music.” BPI Campaign, 1980.<br />

■ Apple Lisa 1983.<br />

■ Apple Newton 1993.<br />

■ “The Internet will soon go spectacularly supernova and in 1996 catastrophically collapse.” Robert<br />

Metcalfe, 3Com, 1995.<br />

■ “The truth is no online database will replace your daily newspaper.” Newsweek, 1995.<br />

■ Microsoft Bob, 1995.<br />

■ “On New Year’s Eve 1999, let me suggest three places you don’t want to be: in an elevator, in an<br />

airplane, or in a hospital.” Sen. Christopher Dodd, 1998.<br />

■ Boo.com, Flooz.com, Kozmo.com, Kibu.com, Pets.com, 2000.<br />

■ “Two years from now, spam will be solved.” Bill Gates, 2004.<br />

■ “Next Christmas the iPod will be kaput.” Sir Alan Sugar, 2005.<br />

■ “I don’t anticipate any serious problems among the large internationally active banks.” Ben Bernanke,<br />

U.S. Federal Reserve Chairman, 2008.<br />

08


Context<br />

How to prepare for the future<br />

Our limited but fruitful capacity to predict<br />

On September 15, 2008, Lehman Brothers filed for Chapter 11 bankruptcy protection and, with assets<br />

of over $600 billion, became the largest insolvency in U.S. history. The collapse of Lehman’s prompted<br />

a period of extreme volatility on financial markets and was the first in a series of catastrophic events in<br />

the financial sector, which soon became known as the Financial Crisis. While billions were wiped off<br />

shares and unemployment rose sharply across the world, an unlikely beneficiary of this crisis was Nassim<br />

Nicholas Taleb, whose book, The Black Swan, swiftly became an international bestseller. Published a<br />

year before, the book’s title coined a term to describe high-impact, low-probability events that lie outside<br />

of human knowledge and are, Taleb argued, impossible to predict. Other examples of Black Swans have<br />

been 9/11, the Asian Tsunami, the doc.com bubble and pretty much every economic crash before it. A<br />

characteristic of a Black Swan event is that, in spite of its randomness, people mistakenly believe that it<br />

was predetermined; using hindsight, they construct the causal pathway which led to it. It is human nature<br />

to think that the future is predictable and follows logical patterns. Whether or not we subscribe to these<br />

arguments, few would not accept that our world is regularly rocked by sudden, unexpected seismic<br />

events that generate massive change in their wake.<br />

But change also occurs more subtly. Many smaller, low-impact events can add up to great change –<br />

evolution leading to revolution. Sometimes, it is possible to identify a starting point; the emergence of<br />

a new technology or the beginnings of a social trend. However, it is harder to foresee the many ripples<br />

of consequences that spring forth. Further, human thinking tends to put anticipation of change in the<br />

context of the world as it exists, but cannot anticipate how the rules might be different after the game has<br />

changed. A good example of this was the emergence of personal computing in the 1970s, an event that<br />

had been widely anticipated as a natural development in the evolution of computing technology. But<br />

predications for the personal computer were couched in the way people were using computing at the time.<br />

People saw the value of home computers for controlling systems like central heating or enabling them<br />

to write programs, but they could not possibly see the mainstream uses that eventually would emerge.<br />

Functions like instant messaging, digital photography or digital music – things that computers just<br />

weren’t used for at that time.<br />

It is notoriously difficult to make bets about the future. Should we even try? The alternative, remaining<br />

entirely reactive to everything that happens in the world, is perhaps even more unpalatable. And by<br />

seeking to plan for the future, we are not wasting our time. There are some practical things we can do.<br />

From the many possibilities and complex variables in play, we can simplify. We can search for areas of<br />

stability, areas in which there is a clear consensus and strong momentum. And we can look to the past,<br />

and particularly the recent past, to see how change has taken place and how this might influence things<br />

to come. In doing this, however, we must keep an open mind, recognize the limitations of what we are<br />

trying to do and understand that uncertainty is never far away. This paper attempts to do just that.<br />

09


An assumption<br />

Our starting point is to make an assumption – and it is the only one that we will make. The assumption is<br />

that the world is getting more, not less complicated. This will turn out to be quite important to us because<br />

it underpins many of the arguments that will be put forward in this paper. We think this is safe to make<br />

and, looking at the timeline above, we can see that the world is a much more complex place than it was<br />

20 or even ten years ago. There is a corollary to our assumption: The world is speeding up. The pace of<br />

change is increasing everywhere we look. It took Microsoft 15 years to become a billion-dollar company; it<br />

took Google only four. 1 It is, therefore, our belief that we can expect more, not less, change and that the<br />

rate of change is increasing.<br />

The world is in the midst of an information revolution that is far from reaching its conclusion. Four areas<br />

of advance are particularly driving change in information technology. There is the trend described by<br />

Moore’s Law – that the power of computing technology resources rises exponentially over time. With the<br />

onset of multi-core processing and solid-state drives, we think it is not unreasonable to assume this trend<br />

will continue. Then there has been the phenomenal growth in bandwidth, reach and ubiquity of networks.<br />

Growth will no doubt continue as fiber replaces copper and 3G and other high bandwidth wireless<br />

technologies enter the mainstream. Thirdly, the Internet has brought with it – and is continuing to do so –<br />

the integration of people and technology on an unprecedented scale, generating enormous new levels of<br />

interaction and collaboration, new services and of course information. And fourthly, the developing world,<br />

three quarters of the world’s population, are arriving online at a mind-boggling rate.<br />

This starting assumption presents us with a fundamental question. How do we react to all this complexity<br />

and change? Do we try to control it? Do we try to simplify or partition it? Or do we let it loose? How we<br />

respond to this question will determine the strategies we wish to adopt to move forward in into the future.<br />

1. “Googled: The End of the World As We Know It,” Ken Auletta, 2009<br />

10


A question of timing<br />

Black Swan events aside, many – maybe the majority of developments – can be anticipated. If we<br />

think about emerging technologies, social trends or regulation, very rarely do these come out of the blue<br />

without warning. We might not always be able to predict the full implications or importance, but by<br />

investing time in research, we can arm ourselves with a reasonable picture of what is coming down the<br />

line. But the million-dollar question for any strategist is when to respond. What is it that triggers a physical<br />

reaction? When does an item on a roadmap become a reality? In fact, most developments tend to occur<br />

over a period rather than at a point in time and they follow similar patterns. The figure below, for example,<br />

shows the cumulative adoption of broadband in the U.K. 2<br />

U.K. broadband penetration<br />

% penetration (subscribers per 100 inhabitants)<br />

30<br />

25<br />

20<br />

15<br />

10<br />

5<br />

0<br />

2002 2004 2006 2008<br />

This s-shaped curve describes three distinct phases of adoption: a slow original take-up by pioneering<br />

consumers, followed by a more rapid adoption as the technology enters the mainstream, and finally a<br />

tailing off as it becomes pervasive and embedded into our everyday life. The theory behind this was<br />

defined by Everett Rogers, who distinguished the ‘consumers’ of the change as innovators, early adopters,<br />

early and late majorities and laggards 3 (see Fig. below).<br />

2. “UK Broadband Penetration,” OECD statistics; 3. “Diffusion of Innovation Theory,” Everett M. Rogers, 1995<br />

11


The adoption curve<br />

Cumulative adoption (or impact)<br />

Laggards<br />

Late Majority<br />

Early Majority<br />

Early Adopters<br />

Innovators<br />

Emergence Tipping point Mainstream Absorption<br />

TIME<br />

Adapted from Everett M. Rogers, diffusion of innovation theory<br />

Of course, not all innovations or changes will enjoy the success of the full S-curve adoption profile. Many,<br />

after enjoying early hype, slip back into obscurity as the dead ends above are testament, and sometimes<br />

people are just plain wrong. It is, therefore, useful to look for evidence of a tipping point – the point<br />

at which the rate of change of the gradient of the curve is at its greatest, and the point after which the<br />

change is assured to enter the mainstream.<br />

The significant fact that arises from all of this theory is that, very often, a lag exists between the first<br />

emergence of a change and its full absorption into our everyday life. It is a truism to say that we tend to<br />

overestimate change in the short term and underestimate it in the longer term. Innovation takes time<br />

to develop, but – more importantly – society takes time to react. The duration of this period may vary<br />

between different types of change and innovation and could be measured in months, years or even<br />

decades. Therefore, for any development that follows an S-curve, there ought to be time to plan and<br />

execute a response. This is the strategist’s opportunity. But crucially, we need to understand what is going<br />

to trigger our response and lead us into action. What moves an event off our roadmap and into our<br />

reality? In our experience, there are three common and distinct triggers. They represent three different<br />

phases on the S-curve.<br />

12


Comparative Advantage. By reacting or adopting early, we can gain a comparative advantage over our<br />

competitors. This is relevant for changes or innovations that benefit core or bottom-line activities. For<br />

example, technology that lowered the product time to market or reduced the cost of a sale. Typically, this<br />

trigger occurs ahead of the tipping point. As a result, it may involve a higher level of uncertainty and a<br />

higher risk investment.<br />

Reward Exceeds Risk. A second trigger is the point at which an innovation or change becomes stable. It<br />

has already been proven by others and the risk has fallen to an acceptable level with regard to its benefits<br />

and value. These may be changes with a lower impact on core business or which would have been too<br />

risky to pioneer. This trigger is synonymous with the period around and just after the tipping point, as it<br />

approaches the mainstream.<br />

Keeping Up with the Jones’s. Inevitably, we are reactive rather than proactive in our response to change<br />

the majority of the time. This trigger is about timing our latest reasonable reaction. That is the point at<br />

which not acting means that we start to incur cost or risk relative to our competitors, the market or the rest<br />

of society. This will typically occur after the change has become mainstream. At any given time, there is too<br />

much change for us to proactively respond to, so this is by far the most common trigger.<br />

What is absolutely key for us in planning our responses is to understand what a given development means<br />

to us in the context of our objectives. In order to create an effective strategy, we need to know how change<br />

impacts us with respect to our own needs. Change, like beauty, is in the eye of the beholder.<br />

About this paper<br />

This paper explores some of the host of changes that are taking place in the world right now and<br />

examines some of their possible implications. We start by presenting some simple scenarios to help us<br />

explore some of the key uncertainties of the future of business and technology. We continue the scenario<br />

framework, referring back to it throughout the paper to help us to understand the impact of subsequent<br />

areas of investigation in the paper.<br />

From there, we move on to the heart of this document: an examination of nine important trends that<br />

we believe will bring profound change to the worlds of business and technology over the next two to five<br />

years. We briefly identify some trends that are further out, and some familiar things that are on the way<br />

out. After that, we make 12 predictions that we believe form a reasonable foundation for mid-term<br />

decision making.<br />

We conclude by presenting three key themes derived from the observations throughout the paper. We<br />

believe that those concepts will be a major influence in strategic business decision making.<br />

13


Context<br />

Four scenarios for the future of IT<br />

What will your tomorrow look like?<br />

Unfortunately, we don’t know. At least not with any degree of certainty. In order to help navigate our<br />

way through the great many possibilities, we need to build a simple framework that can bring clarity to<br />

our thinking. To do this, we have created a scenario model.<br />

Scenarios for the future<br />

CENTRAL CONTROL<br />

1 Traditional enterprise<br />

Strong<br />

perimeter<br />

Legacy<br />

systems<br />

Application<br />

silos<br />

3 Managed cloud<br />

PRIVATE<br />

PUBLIC<br />

2 Enterprise ecosystem<br />

Empowered Organizations Empowered Individuals<br />

Cloud<br />

platforms<br />

Community<br />

cloud<br />

Open<br />

source<br />

Locked<br />

down<br />

High touch<br />

Generation X<br />

SaaS<br />

Cloud service<br />

brokering<br />

Open<br />

security<br />

Closed, bespoke<br />

Open, web-based<br />

Enterprise<br />

social<br />

software<br />

Private<br />

app stores<br />

Unified<br />

communications<br />

Self-<br />

service<br />

Virtualized<br />

platforms<br />

Virtualized<br />

desktop<br />

4 Consumer cloud<br />

Mobile app<br />

stores<br />

Free software<br />

Consumer<br />

technology<br />

Social<br />

software<br />

Mashups<br />

Generation Y<br />

PERSONAL FREEDOM<br />

14


Four scenarios<br />

The scenario framework is a theoretical construct that takes two major uncertainties and considers the<br />

implications of them being realized at each of their extremities. We have chosen personal freedom as our<br />

first value, and the source of technology provision as our second. Plotting these against a pair of axes gives<br />

us four scenarios. By examining their implications, we can describe how each scenario might look in<br />

reality, giving us four alternative possibilities. These four scenarios express very contrasting business and<br />

technology futures.<br />

In our model (see Fig. above) 4 , the horizontal axis exploits the uncertainty related to how systems will be<br />

controlled and to the extent to which individual freedom or the power of organizations will be responsible<br />

for this. In the consumer cloud and enterprise ecosystem, individuals have a large amount of freedom to<br />

make choices about what technology they use or what privacy they have. In contrast, the managed cloud<br />

and traditional enterprise scenarios characterize a world in which organizations have control and there is<br />

very little personal freedom.<br />

The vertical axis exploits the uncertainty around how we will consume information services and the extent<br />

to which these services come from public or private sources. So the managed cloud and consumer cloud<br />

scenarios are characterized by a more extensive use of public technology services, open-source software<br />

and open-security models, whereas the traditional enterprise and enterprise ecosystem reflect systems<br />

that are private, and internally controlled and governed. By implication, this axis also can be seen as a<br />

measure of commoditization – public services will tend to be commoditized, while private systems will<br />

tend to be custom.<br />

We have selected these axes because we feel they capture two relevant issues that will be right at the<br />

heart of business decision making over the medium and long term. Many of the developments that we will<br />

be discussing in this paper, for example cloud computing, consumerization, social media or open security,<br />

can be reflected in the terms of these two criteria. The scenarios are deliberately designed to represent an<br />

extreme set of circumstances to create a higher level of contrast and distinction.<br />

How do we react to this?<br />

The scenarios help us to ask questions about the future. In order to answer them, we need to put ourselves<br />

or our organizations inside the model. Which scenario do we think is most likely? Which scenario would<br />

be hardest to respond to? How do our strategic priorities and business planning align against with them?<br />

Which of our priorities would be relevant in the most scenarios? The crux of the scenario method is to<br />

enable us to develop a strategic response that allows us to better understand the level of risk we are<br />

exposing ourselves to. For example, do we make a “bet the farm” response based on the realization of a<br />

single outcome, or do we take a balanced approach and either invest in many different outcomes or look<br />

for strategies that fit across all? That our response reflects each individual context is absolutely crucial.<br />

Consider, for example, how a large government department might plan across these scenarios compared<br />

to a small start-up business. The purpose of the scenarios is to provide a context in which we can frame<br />

the uncertainty of the future and enable greater clarity around our decision making.<br />

4. The brand names and products that have been used in figure “Scenarios for the future” (see Fig. above) have been positioned based<br />

on historical market perception. They do not necessarily reflect the strategies these organizations are pursuing or where they will be<br />

positioned in the future.<br />

15


Note that the scenario plan is not a roadmap – that comes later in the planning process. It is about<br />

possibilities and uncertainty rather than creating a strategic pathway.<br />

As you read the rest of this paper, keep these scenarios in mind as we will continue to revisit them. They<br />

will help us to illustrate some of the uncertainty and implications of the various trends and developments<br />

we will be describing as we go.<br />

1. The traditional enterprise<br />

We call this scenario the traditional enterprise because it describes how information technology has<br />

onventionally been provided (see Fig. below). In this scenario, systems are delivered by an IT function that<br />

exercises high-touch control and governance over the estate. Users have locked-down clients accessing<br />

monolithic applications and there is very little mobility. IT systems are highly secure and are managed in<br />

accordance with industry standards and best practices. In many ways, this scenario represents our comfort<br />

zone because it describes a world that we are familiar with.<br />

Traditional enterprise<br />

Financial model<br />

Commercial model<br />

Client devices<br />

Applications<br />

Collaboration<br />

Information<br />

Security<br />

Relevance of perimeter<br />

Standards<br />

Service model<br />

Choice<br />

IT buyer<br />

CA PEX mainly<br />

Fixed spend<br />

Locked down<br />

Monolithic<br />

Low<br />

Siloed + secured<br />

Traditional<br />

High<br />

Across the board<br />

Bespoke<br />

Limited<br />

IT function<br />

16


2. The enterprise ecosystem<br />

This scenario is characterized as an enterprise in which an agile and mobile group of users operate<br />

(see Fig. below). The users are free to make decisions about much of their personal technology – they<br />

choose their own mobile devices and work with virtualized desktop environments. They can choose<br />

applications to download from an internal application store. There is a lot of collaboration within the<br />

enterprise, both through communication technologies, such as instant messaging and video conferencing,<br />

as well as through enterprise social media and wikis. Enterprise systems are secure, but the mobility of<br />

their users means that security is exposed to a higher level of risk. Some systems could be implemented<br />

in a private cloud, but in one that is secured using the enterprise security model. The IT function takes a<br />

hands-off approach, having delivered an environment that enables users to be proactive in managing<br />

their own systems.<br />

Enterprise ecosystem<br />

Financial model<br />

Commercial model<br />

Client devices<br />

Applications<br />

Collaboration<br />

Information<br />

Security<br />

Relevance of perimeter<br />

Standards<br />

Service model<br />

Choice<br />

IT buyer<br />

Cap Ex + Op Ex<br />

Fixed + variable<br />

Virtualized + thin client<br />

Virtualized<br />

Intra-organization<br />

Shared + secured<br />

Federated<br />

Medium<br />

Minimum needed<br />

Self service<br />

… of client devices<br />

IT function + Individuals<br />

17


3. The managed cloud<br />

Here, the enterprise looks externally for the bulk of its IT, which it consumes in the form of online<br />

services (see Fig. below). Services are well controlled, but business functions have a much greater say in<br />

their purchase and delivery. All access to information services is via a browser and secured by open<br />

security, which may be federated from the enterprise. While users are given little choice in their personal<br />

technology, the simplicity of the browser interface gives them a degree of mobility and agility. Systems<br />

are exposed to a higher level of risk, because much of their information physically resides on systems<br />

provided by suppliers. Governance is applied at software interfaces, where industry standards are used to<br />

ensure smooth integration and rigorous application of security principles. Business projects can be<br />

implemented at extremely low cost and have little or no start-up time.<br />

Managed cloud<br />

Financial model<br />

Commercial model<br />

Client devices<br />

Applications<br />

Collaboration<br />

Information<br />

Security<br />

Relevance of perimeter<br />

Standards<br />

Service model<br />

Choice<br />

IT buyer<br />

Op Ex only<br />

Variable<br />

Browser-based<br />

SaaS<br />

Inter-organization<br />

Shared + trusted<br />

Open<br />

Weak<br />

For security + software interfaces<br />

Commoditized<br />

… of services<br />

Business function<br />

18


4. The consumer cloud<br />

In this scenario (see Fig. below), the notion of enterprise IT becomes largely unrecognizable. The<br />

enterprise consumes all of its services from online sources, and users have free reign to determine which<br />

personal technologies they will adopt. All of the applications that are used are open source or free, and<br />

devices are sourced from retailers with warranty and local service providers offering the only support<br />

services that are consumed. Social media is used extensively and there is a very high level of collaboration<br />

between users. There is very little governance. While costs are low, there is a very high level of risk;<br />

nevertheless, there is also a high level of understanding and organization between individuals.<br />

Consumer cloud<br />

Financial model<br />

Commercial model<br />

Client devices<br />

Applications<br />

Collaboration<br />

Information<br />

Security<br />

Relevance of perimeter<br />

Standards<br />

Service model<br />

Choice<br />

IT buyer<br />

Op Ex + free<br />

Pay-as-you-go<br />

Anything goes<br />

App stores<br />

Everywhere<br />

Public<br />

As offered<br />

Irrelevant<br />

None<br />

As offered<br />

High<br />

Individuals<br />

19


Nine key trends<br />

Crucial for strategic decision making<br />

High-impact developments over the middle term<br />

Few of these trends should surprise you because most of them have already gained at least some<br />

traction. Several of them are already well underway; others are just beginning to take hold. They all have<br />

the potential to set off a major shift in the way that technology powers businesses.<br />

These areas represent significant forces of change. We believe that you should incorporate the main thrust<br />

of these developments into your mid-range vision. Planning for their consequences is imperative, because<br />

the transformations that they produce will be the foundation for much of the important innovation that<br />

will be taking place over the next two to five years.<br />

Here are a few questions to ask as you read:<br />

■ What kind of mindset will you need to cultivate within your company in order to be properly prepared for<br />

these changes?<br />

■ Which of your activities and processes stand to gain the most from an advance in these areas?<br />

■ What new business models and opportunities will this create in your industry?<br />

■ What risks will these changes bring, and how can you mitigate them? Which trend is most likely to destabilize<br />

your current set up? How might our competition implement this in a way that could take us by<br />

surprise?<br />

20


Nine key trends<br />

1. Organic collaboration<br />

The rise and rise of social media<br />

Social media are organic in nature. They defy control and predictability. Yet, they also take our level of<br />

trust into account. In this way, they extend the principles of a small community to a vast – virtually<br />

infinite – pool of people, information and resources. Moreover, social networks have mechanisms for<br />

organic self-regulation: links to fruitful sources naturally strengthen, while unreliable or redundant<br />

ources wither away.<br />

How can businesses tame these powerful collaborative communities?<br />

Rebuilding the Internet – one opinion at a time<br />

Back in December 2009, PepsiCo announced that, for the first time in 23 years, it would not be advertising<br />

at the Super Bowl. Instead, they unveiled “Project Refresh,” a $20 million campaign that would use social<br />

media and digital advertising to target a new market. 5 The idea of the campaign was to bring consumers<br />

into a natural dialog with each other, which would reinforce and spread the brand’s values. The campaign<br />

mechanism is perhaps not as significant as the fact that a major corporation was so convinced of the value<br />

of social media, they were willing to forgo the best advertising slot of the year. This announcement is one<br />

of many examples of the way social media is gaining a tangible hold on our social and economic behavior.<br />

Social media has become incredibly popular as the domination of sites like Facebook, Twitter, Wikipedia<br />

and Blogger.com is testament. The emergence of these kinds of sites has been called Web 2.0 because it<br />

constitutes a second wave in the story of the Internet. It is a development that, even with the benefit of<br />

hindsight, does not seem to have been an obvious one.<br />

The first wave of Internet adoption, which we can describe as the creation of online content and services<br />

by organizations, was highly disruptive and it brought a new channel for organizations to reach their<br />

markets. But the second wave, the creation of online content and services by individuals, has – as is often<br />

the case with a real tsunami – seemed to carry the more powerful forces. Consider that Facebook has<br />

over 500 million members, more than there are people in the US, or that Twitter has the power to give<br />

individuals greater daily exposure than a national newspaper. Web 2.0 is having a huge impact on society.<br />

A value paradox<br />

The business world is becoming more aware of – even savvy about – social media, which as little as two<br />

years ago was seen as a recreational pursuit or a young-person’s activity. There have been many tangible<br />

demonstrations of the commercial value of social media. Viral marketing has become a mainstream<br />

activity and been used to great effect; for example, the rock band Rage Against the Machine became<br />

number one in the UK because of a Facebook campaign. 6 A cursory search of Amazon indicates over 50<br />

books on the subject. Google has revolutionized the advertising industry by exploiting the “long tail” of<br />

the Web (we discuss this further below), giving advertisers the ability to reach customers in a more<br />

targeted way and having real visibility of its effectiveness down to every last “click.” The UK recently<br />

became the first major economy in which online advertising revenue exceeded that for TV advertising, 7<br />

5. “Pepsi invites the public to do good,” http://www.nytimes.com/2010/02/01/business/media/01adco.html; 6. “Rage Against the<br />

Machine beat X Factor winner in charts,” http://news.bbc.co.uk/1/hi/8423340.stm; 7. “Online Spending Passes TV in UK,”<br />

http://www.emarketer.com/Article.aspx?R=1007312.<br />

21


with the US set to follow soon. Recruitment agencies are exploiting real value by harvesting business<br />

social networks for prospective candidates, and company and role information.<br />

However, like Rage Against the Machine, the business value of social media has been realized by<br />

chance – not the predictable return that commercial enterprises demand. While organizations (see Fig.<br />

below) like PepsiCo are investing huge sums of money in social media; for many organizations, the risks<br />

are great – not least around control and potential damage to reputation – and the value uncertain.<br />

But the challenge presented by social media is an extraordinary one. The fact that organizations are yet to<br />

really crack the secret of its value should not come as a surprise because by its very nature, social media is<br />

organic and defies control and predictability. The commercial world dislikes risk and uncertainty, and<br />

therein lies the paradox: How do you tame and control a social network without destroying its value?<br />

Social media in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Access to social media<br />

is not permitted under<br />

enterprise governance<br />

3<br />

Managed cloud<br />

Some public sources of social<br />

media are used for<br />

collaboration and<br />

knowledge management<br />

4<br />

Enterprise ecosystem<br />

Enterprise implementations of<br />

social media tools are used such<br />

as blogs, wikis, microblogging<br />

and collaboration tools<br />

Consumer society<br />

Social media is used<br />

extensively for all collaboration<br />

Taming the crowds<br />

There are signs this is changing. While we believe social media will have impact on a basic level, for<br />

example by replacing e-mail as a means of communication, it will have more profound effects on business<br />

value. We believe that social media and social networking are defining how relationships between people<br />

and information can be exploited. We anticipate that enterprises can realize value from social media in<br />

three areas:<br />

22


1. Exposure and Reach. Organizations can gain exposure through social media by taking advantage of the<br />

trust that builds up in social networks. People are more likely to buy into a message that has come via<br />

someone they know – even tenuously. Communication through a social network is richer because it<br />

enables a two-way dialog rather than a one-way broadcast. In that sense, it could be said to be more<br />

persuasive. But of even greater value is the fact that such a dialog produces feedback. There is a cliché<br />

that half the money spent on advertising is wasted – we just never know which half. Social media starts to<br />

give organizations a real sense of the impact of their communications, and it can enable them to track<br />

indifferent or negative responses as well as satisfied customers and lead to a greater understanding of the<br />

reasons for all three.<br />

2. Content Sourcing. Through social media, consumers now have an entirely new channel for the supply of<br />

information content, tailored to their interests or needs and delivered to them instantly. This development<br />

is revolutionizing the world of information, not least the news media industry. How this will play out<br />

remains to be seen. There is a consensus of sorts that people are willing to pay for brands they trust, which<br />

is the approach that many media organizations, such as News Corporation and the New York Times, are<br />

pursuing. But this is a potentially volatile assumption, especially when considering the younger<br />

demographic of the market. Loyalty in this context can just as easily switch to a free source if it turns out<br />

to be trustworthy. While we anticipate that the big brand names will remain, new players will emerge;<br />

players that are finding new ways of delivering and aggregating content from many different sources.<br />

What we are seeing is the beginning of an “information arms race,” where successful organizations will not<br />

only be effective at consuming and exploiting new sources of content, they will also be the most effective<br />

at providing content to their customers.<br />

3. A Bridge to Human Resources. Social media is providing a valuable way to access people and<br />

knowledge, and we believe it will become an important way to secure human knowledge, activity and<br />

services in the online world of the future. The value of social media over traditional search is that it takes<br />

account of our level of trust. In this sense, it is an organic mechanism. Put another way, it enables the<br />

principles of a small community to be extended to a vast – even infinite – pool of people, information and<br />

resources. Social networks provide metadata – testimonials from other users, friend-of-a-friend linkages<br />

and group consensus, which individuals can use to make more informed choices about possible risk and<br />

value. Moreover, social networks have the mechanism to organically self-regulate so that links to fruitful<br />

sources naturally strengthen, just as unreliable or redundant sources weaken and die away. The sum value<br />

of the interactions in the network will rise over time. As social media evolves, the tools for knowledge and<br />

expertise location will become more sophisticated, and online marketplaces will become mainstream for<br />

all types of human resource or expertise engagement – the “Human Clouds” we describe later in the paper.<br />

For most organizations, it will be in this area that the greatest value can be realized.<br />

The exact progression of social media is, of course, uncertain and there are many ways in which it may<br />

develop. But however these technologies advance, we believe there are two fundamental principles that<br />

underpin the mechanism of social media: Any strategy must acknowledge these principles in order to<br />

exploit the opportunity.<br />

23


“Adding a broad social<br />

dimension to the Web is a<br />

permanent upgrade, not a<br />

fleeting trend. For companies<br />

and governments alike,<br />

ignoring the new information<br />

culture – and its inherent risks<br />

– is not an option. ”<br />

David Smith<br />

CIO & CTO, <strong>Fujitsu</strong> UK & Ireland<br />

1. Social networks are driven by payoffs not by mandates. Social networks grow because their members<br />

want to use them and because they receive payoffs in doing so. The payoff may be subtle or seemingly<br />

innocuous – reconnecting with an old friend, or finding a piece of new information. Sometimes it will<br />

be more tangible, such as a job reference or even a financial remuneration. Payoffs will persuade users<br />

to repeat certain transactions, causing them to be emphasized. Like Adam Smith’s invisible hand, such<br />

rewards guide the members of the community towards productive outcomes. In the context of an<br />

enterprise, this might mean new, potentially higher-value connections to be made outside of the strictures<br />

of the organization chart, thus enabling more effective working. So to capitalize, organizations need to<br />

have the faith and confidence that interaction in these mechanisms will provide results: They must create<br />

the right conditions, but not enforce constraints on the community.<br />

2. Scale really matters. Organizations that have tried and failed to implement wikis will realize that scale is<br />

absolutely crucial to their success. There is a surprisingly large gulf between a network with a few hundred<br />

members – which may seem like a lot – and what we might call the infinite scale of the global Web. This<br />

gulf is often the difference between success and failure. This is because social networks have long “tails.”<br />

Interactions on a social network tend to cluster around similar topics or activities, but there are many<br />

other less common or unique transactions taking place, which form a long tail. The bigger the network,<br />

the longer the tail. This long tail is where the real value is because this is where you find content that is<br />

specific to an individual need – therefore providing the payoff that will strengthen the link between<br />

members of the network. Wikipedia’s success owes much to its long tail. In fact, Wikipedia’s tail is very<br />

long – the top five pages make up 8% of its traffic, the top hundred pages make up 10% of traffic, 8 and it<br />

has well over 3 million English pages. So in order to capitalize, organizations should think about how to<br />

maximize the scale of the social media they use. And the best way to achieve this is to take their<br />

enterprises out into the social media community, rather than trying to create it inside their enterprise.<br />

Key facts<br />

■ Social media brings a value paradox; it is organic and unpredictable, but organizations demand control<br />

and certainty.<br />

■ We should look to exploit value through three practices: to extend reach and exposure, to source<br />

content and information, and to source human activity, knowledge or expertise<br />

■ Social networks are driven by payoffs, not by enforced rules, and they depend on massive scale to<br />

function effectively.<br />

■ Social media represents a major growth area and a second wave in the story of the Internet; second<br />

waves are often characterized by the mass adoption of an innovation into society.<br />

Key questions<br />

■ How could you best benefit from social media in your organization?<br />

■ What hurdles will you need to overcome to take advantage of social media?<br />

■ Can you exploit social media with your existing assessment of risk?<br />

8. Wikistics, http://wikistics.falsikon.de/long/wikipedia/en/<br />

24


Nine key trends<br />

2. Real-time insight<br />

On your mark, get set, decide<br />

People have never been patient. But now more than ever, they want things in real time. And in exchange<br />

for gaining this speed, they have demonstrated a surprising willingness to sacrifice other requirements and<br />

features, such as accuracy. Emerging technologies will take this form of information acceleration to a new<br />

level and enable organizations to realize huge value by making better decisions at the speed of business.<br />

How can your organization exploit real-time information and what will you be willing to trade off to<br />

realize it?<br />

Information in real time<br />

On June 15, 2009, microblogging-site Twitter announced that it would be postponing a scheduled downtime<br />

for maintenance. Nothing unusual it might seem, except that this came three days after the outcome<br />

of the Iranian presidential election had been announced. There had been mass protests across Iran about<br />

the credibility of the result and the blogosphere was set alight by disaffected Iranians desperate to share<br />

information with each other and with the outside world. Throughout the election, strict controls were in<br />

place as to what could be reported by the media, constraining both the speed and integrity of news<br />

leaving the country. As the Iranian government suppressed reporting of anti-government activity, Twitter<br />

and other social media emerged as a major channel for communication of information. Some sources<br />

suggested that the postponement of the maintenance came at the request of the U.S. State Department, 9<br />

recognizing the importance of the medium and anxious that it remained open at all times. Whether or not<br />

this was the case, few would disagree that the Web became the focal point for news about this event.<br />

The aftermath of the Iranian presidential election represented a watershed: It was arguably the first major<br />

international news story for which social media was the most credible source of information. 10 While the<br />

traditional news organizations were dogged by restrictions to what they could report and particularly<br />

hampered by the speed at which news could be relayed, the Web was providing real-time information<br />

about the situation from genuine sources. Ordinary people were reporting rallies and demonstrations,<br />

describing human rights abuses and articulating the feelings on the ground. The tragic death of Neda<br />

Agha-Soltan, a young woman allegedly shot by pro-government militia and who’s death had been filmed<br />

on a mobile phone and posted on the Web, became a symbol of the struggle and a potent illustration of<br />

the power of the medium.<br />

Quick or right?<br />

News gathering is perhaps the most obvious example of the value of up-to-the-minute information.<br />

Social media is providing us with real-time information beyond the traditional news sources and the world<br />

is getting a taste for it. But real time is a double-edged sword. On June 25, 2009, users of Twitter were the<br />

first people to hear news of the death of pop star Michael Jackson. But in contrast, rumors had circulated<br />

on several completely separate occasions in the same year of the death of actor Patrick Swayze, who at<br />

the time was battling cancer. It seems what you gain in immediacy you can lose in reliability.<br />

9. “State Dept. Spoke To Twitter About Keeping Iran Online,” http://www.huffingtonpost.com/2009/06/16/state-dept-spoke-to-twitt_n_<br />

216414.html; 10. “Is Twitter the CNN of the New Media Generation?” http://techcrunch.com/2009/06/17/is-twitter-the-cnn-of-the-newmedia-generation/<br />

25


Recent experience has shown, perhaps surprisingly, that the desire of the mass population for immediacy<br />

of information trumps the need for credibility. Wikipedia has long been derided by the academic<br />

community for its lack of accuracy. However, this is at odds with its continued success. Wikipedia currently<br />

has over three million English articles and it adds a couple of thousand every day. In contrast, Microsoft<br />

Encarta, whose content has always been populated by expert authors, produced over sixty thousand. It<br />

was shut down in 2009, unable to compete with its online rival. As we saw in the previous section, its<br />

long tail of articles gives Wikipedia users a high probability of an instant answer.<br />

People are willing to trade some confidence in information in order to get quick access to the information<br />

they are looking for. Twitter has been an even more rapid success. It has given us an instantaneous view<br />

of what the world is saying. 11<br />

It is interesting to examine the concept of the value of knowledge in this context. We associate accuracy<br />

with traditional information sources, such as reference books or published articles. Surely the value of<br />

the information depends entirely on the credibility of its source? What Wikipedia and other forms of<br />

social media have demonstrated is that, in the Internet age, credibility is only one of many valuable<br />

characteristics that information can have.<br />

Traditionalists might disagree vehemently at this point: Surely accuracy is the only criteria on which you<br />

can value information. Or, at any rate, the only one that matters. The Web has revealed that information<br />

can have other dimensions that may be equally desirable. Here are three examples:<br />

■ Dynamism. An online search can provide information accurate up to the same day, even to the hour.<br />

The vastness of the Web ensures that new content is added all the time and search tools are getting<br />

better at prioritizing and presenting the most recent information. The quality of a static information<br />

source tends to decay over time – the longer the passage of time between the act of publishing and the<br />

act of reading, the greater the possibility that the information is no longer correct, incomplete or<br />

irrelevant. When we search on Google, we prefer to filter out anything that appears to be old, even if it is<br />

only by a few years. Up-to-date information appears to have greater value to us. And in certain areas,<br />

such as technology, politics or business, information is time-critical.<br />

■ Context. Consumers of information from the Web, especially users of social media sources, will gain<br />

an appreciation of the level of consensus surrounding it. There may be links to related pieces of<br />

information, supporting or contradictory evidence from other sources, or comments expressing the<br />

reactions of other readers. With a physical source, the view presented is rather more binary and much<br />

more reflects the opinion of its author. This consensual view of information challenges the traditional<br />

sense that information is black and white – either correct or incorrect – and that the reader’s judgment<br />

is determined purely by the credibility and authority of the source. The Web can provide credibility by<br />

representing the breadth of views of a community.<br />

■ Richness. The Web has made richer forms of information available, such as pictures, audio and video.<br />

It has also enriched many information sources by creating visualizations, overlays or integration into<br />

applications. In comparison, physical sources of information tend to be less sophisticated and less<br />

engaging in their format.<br />

11.“Twitter Hits 50 Million Tweets Per Day,” http://mashable.com/2010/02/22/twitter-50-million-tweets/<br />

26


Appetite for now<br />

The huge popularity of online forms of information shows that the world is waking up to this new value, as<br />

does the decline in newspaper circulation. It is important that we recognize that online and traditional<br />

forms of media can have different value propositions. The latter emphasize the credibility of information,<br />

but the former emphasizes the value of information, where the value, such as richness, context, dynamism<br />

or some other characteristic is determined by the needs of its consumer.<br />

Even for the most skeptical, there can be no doubt in the ability of the Web to generate the first signals<br />

related to an event or pattern very quickly. If needed, these initial indications can then be followed up<br />

with conventional or more trusted sources. Having witnessed the massive success enjoyed by Twitter,<br />

the major search engines have been quick to incorporate social media searches for real-time information<br />

into their services.<br />

Google and Microsoft both introduced real-time search into their engines in 2009, and they are<br />

continuing to work on improving this functionality. Google has been vocal in its desire to embed real-time<br />

functionality into all of their tools, 12 and the company has since introduced Caffeine, a real-time indexing<br />

architecture, as well as Instant Search, which enables results to be returned as people type their queries.<br />

We anticipate that the capacity to provide real-time information will mature considerably over the coming<br />

years. Information will come from social media, leveraged by powerful search functionality, but also<br />

from other sources. The successful organizations of the future will be the ones best able to capitalize on<br />

real-time information.<br />

Analyze this<br />

Social media aside, gathering information in real time is becoming an important practice within enterprise<br />

boundaries. Business Intelligence is a term coined as a generic way to describe technology systems and<br />

techniques that enable organizations to make better business decisions. Business intelligence tools<br />

and methods have always tended to be niche and, as a whole, the discipline has yet to take off in the way<br />

that analysts have predicted, in spite of long-term hype. It has tended to remain very much focused on<br />

industry-specific and activity based research; for example, footfall analysis, which measures customer<br />

waiting times in retail branches.<br />

We believe that analytical toolsets are at the threshold of a major period of growth as organizations start to<br />

take advantage of information availability through sources such as social media and public data stores,<br />

which are cheap online computing resources enabling the mass processing of data. Ongoing technological<br />

developments will accelerate this growth.<br />

■ Web analytical tools enable monitoring and harvesting of information on the Internet to provide<br />

insight. At a basic level, analysis can be carried out with tools such as Google Trends, but many more<br />

12. “What Larry Page thinks about Twitter,” http://www.loiclemeur.com/english/2009/05/larry-page-about-twitter.html<br />

27


sophisticated applications are available and are developing in this area. We anticipate the concept of<br />

“perpetual search” – real-time analysis that looks for changes and disruptions in a particular information<br />

landscapes – will become a mainstream and valuable practice.<br />

■ In-memory analytics takes advantage of improving hardware specifications to process information<br />

directly in computing memory rather than running slower disk queries. This technique will greatly<br />

enhance the volume and speed at which information can be processed.<br />

■ Grids and horizontally scaled computing can bring to bear large amounts of computing resources for<br />

particular purposes. Computing power can be obtained cheaply through grids and “as-a-service”<br />

models, enabling customers to scale computing resources up and down very easily.<br />

■ Human and computational intelligence are being combined into single hybrid information systems –<br />

“artificial” artificial intelligence. These systems use computing power to analyze the bulk of data,<br />

but apply human intelligence to certain tasks delivered from a crowdsourced group of human<br />

participants. This combination of rapid number crunching and human intuition is a particularly<br />

powerful development.<br />

Number crunching<br />

So, there may be plenty of exciting possibilities coming from the technology, but how can we be sure<br />

that this is not continued hype? We envisage two distinct areas in which organizations will apply<br />

analytical intelligence.<br />

1. Targeting Competitive Advantage. Analytical technology is actually not a new concept and it can deliver<br />

real advantage to any organization that manages to implement it more effectively than their competition.<br />

A good example of this is Tesco, the U.K. supermarket that launched their Clubcard loyalty scheme in<br />

1993. At face value, it was simply a means of encouraging shoppers to make repeat visits. However, the<br />

program’s real value to the retailer was in the greater understanding it gave the company of its customers.<br />

The information allowed Tesco to model their customers to a really granular level. They were able to spot<br />

unusual patterns – such as the mutual demand for beer and diapers (nappies) from new, home-bound<br />

fathers – and tailor marketing responses accordingly. The program was a huge success, and it played no<br />

small part in them overtaking their main rival to become the UK’s biggest retailer. 13 Tesco now accounts<br />

for £1 of every £8 spent by consumers in the U.K. 14<br />

Barack Obama’s 2008 election campaign also provided an early example of how intelligence technologies<br />

can make a difference. While Obama’s effective use of social media is well documented, the fact that his<br />

team used data mining techniques to identify, locate and mobilize Democratic voters in key areas provided<br />

a crucial advantage. In Iowa, the turning point in the campaign, the intelligent analytics his team<br />

employed were a major factor in him winning the caucus, which positioned Obama as the front-runner in<br />

the Democratic race. 15<br />

While the use of analytics is not new, we believe the emergence of new technology will unlock even<br />

greater possibilities for organizations and fuel huge growth in this area. This would include, for example,<br />

13. “Loyalty card costs Tesco £1bn of profits - but is worth every penny,” http://www.independent.co.uk/news/business/analysis-<br />

and-features/loyalty-card-costs-tesco-acircpound1bn-of-profits--but-is-worth-every-penny-582877.html; 14. “A month in Tescoland,”<br />

http://www.guardian.co.uk/money/2005/oct/07/consumeraffairs.supermarkets; 15. “Internet key to Obama victories,”<br />

http://news.bbc.co.uk/1/hi/7412045.stm<br />

28


electricity companies being able to predict local demand and inform consumers as to how energy efficient<br />

they are. Or local authorities being able to target crime-fighting resources more effectively and to the areas<br />

that most need them.<br />

So compelling are the examples of the effective use of analytics that organizations can no longer afford to<br />

ignore them as niche or academic pursuits. Analytical intelligence, particularly in the commercial sectors,<br />

is already leading to an information arms race as organizations realize they can’t be passive consumers of<br />

data – they need to be proactive, innovative and assertive in finding, using and embedding information<br />

into their businesses.<br />

2. Understanding Risk and Improving Performance. If competitive advantage is about the market and<br />

the competition, analytical intelligence can also be about turning the microscope inwards. By enabling<br />

a real-time sense of their operating position, an enterprise can understand and improve both their<br />

performance and their exposure to risk. When Google lost several of their senior managers to other<br />

organizations in 2009, the search giant investigated whether they could use analytical methods to<br />

determine if somebody was likely to move and they funded a research project to find out. The result,<br />

Google claimed, was an algorithm that crunched human resources data on pay and performance reviews,<br />

promotion history and other factors. It was able to profile each of their 20,000 workers in terms of their<br />

probability of leaving the company. 16 The company has so far not shared their algorithm with the outside<br />

world and maybe is unlikely to, but the tool illustrates the sort of insight that technology can now deliver.<br />

A second growth area will be in the integration of existing business monitoring tools into single<br />

visualizations, giving enterprises a real-time picture of the state of their business. This is particularly<br />

relevant in the aftermath of the Financial Crisis, the implications of which are still to fully filter through.<br />

Many financial organizations are looking carefully at their information systems to determine how they<br />

can give better warning of such catastrophes and of their exposure to risk.<br />

We anticipate that business outcomes will become more embedded in the way organizations use<br />

technology. For example, instead of measuring the number of transactions through a computing resource,<br />

a company could measure the dollar value of the transactions through the resource. By doing this,<br />

enterprises will have a much clearer view of their business operations.<br />

Finally, we are likely to see an alignment of information technology and operational technology – those<br />

systems that control operational processes, such as a manufacturing line, a power plant or even a road<br />

vehicle. By and large, operational technologies are distinct entities composed of radically different components<br />

and architectures. But physical assets are becoming more IT-enabled, often network-connected with<br />

IP addresses, and the area of automated technology asset management is one area of obvious synergy.<br />

Operational and engineering technologies are also becoming more service-oriented. For example, Rolls<br />

Royce now focuses their aerospace business on the services they provide to their customers, such as<br />

engine health monitoring and pre-emptive fault detection. The creation of an integrated operating<br />

16. “Why Google Employees Quit,” http://techcrunch.com/2009/01/18/why-google-employees-quit/<br />

29


“We are still learning how to<br />

capture and manage all the<br />

rich data that is available to us<br />

inside our organizations and<br />

out in the broader world. We<br />

have just begun to learn how<br />

to tap into all of that and put<br />

it to work for better decisions.”<br />

Marc Silvester<br />

Senior Vice President and<br />

Global CTO, <strong>Fujitsu</strong><br />

environment would be a desirable outcome for most organizations in terms of their agility and their ability<br />

to provide information in real time. The possibilities increase when we consider the implementation of<br />

smart metering, sensor technologies and cheap wireless networks, which will emerge over coming years.<br />

The developments we have discussed in this section are particularly exciting, because they are about a<br />

focus on information. The IT industry is often guilty of emphasizing the “T” of technology rather than the “I”<br />

of information. But some of the other trends we are seeing, such as the commoditization of hardware and<br />

software, and the explosion of the Social Web, mean that our attention will tend to focus much more on<br />

the payload of information that technology is there to carry. And the information is where we find the real<br />

value; it is what the technology is there to exploit.<br />

Key facts<br />

■ There is a voracious appetite for real-time information, but speed often comes at the expense of<br />

accuracy or integrity.<br />

■ The Web is redefining the value of information into new dimensions – dynamism, context and richness.<br />

■ New technologies will further drive information in real time – analytical/search tools, in-memory<br />

processing, grids, and human and computational hybrid systems.<br />

■ Analytical intelligence can be used to great effect to understand customers and markets and create<br />

comparative advantage.<br />

■ Greater operational efficiency can be realized through analytical tools, visualization and the<br />

convergence of information and operational technology.<br />

Key questions<br />

■ How important is real-time information to you?<br />

■ What type of information would give you the greatest advantage?<br />

■ What are the threats and opportunities of exploiting real-time information?<br />

30


Nine key trends<br />

3. Borderless security<br />

Beyond the perimeter<br />

The online world and particularly cloud computing is moving the goalposts of how we secure information.<br />

As impossible as it might sound, the challenge of the future is to secure what we cannot control. This calls<br />

for a new approach and new behavior in terms what we trust and how we perceive value and risk.<br />

How can we secure data outside the bounds of our direct control?<br />

Open security – sound like a contradiction?<br />

Albert Gonzalez was arrested in Miami in August 2009 having perpetrated the greatest credit card data<br />

theft in U.S. history. Gonzalez had hacked into retail systems and targeted 7-Eleven, the supermarket chain<br />

Hannaford Brothers and the New Jersey-based card payment processor Heartland Payment, among others.<br />

He made off with the details of 130 million credit cards. 17 In the U.K. in the same year, hackers obtained<br />

the online résumés of 4.5 million people from jobsite Monster.co.uk, which was the largest instance of<br />

data theft in that country’s history. 18<br />

These examples had malicious causes, but there have been many public security lapses caused by<br />

organizations either having inadequate controls or not observing security procedure. Such failures of<br />

security can be a betrayal of trust. Often, the victims of the breaches are not responsible for the failure and<br />

they had an implicit level of trust that their private information would be kept available and in confidence.<br />

If we remember our starting assumption about increasing change and complexity, it becomes clear that<br />

the problems of securing information are likely to rise over time.<br />

Security of information is underpinned by three characteristics of information assurance – confidentiality,<br />

integrity and availability. These characteristics have been delivered over time by integrating controls into<br />

technology systems. The first computing systems were straightforward to secure because they had a single<br />

defined set of users and were housed in a single physical location.<br />

As systems became distributed, a new security model was required to protect them from the outside. Firewalls<br />

were implemented to control network traffic and tiered application architecture evolved, separating<br />

outward facing components from the more secure internal information stores. Greater protection at the<br />

boundary was provided with a host of security management features to reduce the threat from malicious<br />

programs, spam and denial of service attacks as well as mobile user access features such as VPN.<br />

This is, by and large, the security model that is in place today and it relies heavily on the existence of a<br />

perimeter – a physical boundary through which traffic must pass and be controlled at the point of entry.<br />

The principle of perimeter security is that you trust everything within and mistrust everything outside.<br />

Boundary changes<br />

As systems have proliferated, so the level of complexity of technical architecture has also increased. Large<br />

enterprises run hundreds, sometimes thousands, of application services spread across a variety of geo-<br />

17. ”Government charges Miami man with largest-ever US credit card theft,”<br />

http://www.guardian.co.uk/world/2009/aug/17/us-credit-card-data-theft; 18. “Job website hit by major breach,”<br />

http://news.bbc.co.uk/1/hi/technology/7853251.stm<br />

31


graphical and off-premise locations. Security has tended to be implemented in the same silos as the information<br />

systems, and very few organizations have been able to achieve security federation in their systems.<br />

Complexity is undesirable because it clouds human judgment about what the correct behaviors are. For<br />

example, with many passwords to remember, you are more likely to write them down and store them<br />

insecurely. Complexity is dangerous because it obscures the overall position of information risk. How can<br />

you understand your exposure to risk if you can’t tell where your weaknesses are?<br />

The concept of the perimeter is losing its relevance. Personal mobility and portable media technologies<br />

have meant that information easily and regularly travels beyond the perimeter. Integration with systems<br />

outside of the enterprise is becoming more common as is technical collaboration with other parties. It<br />

is becoming less viable – or efficient – to protect information with respect to a boundary and to rely on<br />

security controls at that interface.<br />

Related to this is the notion that the owners of information and those responsible for securing information<br />

are often different parties – a trusting party and a trusted party. While a level of security can be ensured<br />

through technology and processes, inevitably, a real level of trust – or confidence – will be required from<br />

one of the parties with respect to the other. The implication is that it is confidence, rather than certainty,<br />

that must become the defining characteristic of information assurance.<br />

Enterprise security in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Conventional security model<br />

with access control lists,<br />

locked-down functionality and a<br />

strong perimeter<br />

3<br />

Managed cloud<br />

Open security model, user<br />

credentials assured by trusted<br />

third party<br />

4<br />

11.“Twitter Hits 50 Million Tweets Per Day,” http://mashable.com/2010/02/22/twitter-50-million-tweets/<br />

Enterprise ecosystem<br />

Federated security model,<br />

virtual desktops, much<br />

movement across the perimeter<br />

Consumer society<br />

Level and type of security<br />

determined by individual<br />

choice<br />

32


But while organizations don’t wish to expose themselves to risk, they also don’t want security principles to<br />

prevent them from realizing value. Security is, after all, about delivering value at an acceptable level of<br />

risk. In the light of these challenges, we believe that information security is reaching a tipping point at<br />

which the traditional models are not equipping us to move forward. When we start to think about some of<br />

the other topics raised in this paper – for example, cloud computing or consumer technology – we can<br />

identify information security as a common dependency and as the key to creating the confidence that will<br />

unlock the value.<br />

The challenge of security is particularly amplified when we consider the consumption of information<br />

services from external sources. Our three security characteristics – confidentiality, availability and<br />

integrity – are all associated with control. As organizations and their technology users move towards more<br />

public providers, it becomes less feasible to have direct control and a level of trust becomes necessary.<br />

Information must change from being “stateful” (i.e., secured in reference to a fixed context, such as a<br />

location), to being “stateless”(secured independently of any particular context).<br />

The extent to which information can be secured in this way will largely govern how successfully new<br />

ways of working can be adopted. It is likely that ever more complex networks of services will evolve in<br />

dependence upon a whole array of providers along a value chain. Any one failure could lead to<br />

compromise. In February 2008, for instance, when Amazon suffered a serious outage, a huge number of<br />

Web start-ups were impacted as along with some major sites like Twitter and the New York Times. 19 This is<br />

a very immature area in which security standards are emerging – as are legal and commercial models.<br />

Unlocking security<br />

If the world of information changes to a delocalized, more collaborative space, as we think it will, the<br />

principles of securing information must evolve. If the challenge of the past was to secure the systems over<br />

which you have control, the challenge for the future is to secure the systems over which you have no control.<br />

Or rather, to deliver a level of confidence that information is secure, wherever it might reside or travel.<br />

This will require a new type of thinking. The Jericho Forum is a group of security professionals who<br />

advocate deperimeterization 20 – the complete removal of network boundaries. While this is an extreme,<br />

one might even argue theoretical position; when you start to think about securing the public cloud, the<br />

principles of security without boundaries become extremely relevant.<br />

We believe that two concepts will prove important to the next generation of security systems.<br />

1. Open Security. Open security is based on the idea of a single reference party who assures the identity of<br />

an individual for any transaction they wish to make. In this model, a relying party (an application, service<br />

or site) uses an identity provider to validate an access request from a user (see fig. below). The user trusts<br />

the identity provider with their details, they mutually agree to the level of security they would like to use,<br />

and their dialog is in accordance with an industry standard interface. Under this model, people can also be<br />

19. “Web startups crumble under Amazon S3 outage,” http://www.theregister.co.uk/2008/02/15/amazon_s3_outage_feb_2008/<br />

20. The Jericho Forum, http://www.opengroup.org/jericho/<br />

33


validated on the basis of claims. For example, a claim might be “I am over 21” or “I work for Acme Ltd.”<br />

This enables security that is founded on a person’s characteristics, rather than specifying named<br />

individuals. Crucially, it allows them to securely access places they have never previously visited and<br />

which may be completely ignorant of their existence.<br />

User-centric security<br />

#4: Welcome Sid!<br />

#1: Hi! I’m Sid<br />

#3: Yes,<br />

it is!<br />

Identity Provider<br />

Web site or App<br />

#2: is it<br />

him?<br />

2. Stateless Data. As the relevance of the boundary decreases, it becomes important to secure data<br />

itself. Confidential information needs to be secured independently of the context of its source.<br />

Information-centric security is about protecting a unit of data regardless of its location. There are a variety<br />

of technical methods for achieving this, ranging from certification to digital rights management or to<br />

the setting of time-to-live attributes on data.<br />

But data and information security is not simply a technical problem looking for a technical solution. In<br />

the real world, information is too rich, too complex and too varied to treat it with a single model.<br />

Different styles of information will call for different approaches. Understanding the relationships between<br />

data, security, trust and privacy will be the key to providing information assurance in the future.<br />

But aside from practicalities of their security practices, organizations will face some more fundamental<br />

questions. How much do they need to control? Whose responsibility is the security of information?<br />

The U.K., e.g., has recently seen huge opposition to storage of personal information on large databases –<br />

such as national identity and health record schemes. Paradoxically, at the same time, the popularity of<br />

social media, of which personal information makes up a large part, seems to know no bounds.<br />

34


“Security and privacy concerns<br />

are two of the most important<br />

obstacles keeping us from<br />

realizing the full value of our<br />

technological capabilities.<br />

Much like parenting approaches<br />

change as children grow<br />

older, we now need revised<br />

approaches for protecting data<br />

and establishing trust as our<br />

data begins to become<br />

independent and leave home.”<br />

Joseph Reger<br />

CTO<br />

<strong>Fujitsu</strong> <strong>Technology</strong> Solutions<br />

This might be best explained in the context of personal choice. Where privacy is concerned, individuals<br />

are more likely to have confidence in the systems they have personally chosen, rather than in those they<br />

had forced upon then. Giving more control to individuals brings with it a new set of challenges, but it<br />

may be the best way to deliver the efficiency and value that organizations will demand – for an acceptable<br />

level of risk.<br />

Key facts<br />

■ With much information now held electronically, security failures involving data held by a third party will<br />

often compromise trust.<br />

■ Traditional security models are ill-equipped to deal with the future as greater mobility and integration<br />

cause the perimeter to lose its relevance and as privacy concerns grow.<br />

■ Confidence will replace control in the mitigation of risk.<br />

■ Open security and securing of stateless data are two practices that will support the evolution.<br />

■ Information security is not necessarily a technology problem. It calls for a greater understanding of the<br />

different styles of information, and of the specific risks and implications associated with each type.<br />

Key questions<br />

■ How do you balance information security risk verses the need for greater efficiency and value?<br />

■ Does your business strategy drive information security or vice versa?<br />

■ How relevant is the security perimeter to your organization?<br />

35


Nine key trends<br />

4. Invisible technology<br />

Hidden in the clouds<br />

In recent years, the advances made in high-speed networking have made it increasingly more attractive<br />

to generate business benefits by creating flexible and scalable pools of computing resources off site. Cloud<br />

computing abstracts the physical computing technology out of our daily lives. This changes everything<br />

about the way we choose, consume and execute technology services.<br />

Which of your workloads could soon be running on someone else’s technology?<br />

Reach for the sky<br />

In computing, the cloud has long been used as a visual metaphor to represent something that performs a<br />

particular function, but which is too big, too complex or too remote to be portrayed in detail. Some four<br />

decades since technical architects first drew clouds on their infrastructure diagrams, the term has become<br />

the most hyped technology trend of its era. And while it has a new meaning and context, it has not lost<br />

this original sense of abstraction. In fact, as we shall see, abstraction lies at the heart of what we now call<br />

cloud computing.<br />

Cloud has come about from a number of different innovations, none of which today would be considered<br />

new concepts; but it is the convergence of these things at a point in time that is significant and which has<br />

the potential to open up exciting possibilities. Cloud has a heritage in Utility Computing – the concept of<br />

an on-demand, metered service that was integral to mainframe computing and broken by the personal<br />

computing revolution before we really appreciated its value. Cloud also draws on the horizontally scaled<br />

resource paradigm of Grid Computing and the distributed configuration of Service Oriented Architecture<br />

(SOA); both ideas that enjoyed massive hype in the early 2000s.<br />

Nonetheless, it is the development of cheap, high-bandwidth networks that have really enabled cloud<br />

to become a reality. Cloud computing can be described in a variety of different physical forms, such as<br />

public, shared, private and so on, and it has technological, physical, financial, commercial and strategic<br />

dimensions. But the essence of cloud is what it means to the consumer. As a consumer, you want to<br />

purchase a service and not be concerned with how that service is engineered – and to have the flexibility<br />

to expand, contract or terminate as you wish.<br />

On cloud nine<br />

Many organizations are already exploiting cloud computing. The European Space Agency’s Gaia project,<br />

for instance, is mapping the billion brightest stars in our galaxy and is a heavily computing-intensive<br />

undertaking. It has purchased all of its computing resources from the cloud, much of it from Amazon. 21<br />

The cloud is already crucial for the platforms of many popular application services such as Twitter and<br />

Facebook, which would have been really challenged to manage their high levels of growth with traditional<br />

on-premise systems architecture. Indeed, for “green field” implementations and small businesses, cloud<br />

would seem to be a natural and obvious path to take. Many analysts expect it to be a significant delivery<br />

channel in only a few years’ time.<br />

21. Gaia, The European Space Agency, http://sci.esa.int/science-e/www/area/index.cfm?fareaid=26<br />

36


But will mainstream businesses and large enterprises really be able to realize value from it? We believe<br />

that cloud computing draws on some key principles that have the potential to create real value for them.<br />

By adopting cloud computing, organizations can become agile in the way they consume IT services. They<br />

can avoid costly start-up times, depreciation and the regular cycle of technology refreshes. They will be<br />

able to experiment more and try out new services without committing significant resources. This will lead<br />

indirectly to cost savings and also to value from greater innovation. Further, the cloud can abstract the<br />

complexities of delivering business services away from an organization, allowing them to be consumed in<br />

a commoditized format on an on-demand basis.<br />

Enterprises will have the potential to operate more efficiently through the cloud. Purchasing services in<br />

this way will enable the types of economies of scale that large commodity suppliers can offer. These<br />

economies will apply across the board, not just for hardware and software, but for facilities and power<br />

and so on. As the market matures, costs are likely to drop further.<br />

Our vision of cloud describes four distinct “as-a-service” modes of consumption that organizations will<br />

undertake. In addition to technology consumption, organizations will have demands for content and<br />

business services that they will also wish to purchase in a scalable and elastic way. These four modes of<br />

consumption are illustrated in fig. below.<br />

What cloud means to us – Four modes of consumption<br />

Activity<br />

Encapsulated business processes<br />

and functions as a service<br />

Infrastructure<br />

Delivering compute, storage,<br />

networking and infrastructure<br />

applications<br />

Pay Per Use<br />

Self Service<br />

Elastic and Scalable<br />

Content<br />

A service model delivering content<br />

and data as a service<br />

Application<br />

Packaged applications supplied<br />

through pay-as-you-use service<br />

Typically, consumption will consist of a blend of these four modes, with the relative proportions changing<br />

as markets and business models mature. For example, the market for applications and infrastructure is<br />

currently more mature than the market for activity and content. Over time, there will be a natural drift<br />

towards this second pair of modes and the focus will switch from technology services to business services.<br />

37


This has significant implications, not least that it changes the way customers will behave. For example, we<br />

anticipate cloud services eventually being purchased by business functions rather than by technology functions.<br />

While much of the focus we see today is on technology offerings, radical change will become reality<br />

when businesses process content from the cloud and brokered services can be consumed from the cloud.<br />

But to understand the full implications of cloud, we need to think beyond there being a single form<br />

of enterprise IT because the cloud creates the potential for delivering information systems in a<br />

larger dimension.<br />

We can anticipate that the cloud will provide cheap and massively scaled computing power on an<br />

unprecedented scale. When we consider the convergence with innovation in user devices, telecommu-<br />

nications, sensors, wireless networks and ubiquitous computing – “the Internet of things” – and the<br />

huge scale of information that can be processed, we can start to think of computing on a societal scale.<br />

For example, we believe that clouds will evolve to control water supply, energy provision and traffic flow<br />

across entire societies.<br />

Such systems will greatly challenge social characteristics that we take for granted; the distinction between<br />

consumer and provider will become blurred as will that between public organization and private company.<br />

The potential to deliver much greater value and efficiency to the whole of society is huge and this is one of<br />

the most exciting aspects of the cloud.<br />

Cloud computing in our scenarios<br />

1 2<br />

Traditional enterprise<br />

<strong>Technology</strong> resources consumed<br />

in a conventional way<br />

3<br />

Managed cloud<br />

Public clouds and Virtual<br />

private clouds and Software<br />

as a Service platforms<br />

4<br />

Enterprise ecosystem<br />

Private cloud infrastructure<br />

implemented within the<br />

enterprise boundary<br />

Consumer society<br />

Everything in the cloud<br />

38


Stormy weather<br />

In 2010, the hype surrounding cloud computing was immense. Where there is hype, disappointment<br />

usually follows, and we can expect a period of controversy as organizations are confronted with the reality<br />

of delivering it. The extent to which cloud will be adopted is uncertain. Some organizations will be challenged<br />

more than others – smaller and newer organizations will be able to exploit it much more readily.<br />

Cloud brings with it some new and unique challenges. One obvious challenge is caused by complexity.<br />

In the short and medium term, enterprises will consume a variety of cloud-based services as well as<br />

conventional, on-premise services.<br />

Managing a hybrid estate will create a headache for service management and particularly for IT security<br />

and governance. Coupled with this, it is likely that more and more services will be purchased from outside<br />

of IT functions, and control and governance (of technology) will be eroded. We might compare this to what<br />

happened in the PC revolution – while this delivered considerable value to businesses in terms of reduced<br />

computing cost and increased functionality, the complexity of technology management rose as a result.<br />

Secondly, the execution of a cloud strategy is not a simple process. For example, migration, reconfiguring<br />

of application interfaces and integration into business processes are all likely to be required. There could<br />

be technology or regulatory constraints that lock cloud customers into particular suppliers and reduce the<br />

agility benefit that cloud offers. Organizations will be tested to transform the way they operate internal<br />

services, which again will be compounded in hybrid estates.<br />

And finally, cloud computing is truly a game-changing development. Moving services into the cloud<br />

involves a different set of risks, or even a recalibration of risk that may prove challenging for many<br />

business cultures.<br />

Fresh thinking on security will be required to cater for information and services that now reside outside of<br />

organizational boundaries, and to integrate with other remote systems. And as markets mature, this is not<br />

just about technology, but about business activities and the processes that their operations depend on.<br />

So there are some caveats. Cloud requires us to take a strategic view and invest accordingly. In fact, we<br />

believe that capitalizing on the value of cloud will require organizations to gain a better understanding of<br />

their business and its relationship with technology.<br />

Getting there<br />

Moving to the cloud will involve a level of business change that organizations have not seen since the<br />

dot.com boom. As organizations contemplate the transformation, we see three areas that they will need<br />

to focus on:<br />

39


1. Managing Choice. In the last century, choices around technology were limited. <strong>Technology</strong> was<br />

expensive, people lacked skills and organizations built up their own technology capabilities based around<br />

a relatively small number of platforms and products. Today, these constraints have been removed and<br />

organizations have choices at almost every level of technology provision – who performs the service,<br />

where it is located and so on. In all likelihood, choice will continue to proliferate. Moving to the cloud is not<br />

a simple, one-size-fits-all equation; it requires a series of business decisions to be made based on<br />

objectives and value. It is, therefore, key to set strategy that supports choice and not rely on a limited set of<br />

mandated options. In order to make choices, organizations will need to understand their baseline. If a<br />

supplier reduces their compute costs by 30%, how does the customer respond? This pricing change may<br />

be sufficient to drive an architecture change. To get the greatest benefit, organizations will need to be able<br />

to respond dynamically to market changes.<br />

2. Moving to a Cloud Operating Model. Organizations will need to consider how they will manage and<br />

operate their service. It is likely that they will consume services from a variety of sources – private, public,<br />

shared – and operate this hybrid blend of resulting services. In order to do this, organizations will need to<br />

evolve their risk, governance, service, commercial and business process frameworks. As we have seen,<br />

cloud is underpinned by abstraction – taking complex and variant technologies and activities, and<br />

abstracting them to a logical, service-based view so that everything looks the same.<br />

3. Executing a Business Strategy. As the cloud market matures, many organizations will consume services<br />

in the different modes we have described. Each mode will impact the relationships their businesses have<br />

with technology, and the way that organizations operate could change radically. Understanding what<br />

constitutes the core business and non-core business functions will be crucial in this regard. This will drive<br />

the areas where organizations can really innovate and drive competitive advantage – as well as governing<br />

the barriers to enter new areas of business or the risks of being joined by competitors in existing spaces.<br />

Organizations must think of their technology and services as a supply chain rather than an area of real<br />

estate they control and manage. They must understand risk, cost and core value.<br />

As we write, cloud computing is immature and currently a subject of great hype. As the market matures,<br />

so some of the barriers will erode and the cloud will grow. And we anticipate that it will become a major –<br />

the major channel for the delivery of technology and business services.<br />

40


“Few people know the details<br />

of how their water or electricity<br />

are delivered. They just expect<br />

things to work consistently<br />

and at a reasonable price.<br />

That’s where we are headed<br />

with computing.”<br />

Marc Silvester<br />

Senior Vice President and<br />

Global CTO, <strong>Fujitsu</strong><br />

Key facts<br />

■ We are increasingly moving toward cloud computing, which is characterized by pay-per-use, self-service<br />

models that provide elasticity and scalability.<br />

■ We identify four modes of cloud consumption – infrastructure, application, activity and content. The<br />

latter two representing a fundamental shift in the way IT creates value<br />

■ The convergence of cloud computing with other technologies brings potential for large-scale, high-value<br />

“social” systems such as traffic management.<br />

■ These changes bring three key challenges: complexity, execution and risk measurement.<br />

■ To achieve all the available benefits, organizations must look to exploit three practices: managing<br />

choice, moving to a cloud operating model and executing a clear business strategy.<br />

Key questions<br />

■ How will cloud computing change the way you consume technology and business services?<br />

■ What obstacles will you need to overcome to exploit cloud computing?<br />

■ What are the risks and benefits to you and your competitors?<br />

41


Nine key trends<br />

5. Connecting the consumer<br />

Ultimately, everybody’s a consumer<br />

Consumer technology has overtaken business technology as the driver of innovation and the explosive<br />

growth occurring in the mobile device market is fuelling further change. People enjoy better technology at<br />

home than at work. In fact, some people even have access to better technology during their commute to<br />

work than they have at their workplace.<br />

How do you plan to accommodate the growing desire among staff members to choose their own<br />

productivity tools?<br />

People in the middle<br />

The growth of mobile devices in the last ten years has been staggering. In 2009, for the first time,<br />

global sales of notebook and netbook computers exceeded desktop computer sales. Incredibly, by the<br />

beginning of 2009, there was one mobile phone for every two people in the world. 22 Global mobile phone<br />

penetration has risen from 13% in 2001 to 70% in December 2009 as developing countries have<br />

leapfrogged a generation of technology to go straight to the mobile device. 23 This is most marked in Africa,<br />

where cell phones account for 90% of phone users. 24 In the mature European market, a quarter of<br />

households have stopped using fixed lines and mobile penetration stands at 125% – and is growing at 8%<br />

per annum. 25 The mobile handset is close to global ubiquity.<br />

Client devices in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Standard device portfolio with<br />

limited choice and locked down<br />

3<br />

Managed cloud<br />

All client access via browser,<br />

client devices governed<br />

by software standards only<br />

4<br />

Enterprise ecosystem<br />

Virtualised desktop environments<br />

and thin clients, self procurement<br />

of devices<br />

Consumer society<br />

Anything, chosen and purchased<br />

by the user<br />

22. “Finding value in smartphones,” Bank of America Merrill Lynch 2009, p.7; 23. International Telecommunication Union Information<br />

Society, Statistical Profiles 2009, Asia and the Pacific; 24. Africa - Fixed-line Telecommunications and Infrastructure Statistics,<br />

https://www.budde.com.au/Research/Africa-Fixed-line-Telecommunications-and-Infrastructure-Statistics-tables-only.html?r=51<br />

25. “European Mobile Operators,” www.companiesandmarkets.com<br />

42


What is perhaps more interesting is that, following behind, is the accelerating global smartphone market<br />

which is already growing at an incredible rate. The significant fact about the smartphone is that it puts the<br />

user in touch with digital content and experiences; in the developing world – three quarters of the world’s<br />

population – the smartphone IS the Internet.<br />

To start with, this has a huge impact in terms of the market volume. Around a billion mobile devices were<br />

sold globally in 2009, with sales of traditional handsets reaching a plateau and smartphones on the rise.<br />

This is an absolutely huge market. It carries with it not just a device, but the whole chain of suppliers of<br />

components, products, services and content. But there is a greater implication in terms of reach. The<br />

increasing mobile market is rapidly connecting people in huge numbers that were once beyond the reach<br />

of digital services.<br />

A global dial tone<br />

Ten years from now, it is likely that the smartphone will have reached global ubiquity, and if the rate of<br />

growth continues to increase, this could happen within five years. The implications of this are as big as<br />

they are uncertain. However, we can anticipate with reasonable confidence:<br />

■ The global demand for online digital and information services is set to explode.<br />

■ The smartphone will become the global “common denominator” for consumer transactions.<br />

For the developed world, information services are predominantly accessed by computers over fixed lines.<br />

But smartphones and small-form-factor mobile devices are changing our assumptions about how people<br />

consume information. Organizations will need to focus on this as a major channel and also as a new way<br />

of thinking.<br />

The technologies of business and consumer computing will naturally continue to advance and proliferate,<br />

but the idea of what represents the core channel is set to change, see Fig. below. This has large<br />

implications for mobile commerce (m-commerce) applications as the vision of reaching the entire global<br />

population is becoming a reality.<br />

The world may still have regional divides, but this will be defined only by cultural and language<br />

boundaries, not by technological or physical reach. The personal device will attract innovation, investment<br />

and a growth in m-commerce. It will also compliment and drive the demand for cloud services.<br />

43


Growing global reach of technology<br />

Reach of Business<br />

<strong>Technology</strong><br />

World population<br />

Reach of Consumer<br />

<strong>Technology</strong><br />

Reach of<br />

Digital Information<br />

& Services<br />

Will we see a convergence of device? We believe this is unlikely. People have preferences around cost, size,<br />

performance, design and even prestige. We see a range of radically different models in other consumer<br />

products (consider televisions or even cars). But we may well see more globalization of technology<br />

standards and digital services as we approach global device ubiquity.<br />

So not only is the information market about to mushroom, we believe the smartphone (or personal<br />

device) will become the primary channel for digital services.<br />

Are we being served?<br />

Choices around devices are becoming increasingly complex. Where once it was a simple matter, a vast<br />

array of form factors and mobility options is now available. Besides the ever-increasing range of desktop<br />

and laptop PCs, devices such as tablet computers, smartphones, netbooks, e-book readers and games consoles<br />

are all now widely available. Demand continues to grow from increasingly IT-savvy consumers for an<br />

ever-expanding range of devices and services all the time. They expect – and get – more for their money.<br />

Over time, there has been a shift in the home of innovation from the business market to the consumer<br />

market. The pace of change is accelerating, and the range of user devices and services continues to<br />

44


proliferate. New technologies will lead to ever more desirable consumer electronics and form factor<br />

will become a matter of choice without limiting compatibility. People consume different devices to suit<br />

different activities, rather than pick one that suits them best for everything they do.<br />

When personal computing first became mainstream, a whole new industry of business IT services arose<br />

as a result. At the time, technology was difficult to configure and people did not have the skills to be able<br />

to service themselves, for example to connect a computer to a network. We did not generally access<br />

computing resources outside of the workplace. Throughout the 1980s, the price of business computing<br />

generally precluded consumers from gaining access to it; computing for consumer markets looked very<br />

different and was limited to hobby and games devices.<br />

It was only by the end of the millennium that personal computing had become mainstream, and that<br />

business and consumer devices had essentially become the same thing. It is notable that Microsoft retired<br />

their mission statement “a PC on every desk and in every home” in 2002. But in 1990, the vast majority<br />

of new entrants to the workforce had never used a personal computer before. Desktop services were<br />

designed around an assumption that organizations were best placed to provide computing services for<br />

their users.<br />

With any new technology, it is common for a service industry to build up around it. Often, the innovation<br />

may be technically difficult to use, and people are unfamiliar with it. But history tells us that once people<br />

become comfortable, they prefer to be self-sufficient. Fueling-station pump attendants and telephone<br />

operators, once mainstream jobs, have all but disappeared. Many people now prefer to do without travel<br />

agents to book their vacations. While a computing estate is clearly a much more complex thing than a<br />

forecourt, we believe that consumerization will drive the responsibility of many of the aspects of technical<br />

support and purchasing back to the user. Putting human behavior aside, there are also some compelling<br />

business reasons to justify this:<br />

■ There are now considerable economies of scale offered by the consumer market, and not just around<br />

devices, but for support, fixed and mobile network connectivity. Prices in the consumer market are low<br />

and highly competitive.<br />

■ The cost of control is prohibitive for many organizations. Corporate governance is not agile enough to<br />

deal with the huge and growing range of consumer devices. Consequently, organizations restrict users<br />

to a few simple options, denying users the value from new choices that innovation is bringing.<br />

■ Enabling employees to make choices about devices creates greater efficiency in the workplace.<br />

Employees would select the devices that align most closely with their working lives.<br />

We believe that enterprise desktop services, as we know them today, will come to be regarded as<br />

superfluous. Allowing individuals to take greater responsibility for their personal technology will enable<br />

the self-sufficiency that most people prefer and provide organizations with the ability to unlock large<br />

cost savings.<br />

45


While we believe there are compelling reasons that an organization may wish to retain control of some or<br />

all of their desktop estate, this can only be justified on risk and security type arguments or for specific user<br />

groups or business applications. In 2010, the retention of desktop services is becoming harder to support<br />

on a cost or value argument.<br />

Consumerization is a trend that we believe could move quickly when it has reached its tipping point,<br />

because the cost differential is going to become so great. We believe that client virtualization will be a<br />

key enabler of the use of consumer technologies within enterprises. This can be implemented in many<br />

different ways, and as the technologies mature and gain acceptance, it will become easier for organi-<br />

zations to create virtual workspaces with no dependency on the client device.<br />

<strong>Technology</strong> will generate better and better experiences for people. The quality of the experience will be<br />

increased – not only by a range of exciting new technologies, but particularly by giving people the choice.<br />

The consumer vision is about enabling and taking advantage of choice, while removing the constraints<br />

which hold this back.<br />

Always on<br />

The developments of consumerization and global availability of devices are key trends, but this is by<br />

no means the end of the device story. Networks will play a crucial role in the development of consumer<br />

devices and will continue to be a major driver of change and innovation in information technology. We<br />

believe that the continued advance of networking technology will move society into an “always on”<br />

mindset, where digital access becomes completely pervasive and the act of connecting turns into a<br />

redundant or invisible step.<br />

We anticipate that consumer channels, such as Fiber to the Home (FTTH), 3G and WiMAX will be<br />

increasingly employed by enterprise users. Organizations will be able to exploit public infrastructure as<br />

a means of creating corporate connectivity.<br />

Next generation network services, such as WiMAX and iBurst, will provide broadband-capacity wireless<br />

bandwidth. If these technologies deliver on their promise, they will enable high bandwidth mobile<br />

connectivity. 4G networks will deliver the next generation of mobile functionality and a whole range of<br />

exciting possibilities, such as real-time video. Fixed networks are set to deliver improved performance<br />

through widespread use of fiber, especially as the trend for competition for suppliers in this area.<br />

Consumers will have greater choices over how they make phone calls, and they will increasingly make<br />

zero-cost IP telephony calls when they are on a fixed network or even a WiFi network. In developing<br />

countries, users will continue to consume services from mobile phones and smartphones. We will see<br />

further innovation, which will enable users to perform transactions from mobile devices.<br />

There are huge customer experience possibilities with these technologies, for example as a replacement<br />

for tickets or being able to read smart posters on the move. In environments like airports, technology will<br />

46


“Most of the best technological<br />

innovation these days is<br />

coming from the consumer<br />

space, and few businesses can<br />

afford to cut themselves off<br />

from the benefits of mobility,<br />

usability and economies of<br />

scale that this creates.”<br />

Glen Koskela<br />

CTO Nordic, <strong>Fujitsu</strong><br />

enable all passenger interactions – from the check in, security checks, boarding information and flight<br />

information right up to boarding the airplane.<br />

Context awareness and augmented reality are becoming adopted more quickly than anybody anticipated<br />

thanks to smartphones, and particularly to the iPhone and the huge innovation taking place with its<br />

apps. Augmented reality is being applied to mapping technologies and is also being rapidly adopted by<br />

transport and retail organizations to deliver information into the field of view. Context awareness is a<br />

broader area, but it entails delivery of information from the user that represents location, or something<br />

else about their context, the time of day perhaps, their language and their history of transactions with that<br />

particular source. Of these, location awareness is probably the most mature, being available through GPS<br />

or network triangulation to smartphones.<br />

The introduction of location awareness into social media brings massive opportunities. Being able to answer<br />

the “who is the nearest person to me who…” question opens up many possibilities for business and<br />

social uses. Beyond this, we will enter a sensor-enabled world, where many transactions that we take for<br />

granted today will be carried out automatically for us – for example unlocking a door, or even driving a<br />

car. Wherever we go, whatever we do, there will be a network in the background, interacting with us and<br />

linking us to a whole new world of digital services.<br />

Key facts<br />

■ Mobile phones are set to become globally pervasive, and smartphones soon after; nearly the entire<br />

global population will soon participate in the market for digital services.<br />

■ Consumer technology has overtaken business technology as the driver of innovation.<br />

■ Consumerization (or self-provisioning) of technology can deliver value to businesses through the<br />

economies of scale that are made possible by the consumer marketplace and by better alignment of<br />

technology and its use.<br />

■ New technologies are driving “always on” device functionality – for example WiMAX, 3G, iBurst and<br />

near-field communication.<br />

■ We can realize huge value from exploiting sensors and location awareness technologies, and these<br />

capabilities will drive future connectivity.<br />

Key questions<br />

■ How will a digitally connected world impact your business?<br />

■ How much freedom should employees be given over technology choice?<br />

■ How would being “always on” change the way you and your customers live?<br />

47


Nine key trends<br />

6. Off-the-rack software<br />

Suites of commodities<br />

Enterprise applications are becoming commoditized. This change is being driven by demand for Software<br />

as a Service (SaaS) offerings and further fuelled by the now insatiable appetite for consumer apps.<br />

Commoditized apps will generate huge innovation and greatly lower the cost of failure in IT initiatives.<br />

This will enable organizations to realize the granular requirements of their specific businesses while<br />

simultaneously taking advantage of the economies of scale.<br />

Are you ready to continuously rebuild your IT services to match the need?<br />

An IT gold rush<br />

In the summer of 2008, Apple launched the App Store, an online shop serving users of the iPhone and the<br />

iPod Touch. By the following summer, they were offering 50,000 apps; by November of 2009, this had<br />

doubled to 100,000 apps. The three billionth app was downloaded in January 2010 26 and there are now<br />

in excess of 290,000 apps on the store. 27<br />

The runaway success of this business has surprised a lot of analysts and maybe even Apple itself, which<br />

has regularly insisted that it is not in the content business and only wants to sell more devices. That the<br />

store has enjoyed this level of success is a strong indicator of the viability of commodity applications. The<br />

Applications in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Monolithic business<br />

applications, bespoke and<br />

licensed and installed locally<br />

3<br />

Managed cloud<br />

Software as a Service,<br />

Platform as a Service<br />

subscription applications<br />

4<br />

Enterprise ecosystem<br />

Virtualised, packaged, licensed<br />

applications delivered by thin<br />

client or private apps stores<br />

Consumer society<br />

Free and Open Source<br />

applications from web sources<br />

and public app stores<br />

26. “Apple’s App Store: From 2 To 3 Billion Downloads In Just Over 3 Months”<br />

http://techcrunch.com/2010/01/05/app-store-3-billion-downloads/; 27. “App Store Stats Summary,” http://148apps.biz/app-store-metrics/<br />

48


usiness world has been envisioning a commodity online software model for some time through<br />

developments such as SaaS. But the consumer market, without the constraints of corporate governance,<br />

interdependent technologies or complexities, and with the benefit of a giant user base, has delivered<br />

first. To regard this as only a consumer trend is misleading. A gold rush is now taking place in the world of<br />

business software as the race to bring online commodity software products to the market intensifies. The<br />

success of the consumer app stores, of which Apple’s is the most popular, has spurred on SaaS adoption<br />

in the enterprise environment; many large organizations aspire to having online repositories for their<br />

corporate applications. In the autumn of 2009, both the U.S. 28 and the U.K. 29 governments announced<br />

major app store projects to pilot the software distribution models of the large community clouds they<br />

plan to build.<br />

Large software vendors are struggling to adapt to the changing marketplace as innovative new players,<br />

such as Salesforce.com, establish major footholds in the applications industry.<br />

In the short term, we believe we will see a growth in online- or cloud-applications and hosed platforms<br />

(for example Microsoft Azure), will become major channels for applications to run from. In all likelihood,<br />

some new entrants will also appear in this space – names we are unfamiliar with and perhaps some that<br />

we are. We believe there will be a major growth in SaaS and particularly a growth in enterprise apps stores<br />

mirroring or even utilizing the consumer apps market. Packaged software appliances – applications that<br />

include operating system, security and management components – will become common and, in the<br />

medium term, they will be packaged for cloud platforms.<br />

Mashing up<br />

Back in January 2010, when the U.K. was in the grip of a harsh winter, an application by a developer called<br />

Ben Marsh enjoyed widespread popularity. His “snowfall mashup” 30 enabled users to broadcast their<br />

location (the first three letters of their postal code) and the level of snowfall they were experiencing (on<br />

a scale of 1-10) using Twitter. The application then plotted this simple data on a Google Earth map. As the<br />

application grew in popularity, it very soon had thousands of people contributing. By aggregating this<br />

content, the application became a highly accurate real-time weather map of the U.K.<br />

There are hundreds of similar examples of mashups – simple applications that are created by exploiting<br />

and combining publically available applications or data. Google Flu Trends, for example, enables<br />

individuals to track the global spread of flu outbreaks by analyzing search content in a geographic<br />

context. Moreover, most major world cities now have a traffic congestion tracking application.<br />

An important reason for the growth of mashups is that application innovation is becoming quicker, easier<br />

and cheaper. It is now quite possible to deliver real value from software without the investment in<br />

development that was once required. The snowfall mashup is a good example because it illustrates<br />

differences between traditional and new software. In particular, it shows how a software service can drive<br />

value from its own user base.<br />

28. “US Government Launches Cloud Application Store, But The Toughest Questions Remain Unanswered,”<br />

http://blogs.gartner.com/andrea_dimaio/2009/09/16/us-government-launches-appsgo/; 29. “Government to create own private cloud,<br />

app store,” http://www.itpro.co.uk/618334/government-to-create-own-private-cloud-app-store; 30. “Snow UK: how Ben Marsh is using<br />

Twitter to create data,” http://www.guardian.co.uk/news/datablog/2010/jan/05/snow-ben-marsh-twitter-data<br />

49


The rise of the mashup is evidence of a more general development trend. We are seeing both individuals<br />

and organizations innovating new software and services by taking advantage of existing free sources, by<br />

hooking into application programming interfaces (APIs) of existing services, and by combining private and<br />

public resources. Before we look at the impact of this, it is useful to examine one further trend.<br />

The falling cost of failure<br />

In 2007, it was estimated that the cost of failed software projects in the U.S. amounted to some $75<br />

billion per annum. 31 There have been some high-profile failures, notably the FBI’s electronic case system,<br />

which was cancelled after spending of some $170 million. 32 In the U.K., it has been estimated both by<br />

independent 33 and internal sources 34 that only 30% of U.K. government software projects achieve success.<br />

Nevertheless, things are not much better in the private sector. In 1996, FoxMeyer – at the time the<br />

fifth largest pharmaceutical company in the world – was bankrupted largely because of a failed ERP<br />

implementation. 35 U.K. retailer Sainsbury’s had to scrap a £150 million warehouse system in 2003. 36<br />

Given the scale of this problem, detailed analysis is difficult to find; perhaps not surprisingly, IT<br />

professionals don’t like to dwell on their failures. A 2007 study found that, among other things, 31% of<br />

IT managers think they are more likely to win their national lottery than they are to have a trouble-free<br />

IT project. 37 A 2009 report by Standish Group is the most detailed analysis on this subject. It confirms the<br />

poor delivery record. 38<br />

These are examples of highly complex projects that would always have carried a high level of risk. It is all<br />

too easy to make judgments with hindsight about poor specification or poor management. What this<br />

trend highlights, however, is that there is inevitably an appetite from enterprise software consumers to<br />

do things differently.<br />

The growing availability of SaaS offerings and the new generation of vendors offering services from the<br />

cloud are giving organizations a reason to pause for thought. Accepting a solution that, off the shelf,<br />

meets most, but maybe not all of their technical requirements is more attractive than a costly and lengthy<br />

development cycle and a truck load of risk.<br />

The increasing ease with which composite applications can be created and the inclusion of Web 2.0-type<br />

content and functionality in software is leading to an environment in which experimentation and<br />

innovation in applications can happen very quickly and at relatively low cost. Given that we can expect<br />

standardization around software interfaces to continue and development toolsets to become richer and<br />

more widely available, the possibilities become even more thrilling.<br />

In our view, the most significant implication of these software trends is that the cost of failure is being<br />

greatly reduced. Where in the past business applications took months and years to implement, in the<br />

future it will be days. Organizations will be free to experiment and test in real time and business<br />

innovation will, as a result, increase exponentially.<br />

31. “Calculating the cost of failed software projects,” http://www.computerweekly.com/Articles/2008/05/06/230115/Calculating-the-costof-failed-software-projects.htm;<br />

32. “Missing software kept Chinook Mk3 helicopters in Wiltshire hangar,” http://www.timesonline.co.uk/<br />

tol/news/politics/article6808604.ece; 33. The Joseph Rowntree Reform Trust, Database State, 2009; 34. “Public sector IT projects have<br />

only 30% success rate - CIO for Department for Work and Pensions,” http://www.computerweekly.com/blogs/tony_collins/2007/05/publicsector-it-projects-have.html;<br />

35. “SAP and Deloitte Sued by FoxMeyer,” http://www.nytimes.com/1998/08/27/business/sap-and-deloittesued-by-foxmeyer.html;<br />

36. “CIO Jury: Is IT to blame for £290m Sainsbury’s loss?” http://www.silicon.com/management/cio-insights/<br />

2004/10/22/cio-jury-is-it-to-blame-for-290m-sainsburys-loss-39125219/; 37. IT Projects: Experience Certainty, Dynamic Markets Limited<br />

(Sponsored by TCS), August 2007; 38. CHAOS Summary 2009, http://www1.standishgroup.com/newsroom/chaos_2009.php<br />

50


This has absolutely huge implications for organizations in terms of both new opportunities and risk from<br />

competition. Legacy applications will not disappear overnight, and indeed where they deliver core<br />

business value, the argument for reengineering may not be supported. But we anticipate that an<br />

application revolution will occur in the business world with as-a-Service methodology eventually being<br />

the prevailing method of delivery.<br />

Vertically challenged<br />

As the SaaS market grows, commoditization of applications will enable software to become even more<br />

embedded into the business. While some of the developments we have discussed around consumer apps<br />

stores have mass impact, innovation will undoubtedly occur in more niche markets. We will see substantial<br />

innovation around business-specific applications; indeed, much of the early adoption of commodity software<br />

will be to address specific business tasks. We expect four interesting factors to come into play here:<br />

1. Architecting Business Process. We believe that business processes will play an increasing role in the<br />

architecture of applications and systems. Business process visualization tools will enable greater<br />

awareness of business outcomes and we anticipate that methods like Business Process Modelling (BPM)<br />

will evolve to deliver truly business-transaction-aware applications.<br />

2. Vertical SaaS. With the maturing of the cloud market, more vertical solutions will become available as<br />

discrete offerings (for example, a boutique hotel management application or an advertising agency<br />

application) that contain the required functionality to support a core business operation. SMEs are obvious<br />

consumers of these types of services, but vertical offerings will be developed that bundle different SaaS<br />

offerings into single vertical solutions.<br />

3. Activity as a Service. We have identified Activity as a Service as one of four cloud consumption modes.<br />

Although this is currently an immature market, we anticipate it growing quickly as organizations become<br />

able to consume common business activities in a flexible and scalable way. This is a natural evolution<br />

from the vertical SaaS model in which customers consume business activities from the cloud rather than<br />

software. An organization may process its payroll, financial clearing or security checking: these business<br />

services will be defined, encapsulated, commoditized and made available as subscription services.<br />

4. Convergence with Operational <strong>Technology</strong>. As we describe in “real-time insight,” we are likely to see<br />

a convergence of operational business systems and information systems. Operational technology is the<br />

most customized of all business systems, but this will eventually see an alignment with other technology<br />

systems, and in some cases it will be consumed from external supply.<br />

51


“The commoditization and<br />

service-oriented delivery of<br />

applications will revolutionize<br />

the way that organizations<br />

meet their software needs.<br />

This will significantly lower<br />

costs while speeding up the<br />

implementation process, thus<br />

solving two of the problems<br />

that have hindered IT for a<br />

long time now.”<br />

Craig Baty<br />

GM Marketing & CTO, <strong>Fujitsu</strong><br />

Australia & New Zealand<br />

Key facts<br />

■ Commodity applications and app stores have been a big success in the consumer marketplace, while<br />

enterprise application development projects have a poor record of success, often at great cost.<br />

■ Commoditization of applications and composites, such as mashups, will greatly reduce the cost of failure<br />

and create a boom in application innovation.<br />

■ Applications are taking on new characteristics; for example, they are commoditized, consumed as a s<br />

ervice and configured rather than installed. They are also in a better position to derive additional value<br />

from their user base.<br />

■ Applications will become more aligned with business and require their own a business vocabulary.<br />

Key questions<br />

■ How important is application innovation to you?<br />

■ What are the barriers to development and implementation of new applications?<br />

■ How do you align business requirements with application consumption?<br />

52


Nine key trends<br />

7. Changing rules of business survival<br />

Who’s the establishment now?<br />

Technological advances are changing the rules of competitive advantage in every sector. Barriers to<br />

entry are decreasing and time to market is in a free fall. Organizations increasingly must rely on their<br />

brands, but they must also be agile.<br />

How will you differentiate your business in the era to come?<br />

The shifting business landscape<br />

Back in 2007, U.S. supermarket-giant Wal-Mart announced an ambitious plan to introduce health clinics<br />

into its stores. 39 The economic conditions seemed right. The problem of affordability of health care in<br />

the U.S., particularly for the lowest income groups, was becoming a significant one and a huge political<br />

issue. Americans were looking to find cheaper health care. Moreover, Wal-Mart was looking to grow. An<br />

in-store health clinic seemed to be a great way to attract customers as well as generate a revenue stream<br />

of its own.<br />

Their goal has been to provide a simple service in the style of Starbucks or McDonald’s. And being a giant<br />

organization, their one million employees – in itself a huge potential customer base – contributed strongly<br />

towards the business case.<br />

Business implications in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Low risk of technical failure,<br />

but high risk of competition<br />

exploiting new technology<br />

models<br />

3<br />

Managed cloud<br />

Opportunity to deliver new<br />

business services using online<br />

technologies and deploy cloud<br />

experience in new markets<br />

4<br />

Enterprise ecosystem<br />

Opportunity to replicate<br />

technology models in separate<br />

business entities and M&A<br />

Consumer society<br />

Opportunity to collaborate<br />

with mass niche providers and<br />

customers<br />

39. “In-store clinics boost Wal-Mart’s health,” http://articles.moneycentral.msn.com/Investing/Extra/InStoreClinicsBoostWalMartsHealth.<br />

aspx<br />

53


But the story gets more interesting. In 2009, Wal-Mart announced that they would be offering electronic<br />

health records, 40 bringing what are traditionally niche and customized technologies into the mainstream<br />

and targeting, guess what, small clinics as their customers. In doing so, they would take advantage of<br />

their scale, their consumer channels and their experience in IT from their internal systems.<br />

The product uses a SaaS model bundled with hardware and is sold through an existing online sales<br />

channel. It is a commodity product that undercuts rival offerings by as much as half. Again, there has<br />

been an external trigger, with Wal-Mart’s move coming at a time when the Obama administration<br />

was trying to stimulate the electronic medical record industry. 41<br />

But this is not an isolated example. In the same year, U.K. supermarket Tesco announced they were<br />

going to build a bank from scratch. 42 At the time, they had been successfully selling financial products to<br />

customers through Tesco Personal Finance, effectively a consumer channel of rebranded financial products<br />

provided by the Royal Bank of Scotland (RBS). The British retailer has now bought out the RBS stake,<br />

opened a customer service center creating 800 new jobs and branded the initiative Tesco Bank.<br />

Like Wal-Mart, external events influenced the timing of the venture. The Financial Crisis hit the banking<br />

sector hard and the realignment of the retail finance sector created widespread discontent in the industry.<br />

The two organizations hardest hit in the U.K. were the Scottish banks, RBS and HBOS, and it is no<br />

coincidence that Tesco decided to locate the new organization in Edinburgh. The opportunity to create<br />

a new banking organization– unencumbered by legacy systems and processes, and drawing from a<br />

suddenly available pool of talent – was a tempting one.<br />

Changing scenery<br />

What these examples highlight is how the barriers to entering industries are changing. While often<br />

such moves are opportunistic, organizations can typically leverage their strengths in one single area, for<br />

example sales, distribution or supply chain. Then, by using new technology or new suppliers, they can<br />

create a brand-new business. And as technology and service models evolve, barriers to entry will<br />

continue to fall. But this is just one example of the challenges organizations face in today’s business<br />

climate. Others include:<br />

■ More Channels to Market. Organizations can reach their customers in a variety of different ways,<br />

through physical outlets, call centers, Web sites and, more recently, via social media. This brings opportunity<br />

to engage customers, but also the challenge of aligning operations and strategy, generating a<br />

consistent brand and extending reach.<br />

■ Global Rebalancing. The rise of Asia, especially Chinese manufacturing and Indian services, and<br />

the growth of new markets around the world are testing organizations’ ability to compete and<br />

exploit opportunity.<br />

40. “Wal-Mart Plans to Market Digital Health Records System,” http://www.nytimes.com/2009/03/11/business/11record.html?_r=2&hp;<br />

41. The White House, Health Reform: the American Recovery and Reinvestment Act, http://www.whitehouse.gov/issues/health-care;<br />

42. “Tesco plans to build a bank from scratch,” http://www.guardian.co.uk/business/2009/aug/20/tesco-personal-finance-new-bank<br />

54


■ Increasing Pace of Change. As we have already seen, the pace of change in the world has accelerated,<br />

product life cycles have fallen, new services are springing up and information can be shared in an<br />

instant. In such an accelerating environment, the value of intellectual property declines relative to<br />

the value of the brand, as we will investigate in the next section.<br />

■ Competing Global and Local Interests. Global organizations are especially challenged to deliver value<br />

based on their scale without compromising local markets, cultures or regulations.<br />

■ Rise of Non-Monetary Values. Ethical and brand valuations of organizations are rising in their relative<br />

importance over more tangible monetary measures.<br />

From a technology point of view, there are some unique drivers impacting organizations at this point in<br />

time (see Fig. below). We call these the Six C’s. These forces of change are putting irresistible pressure on<br />

existing business models, and inevitably, organizations are changing the way they conduct business. In<br />

rising to this challenge, it is particularly important for companies to distinguish between activities that are<br />

servicing the business and those that can generate real competitive value or underpin the organization’s<br />

strategic aims.<br />

The six C’s<br />

Consolidation<br />

Commoditization<br />

Collaboration<br />

Consumerization<br />

Conservation<br />

Compliance<br />

Better alignment and greater value from existing assets driven by<br />

the desire for consistency and greater efficiency<br />

Product and service becoming modular and off-the-shelf driven by<br />

the need for greater agility and visibility of cost<br />

Web technologies and better access, driving ever greater<br />

interaction between people<br />

Consumer technology, overtaking business technology as the<br />

driving force of choice<br />

The need to be green, driven by ethical, reputational, regulatory and<br />

increasingly business grounds...<br />

...with legislation, regulations, standards – impacting globally<br />

and locally<br />

55


As ever, organizations are driven by external competition, innovation and pressures to reduce costs. There<br />

are also forces that restrict change, such as budgets, risk, complexity and security. The interaction between<br />

these competing factors defines the pace at which an organization is able to change, the value it can<br />

realize and the risk it exposes itself to.<br />

The brand and value chain<br />

In November 2009, Toyota announced it was recalling 4.2 million vehicles in the U.S. because of a<br />

problem with sticking brake pedals. Over the weeks that followed, further problems were discovered and<br />

by February 2010, the worldwide recall had risen to impact around 8.5 million models. 43 The scale of this<br />

was unprecedented and the financial cost to Toyota has been huge. But of greater concern to the company<br />

is the damage to its reputation. Many people have wondered how a company like Toyota, the world’s<br />

largest car manufacturer, could suffer such a catastrophe.<br />

In the years running up to the recall, Toyota had been pursuing an aggressive growth strategy. By 2007,<br />

it had reached a 13.1% market share, equivalent to sales of 9 million cars per year. In order to achieve<br />

this, the manufacturer extended its manufacturing reach and supply chains as far as it could around<br />

the world, increasing the distance between its design and engineering heartland, its customers and its<br />

manufacturing bases. 44<br />

Operating such an extended supply chain exposed Toyota to faults that perhaps would not have arisen had<br />

they been manufacturing closer to the intellectual center of the company and to the values for quality on<br />

which Toyota built its reputation.<br />

This example highlights the challenge organizations now face in balancing the competing needs for a<br />

strong brand value and an efficient, low-cost operation. This conflict is particularly relevant because, in<br />

today’s fast-moving and competitive marketplace, the value of a brand is more important than ever.<br />

And for manufacturing and technology companies, brand value rises relative to the value of its intellectual<br />

capital – one of the traditional measures of product company value. Falling product life cycles have meant<br />

that speed to market has become absolutely critical for a business to remain competitive.<br />

Furthermore, falling barriers to entry are enabling organizations to move into areas in which they have<br />

no intellectual capital. Here, brand trust is all important. That is what will persuade consumers that a<br />

good product or experience will be offered. Examples of this are becoming increasingly common: Apple<br />

selling phones and music, Amazon selling cloud computing, Google selling broadband, supermarkets<br />

selling everything.<br />

43. “Toyota boss Akio Toyoda apologises for faults,” http://news.bbc.co.uk/1/hi/business/8533352.stm; 44. “Toyota loses its shine,”<br />

http://www.economist.com/displaystory.cfm?story_id=15064411<br />

56


The challenge for organizations, particularly in fast-moving sectors, is to maintain a strong brand<br />

reputation, while ensuring that the quality of delivery is in line with their reputation. Building value chain<br />

strategies will become more and more important. In contrast to Toyota’s difficulties, Apple has been one of<br />

the great success stories of the new millennium, building on the success of the iPod and iTunes with the<br />

2007 release of the iPhone.<br />

While the uptake of this device has largely been due to great design and strong marketing, the commercial<br />

success has been built around the value chain. 45 Apple brings together component manufacturers, mobile<br />

network operators, content providers, application developers and Internet providers, and it delivers this<br />

as an ecosystem presented to the consumer right at the interface. As a result, Apple is able to make $300<br />

in profit per device. Compare this to Nokia, which generates a profit of $10 per device, 46 albeit at a much<br />

larger market share.<br />

Apple’s most strategic competitor in this market is Google, which also recognizes the importance of<br />

the value chain. That company is building an ecosystem around the Android device based on a growing<br />

developer network and a strong innovation pedigree.<br />

What is a service?<br />

Currently, technology services are defined and delivered according to Service Level Agreements (SLAs),<br />

which are offered for a range of service products; from a managed service for a large enterprise right down<br />

to an individual mobile phone contract. Service suppliers are now evolving to offer services that are<br />

characteristically more commoditized and flexible.<br />

If we believe that services will become commoditized, then the differentiation between service offerings<br />

will tend to diminish and become based more around brand value. As services become more flexible,<br />

customers will find it easier to switch suppliers and incur minimal start-up times and costs. The implication<br />

of this is that, in all likelihood, the market will determine the service level by defining what constitutes<br />

acceptable service quality.<br />

It is possible that many of the characteristics that we would normally associate with provision of service,<br />

such as a fixed duration or reporting of service quality, will no longer be required. The customers are<br />

assured that features that they would expect, such as best practice or availability, are embedded in the<br />

service – either because of publicly available data or their trust of the supplier’s brand. If the service falls<br />

short of the SLA or the market-determined SLA changes to a level the supplier cannot provide, the<br />

customer will switch to another provider.<br />

In reality, many large and complex service contracts will remain and it is difficult to foresee large<br />

enterprises being able to fulfill all of their service needs with commodity services. Nevertheless, we<br />

believe the trends are taking us much more into the area of the market-driven SLA. And we anticipate<br />

that the use of long-term service contracts will decline.<br />

45. “Finding value in smartphones,” Bank of America Merrill Lynch 2009, p.7; 46. “Finding value in smartphones,” Bank of America Merrill<br />

Lynch 2009, p.9<br />

57


“The trend toward agility and<br />

dynamic scalability coupled<br />

with the ability to shift<br />

technology costs from CAPEX<br />

to OPEX provides benefits to<br />

all businesses. However,<br />

start-ups in particular will<br />

profit from the fact that they<br />

can start with less capital<br />

and then ramp up as needed.<br />

That will make it a lot easier<br />

for newcomers and lateral<br />

entrants to capture<br />

market share.”<br />

Terry Blow<br />

Deputy Global CTO, <strong>Fujitsu</strong><br />

Key facts<br />

■ Commodity applications and app stores have been a big success in the consumer marketplace, while<br />

enterprise application development projects have a poor record of success, often at great cost.<br />

■ Commoditization of applications and composites, such as mashups, will greatly reduce the cost of failure<br />

and create a boom in application innovation.<br />

■ Applications are taking on new characteristics; for example, they are commoditized, consumed as a service<br />

and configured rather than installed. They are also in a better position to derive additional value<br />

from their user base.<br />

■ Applications will become more aligned with business and require their own business vocabulary.<br />

Key questions<br />

■ How important is application innovation to you?<br />

■ What are the barriers to development and implementation of new applications?<br />

■ How do you align business requirements with application consumption?<br />

58


Nine key trends<br />

8. New cultural values and expectations<br />

Attitudes drive markets<br />

Some human values are inherent, but others are more flexible. Peoples’ attitudes toward their<br />

responsibilities are changing and the pace of technology is creating demographic chasms between<br />

generations. The factors that determine our future go way beyond technology; they affect the way<br />

that we live and do business.<br />

Changes affect us and we cause change<br />

As we try to plan for the future, human values are an important variable for us to understand and perhaps<br />

one of the hardest to anticipate. On one hand, behavior is predictable; people generally act rationally and<br />

in the way that they have always done. But as our prosperity grows and our choices increase, values based<br />

on preference rather than need come to the fore.<br />

Many of the developments we have discussed throughout this paper have implications for our values and<br />

patterns of behavior (see Fig. below). Exposure to technology is a powerful influence, especially considering<br />

the role the Internet now plays in our lives. So is the rise of the global economy, which we might anticipate<br />

will drive a rebalancing of cultural values as the influence of the developing world grows. There are<br />

many drivers of changes in values, but we will focus on just three.<br />

Changing values in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Tension created if values are not<br />

aligned to enterprise strategy<br />

3<br />

Managed cloud<br />

Alignment with values that want<br />

flexibility and sustainability<br />

4<br />

Enterprise ecosystem<br />

There is greater democracy<br />

and individual preferences<br />

are catered for<br />

Consumer society<br />

Alignment with any values and<br />

easy to switch<br />

59


A social conscience<br />

In 1996, Unilever committed to a strategy of sourcing all of its fish from sustainable stocks. It formed the<br />

Marine Stewardship Council (MSC) to encourage sustainable sourcing across the industry and, by 2005, it<br />

was sourcing 60% of its fish from sustainable fisheries and almost 50% from MSC-certified sources. 47<br />

One might reason that the corporation had a commercial interest in trying to rebuild global fish stocks;<br />

nevertheless, it was one of the first examples of a major multinational organization incorporating socially<br />

responsible activities into the execution of their business. As well as the pressing environmental problem<br />

that Unilever was addressing, it was also responding to a value shift among their customers. Consumers<br />

have been displaying a growing awareness of ethical issues that are revealed in their purchasing decisions.<br />

Many organizations have been damaged by scandals involving unethical behavior. Examples include Gap<br />

and Nike being linked to Asian sweatshops. Conversely, some have benefitted from taking a proactive and<br />

positive stance on Corporate Social Responsibility (CSR).<br />

In the U.K., retailer Marks and Spencer announced Plan A in 2007 – a £200 million sustainability project<br />

on a scale not attempted before. It cut across all areas of their business, from the use of biodegradable<br />

packaging and ethical sourcing to reducing power consumption in stores and in its IT. 48<br />

Fairtrade is a another good example of how ethical values have influenced economic behavior. Various<br />

Fairtrade initiatives had been attempted in the 1970s and 1980s, but it was in the 1990s that it became<br />

globally established – albeit limited mainly to charity shops and non-profit organizations. However, about<br />

eight years ago, Fairtrade sales began to take off as commercial organizations adopted the concept. 49<br />

Sales continue to grow today.<br />

With Starbucks switching to Fairtrade coffee beans across Europe in March 2010, Fairtrade has well<br />

and truly become established in the mainstream. This rising exposure of ethical behavior has also been<br />

reflected in a wave of standards and accreditations for CSR – for example, the United Nations Global<br />

Compact or the SA8000 standard on social accounting. Many organizations now recognize the<br />

importance of signing up to them.<br />

Going green<br />

The growth of green values in society, particularly in the developed world, has been well documented.<br />

But the experience that arose in recent years is more interesting. Hype around sustainability and<br />

environmentalism reached a peak in 2008. Scientific evidence for climate change was overwhelming.<br />

The majority of the world had signed up to the Kyoto Protocol on greenhouse emissions and appetite for<br />

emissions trading systems was growing. But the hype has since been influenced by two unexpected<br />

events that have had big impacts across the world.<br />

47. “Fishing for the Future: Unilever,” http://www.wbcsd.org/Plugins/DocSearch/details.asp?DocTypeId=24&ObjectId=MjA5MjY<br />

48. “M&S promises radical change with £200m environmental action plan,” http://www.guardian.co.uk/business/2007/jan/15/<br />

marksspencer.retail; 49. Global Fairtrade Sales 2000-2009, Fairtrade Labelling Organization<br />

60


The near collapse of the banking sector in the 2008 Financial Crisis and the ensuing economic recession<br />

changed business priorities markedly. Organizations were suddenly concerned with financing and<br />

restructuring their businesses, and the urgency of responding to an environmental mandate evaporated.<br />

Then, in November 2009, an e-mail server at the U.K.’s University of East Anglia’s Climate Research Unit<br />

was hacked, which caused the so-called Climategate scandal. While those involved were later exonerated,<br />

the charge that scientists deliberately manipulated data to support the case for man-made climate<br />

change further damaged the environmental imperative by giving the arguments of climate change<br />

skeptics new credibility. 50<br />

Whether real values have changed is hard to say. Many organizations, particularly in the public sector, are<br />

measuring and pursuing emissions targets; in some cases aggressively. We must also acknowledge that<br />

disappearing hype can be a sign that change is becoming embedded in human activity and part of normal<br />

business – a sign that the change has moved beyond its tipping point.<br />

But for the technology industry, green values are being overshadowed by a new reality that has emerged.<br />

In 2007, the total amount of power being consumed by servers in the U.S. overtook the amount of power<br />

being consumed by the nation’s televisions. 51<br />

It is estimated a standard server in a U.S. data center will consume $800 of electricity each year. Over the<br />

life of the server, the cost of the power is very likely to exceed the cost of the server itself. 52<br />

And the problem is not just limited to computing technology. Only a small proportion of the total energy<br />

demanded by a data center powers processing cycles; the bulk of energy lost in a data center is in heat,<br />

cooling and power conversion. In 2005, world data centers accounted for 152 billion kWh, just slightly<br />

less than the total power consumption of Mexico, and a little more than Sweden 53 (see Fig. below) Based<br />

on current trends, data center energy consumption in the U.S. alone is expected to double from 60 billion<br />

kWh in 2006 to well over 100 billion kWh by 2011. 54<br />

50. “Climate sceptics claim leaked emails are evidence of collusion among scientists,” http://www.guardian.co.uk/environment/2009/<br />

nov/20/climate-sceptics-hackers-leaked-emails; 51. Report to Congress on Server and Data Center Energy Efficiency, U.S. Environmental<br />

Protection Agency Energy Star Program, 2007, p.7; 52. Report to Congress on Server and Data Center Energy Efficiency, U.S. Environmental<br />

Protection Agency Energy Star Program, 2007, p.30; 53. “The Environmental Cost of Cloud Computing: Assessing Power Use and<br />

Impacts,” Jonathan Koomey, 2009 p.11; 54. Report to Congress on Server and Data Center Energy Efficiency, U.S. Environmental Protection<br />

Agency Energy Star Program, 2007, p.7<br />

61


Data center power in context<br />

Final electricity consumption (billion kWh)<br />

Italy<br />

South Africa<br />

Mexico<br />

World Data Centers<br />

Iran<br />

Sweden<br />

Turkey<br />

0 100<br />

200 300<br />

Source for country data in 2005: International Energy Agency<br />

The good news is that technologies like virtualization and the miniaturization of hardware are creating<br />

ever more efficient power consumption. The growth of cloud computing and commodity computing<br />

resources will also help by delivering greater efficiency through scale. Globally, there is huge investment in<br />

R&D for energy-efficient technologies, for reduction of power consumption and heat dissipation, which will<br />

drive further improvement.<br />

The bad news is that the demand for computing resources is rising. As the Cleantech Group put it, “like<br />

death and taxes, the absolute certainty surrounding data centers is that they will continue to expand.<br />

Simply put, that demand calls for even greater energy consumption.” 55<br />

The IT industry is now taking the energy efficiency problem very seriously. And this is not just because of<br />

customer values or a genuine desire to protect the planet, admirable though these aims these may be.<br />

It is being taken seriously because it has become about cost.<br />

55. “Putting the heat on data center cooling costs,” http://cleantech.com/news/5063/putting-heat-data-center-cooling-co<br />

62


Generation Y<br />

The file-sharing site Napster was started in 1999 by Shawn Fanning, a student at Northeastern University<br />

in Boston, MA. The site enabled users to share digital music with each other on a peer-to-peer basis and<br />

became hugely popular. Its user base, mostly young people, grew quickly and reached a tipping point at<br />

which virtually any search for a piece of music could be fulfilled. The site attracted heavy criticism from the<br />

music industry for copyright infringement and, in 2001, after losing a legal challenge from a group of<br />

companies headed by A&M Records, Napster was shut down.<br />

The story of Napster has revolutionized the music industry, accelerating it in into digital media faster<br />

than it might have gone on its own. Global sales of online music will soon exceed traditional channels.<br />

But it also highlights one of the first impacts on the world of a new demographic group –Generation Y.<br />

When heavy metal band Metallica sued Napster in 2000, it was the first public clash between a new<br />

establishment and this new generation.<br />

The demographic we call Generation Y has been variously named as the iGeneration, Millennials, Digital<br />

Natives and the MTV Generation – phrases which all describe the sector of the population who have grown<br />

up with technology, the Internet and mobile phones. Members of Generation Y were typically born in the<br />

late 1980s and onwards, are now in the first phases of their careers, and appear to have a set of values<br />

that is unique to their demographic. They are culturally liberal, ethically aware and self-reliant. The U.K.’s<br />

Observer newspaper claimed “two thirds know the price of an Apple iPod Mini, three quarters have no idea<br />

what a pint of milk costs. Many never read newspapers and two thirds do not vote.” 56<br />

It is a generation that has grown up with a unique set of circumstances. They have experienced more<br />

personal choice and freedom than any of their predecessors. They have not known anything other<br />

than economic prosperity and been surrounded by ubiquitous technology. They have been targeted<br />

commercially in a way over and above previous generations of young people. The mobile ringtone market,<br />

estimated by the ARC Group as being worth $3.5 billion in 2004, is almost entirely down to this demographic.<br />

Put in context, the global music market was estimated to be worth around $32 billion in 2004. 57<br />

But it is their relationship with technology that defines Generation Y and may have the greatest<br />

implications.<br />

■ They are technically literate. Using technology is instinctive, not something that needs to be<br />

learned. For the previous generations, technology use has required some kind of adaption to a<br />

greater or lesser degree.<br />

■ They expect simple and quick answers. For Generation Y, the answer is “never more than three clicks”<br />

away. They use the Web and social media extensively and are happy to trust the views of people they<br />

don’t know rather than invest time in getting an answer from a more credible source.<br />

■ They demand flexibility. As young consumers, they have grown up managing their own mobile phone<br />

contracts and bank accounts. They think nothing of changing a supplier. In their working lives too, they<br />

demand flexibility in their careers and expect to change employers frequently.<br />

56. “They don’t live for work ... they work to live,” http://www.guardian.co.uk/money/2008/may/25/workandcareers.worklifebalance;<br />

57. “Ring Tones Bringing in Big Bucks,” http://www.wired.com/techbiz/media/news/2004/01/61903<br />

63


“It’s easier to adjust to a new<br />

technology than to a new way<br />

of thinking. You can replace an<br />

outdated server in minutes,<br />

but it takes a long time to<br />

replace an inappropriate sense<br />

of responsibility toward the<br />

environment or an old-school<br />

approach to work behavior.”<br />

Sanya Uehara<br />

Senior Vice President,<br />

<strong>Fujitsu</strong> Laboratories Ltd.<br />

The influence of Generation Y is, of course, controversial, not least because our values and priorities<br />

change as we get older and face up to greater responsibilities. On top of this, the Financial Crisis has been<br />

a reality check. It is the first economic downturn many have experienced and is likely to constrain the<br />

personal freedom and flexibility they have come to expect. But like many observers, we believe this<br />

generation will have a strong influence on the future.<br />

As they grow into positions of responsibility, business decision making will increasingly reflect their values<br />

more fully. With the buying power of Generation Y set to eclipse other demographics, 58 we can expect to<br />

see these values reflected in consumption patterns, causing a fall in demand for newspapers or for<br />

scheduled television programming, for instance. But perhaps of greatest significance is that Generation-Y<br />

values tend to reinforce many of the other changes we have described in this paper: The consumerization<br />

of technology, the rise of social media, the growth in ethical values and social responsibility, and the<br />

demand for flexible services.<br />

Whether or not Generation Y turns conservative as they become middle aged, we believe their impact on<br />

the world will already have been significant. As far as the Napster story is concerned, Generation Y appears<br />

to have had the last laugh. It was estimated in 2009 that illegal downloads constituted about 95% of all<br />

online music transactions. 59<br />

Key facts<br />

■ Social responsibility and ethical behavior have become established as a driver of economic behavior.<br />

■ Pro-environmental momentum has been slowed by the economic recession …<br />

■ …but green IT has strong momentum on cost grounds. Over its lifespan, it will cost more to power a server<br />

than to purchase it.<br />

■ Generation Y and Generation Z will drive changes in values as they increasingly move into positions<br />

of influence.<br />

■ The values that these two generations hold reinforce many of the other trends we have described.<br />

Key questions<br />

■ How is your organization impacted by the ethics of your employees – and your customers?<br />

■ How important is energy efficiency to you and your regulators?<br />

■ Will a younger generation force change in your organization?<br />

58. “The New Counterculture’s Buying Power,” http://www.forbes.com/2008/10/01/hipster-buying-power-forbeslife-cx_ls_1001style.html;<br />

59. “Revolution, Innovation and Responsibility,” http://www.ifpi.org/content/section_resources/dmr2008.html<br />

64


Nine key trends<br />

9. A workforce in motion<br />

Wanted: flexible workers<br />

A new source of human resources is emerging, which enables crowdsourcing of human labor from a<br />

huge pool of virtual resources. The human cloud gives organizations greater choice and value. Overall,<br />

workforces are becoming more mobile in terms of geography, skills and working styles. That flexibility<br />

is already important, but it will become crucial in tomorrow’s rapidly changing markets.<br />

Where exactly is this flexibility needed in your organization and where will it come from?<br />

Reinventing the office<br />

How much of how we act is determined by ingrained practices and how much can be altered by<br />

environmental changes? Our way of life is not a volatile activity. It is often shaped by cultural factors<br />

that go back hundreds, if not thousands of years. But change in behavior does steadily take place,<br />

particularly as a result of our response to technology and our rising standard of living.<br />

Think of how technology has impacted the workplace. Our way of working is very different in the 2010s<br />

compared to how it was in the 1980s, which was completely different than how it was in the 1950s. Some<br />

things have remained constant. We still work for a salary, we tend to work for one organization at a time<br />

and we tend to travel to our place of work.<br />

But we believe that the workplace will undergo a transformation over the next decade; again driven by<br />

technology, but in ways that will be more profound.<br />

The human cloud<br />

Liveops.com is a company that describes itself as a virtual call center. It first came to the attention of the<br />

news media in the wake of Hurricane Katrina in 2006, when the company was used to rapidly set up a call<br />

center to link people impacted by the disaster with their families. 60<br />

Over a single weekend, they handled 31,000 calls. But liveops.com does not have a regular workforce. It is<br />

staffed by a community of agents, of whom there are currently around 20,000. To work for liveops.com,<br />

you need to register online and take an aptitude test. Having successfully passed this, and only a minority<br />

of applicants do, you are able to start work. As you gain experience in working for them, your capability<br />

and status rises, and you are able to work on more challenging tasks.<br />

The significant thing about liveops agents is that they work from home and can choose how much or<br />

how little they want to. When they log in, they select tasks from a pool representing their level of skill. An<br />

agent could pick up only one single call if they wished, or they could work all day. Or all night. They get<br />

paid simply on the number of calls they take. Because the community of agents is so big, they can fulfill<br />

workloads flexibly and the customer receives the same service as they would from a traditional call center.<br />

Liveops.com describes its community as a “workforce in the cloud.” They are a human cloud.<br />

60. “Call center for hire helps sell blenders,” http://www.networkworld.com/news/2006/082106-call-centers-outsourcing.html<br />

65


In the last few years, technology, and particularly the Web, has enabled the concept of crowdsourcing –<br />

engaging a large number of people to fulfill a specific task – to become a practical reality. The idea of<br />

crowdsourcing probably is not new to anyone, even though the term may be. For example, Wikipedia is<br />

an example of crowdsourced work, as is a simple e-mail request for the answer to a question sent out to<br />

a large number of people.<br />

Croudsourcing human expertise<br />

Increasing Human Expertise and Attention<br />

Scientific problem solving<br />

Open innovation<br />

Medical diagnosis<br />

Translation<br />

IT problem solving<br />

Design work<br />

Call centre work<br />

CCTV monitoring<br />

OCR tasks<br />

Recorded actions<br />

We are starting to see some interesting applications of crowdsourcing in the marketplace and we believe<br />

this concept will continue to mature. As it does, it will revolutionize human resource management.<br />

Generally, activity in this area can be broken down according to the level of skill or difficulty of the task.<br />

Here are some of the different types of tasks that can be accomplished efficiently by taking advantage of<br />

emerging technologies and crowdsourcing processes:<br />

Solution creation. These are tasks that try to create solutions to a complex problem. There have been<br />

quite high-profile examples of these, such as the X-Prize, which offers large sums of money for solving<br />

specific major scientific or engineering challenges.<br />

66


Another example is Innocentive, a solution marketplace in which seekers post problems with bounties<br />

for solvers to respond to. Open innovation initiatives like this have been immensely popular in the<br />

pharmaceutical industry, where it is proving to be a faster and cheaper way to develop a product. 61<br />

Expert Knowledge and Expertise Location. These might be tasks requiring an expert opinion, such<br />

as advice from a lawyer or physician, or to find the solution to a specific technical problem. Expertise<br />

location is typically about finding the answer to a query or problem that an expert should routinely<br />

know the answer to.<br />

Specialized Activity. This is the commissioning of an activity that leads to the output of something<br />

tangible; for example, a piece of design work for the cover of a book, the creation of a standard legal<br />

contract or even a piece of software code. The artifact that is produced may be simple or complex,<br />

but it takes a specific skill to produce it.<br />

Human Intuition. There are some tasks that don’t require a particular skill, but which are unable to be<br />

performed by a computer. These are tasks that we may consider mundane, but they are difficult or costly<br />

to automate, for example, monitoring CCTV pictures. In 2005, Amazon launched a service called<br />

Mechanical Turk, a crowdsourcing marketplace that enables the resourcing and automating of just such<br />

tasks. Computer programs, written by requestors package and post human intelligence tasks to the crowd.<br />

These might be activities like tagging photographs or identifying performers on CDs. Such activities can<br />

be engineered to compliment artificial intelligence systems because they allow human intuition to be<br />

incorporated into computation, greatly improving the output; for example, problem solving or language<br />

translation systems.<br />

Inattentive Activity. Finally, there are tasks that can be carried out with a person barely noticing that<br />

they are contributing. This might be a task a person is given when they log onto a Web site, for example<br />

performing optical character recognition from a scanned piece of text. Many of us will have already<br />

contributed to these types of task, probably without realizing it.<br />

The web has been instrumental in delivering crowdsourcing as a practical concept because it is so effective<br />

at connecting us with large numbers of people. As Web technologies continue to grow in sophistication<br />

and use, the usefulness and prominence of crowdsourcing will increase accordingly.<br />

The crowdsourcing market mechanisms work slightly differently depending on the difficulty of the task.<br />

With high level tasks, the challenge is to engage with a small number of people with the right skills –<br />

exploiting the long tail of the web. Lower-level tasks are about engaging as many contributors as possible,<br />

taking advantage of the large volume of people you can connect on the Internet. Different models for<br />

reward have been employed.<br />

61. “The Next Wave of Open Innovation,” http://www.businessweek.com/innovate/content/apr2009/id2009048_360417.htm<br />

67


A marketplace is a good way of exploiting a human cloud, rewarding individuals on a task completion<br />

basis. But other mechanisms are also possible for some tasks. For example, prediction markets have<br />

emerged as an effective way of generating insight based on a model in which individuals are rewarded for<br />

the accuracy of their predictions. Sometimes, the competitive urge is incentive enough and many crowdsourcing<br />

systems have grown around points systems or prestige. Many markets rely on this game-playing<br />

principle in cases where participants enjoy the process of contributing.<br />

As crowdsourcing matures, so will the possibilities. However, we believe that human clouds will soon be<br />

recognized as a new branch of human resources. Engagement of human labor will have the same basic<br />

characteristics as cloud-based technology services – elastic, scalable, self-service and pay-per-use.<br />

For example, in the field of IT services, this form of human resource will be effective for solving technical<br />

problems. With a mature human cloud for helpdesk, the efficiency and agility of service desks will be<br />

greatly enhanced. This model will also drive collaborative business models with which consumers are able<br />

to provide feedback into the design process. In this way, they will help shape the design of products they<br />

will consume or help market products that they are passionate about.<br />

Diverging human resources<br />

Direct<br />

employment<br />

& freelance<br />

Today<br />

Tomorrow: Alternative labour supplies<br />

Direct<br />

employment<br />

& freelance<br />

Human<br />

cloud<br />

68


The mobile workforce<br />

While the human cloud represents a radical change, steady evolutionary change continues to take place<br />

in the workforce. Based on recent history, the workforce has steadily become more mobile and agile. We<br />

expect further change around workforce mobility to be generated by changing values, changing business<br />

expectations as well as changes in technology.<br />

Human resources and mobility in our scenarios<br />

1 2<br />

Traditional enterprise<br />

Low mobility, no means of<br />

engaging human clouds<br />

3<br />

Managed cloud<br />

Higher mobility, subscriber<br />

use of human clouds<br />

4<br />

Enterprise ecosystem<br />

High mobility, some internal<br />

crowdsourcing through enterprise<br />

social media<br />

Consumer society<br />

High mobility, supplier and<br />

subscriber use of human clouds<br />

Commercial Mobility. Where once upon a time you had a job for life, individuals are now less tied to a<br />

particular employer and commonly move through many different employers, often changing every few<br />

years. A 2008 survey by the U.S. Department of Labor found that individuals born in the 1960s had, on<br />

average, held 10.8 jobs up to the age of 42, with two thirds of these being held before the age of 27. 62 It is<br />

likely that this trend will accelerate, especially as many of the incentives for long-term employment, such<br />

as final salary pension schemes are disappearing. Social networks are also making the job market more<br />

efficient and flexible, particularly for skilled and professional workers. This will further drive employment<br />

mobility. Longer term, it is likely that online marketplaces will emerge based on principles similar to those<br />

operating in the crowdsourcing marketplaces that we have already investigated. Commercial models will<br />

underpin each employee contract and determine the nature of the relationship between organizations and<br />

employees. We anticipate that this trend will lead employers to focus more on task-based recruitment –<br />

sourcing skills for specific, point-in-time activities rather than career recruitment.<br />

62. U.S. Bureau of Labor Statistics, Economic News Release, 2008, http://www.bls.gov/news.release/nlsoy.nr0.htm<br />

69


“<strong>Technology</strong> enablement will<br />

bring globalization to a new<br />

level and enable workflows<br />

that would have been<br />

inconceivable even just a few<br />

years ago. Exploiting these<br />

developments without<br />

exploiting people will be a<br />

great challenge, but there are<br />

benefits to be gained by all.”<br />

David Gentle<br />

Strategy Manager, <strong>Fujitsu</strong><br />

Global Business Group<br />

Skills Mobility. Transfer of skills is becoming much more common in the workplace. Again, where once<br />

people tended to have the same job role for life, people have become more flexible about taking on new<br />

skills. In part, this is a value change. However, it is also reflective of the fact that technology and social<br />

change is creating new opportunities. Even within fixed roles, employees are having to adapt to changes<br />

that impact their disciplines. Look at how microblogging has impacted the PR and marketing professions,<br />

for instance. We believe that human resource management will become adept at supplying “just-in-timeskills”<br />

to empower a more skills-efficient workforce.<br />

Physical and Geographical Mobility. <strong>Technology</strong> has had a huge impact on the physical mobility of people<br />

and this is set to continue. It has enabled people to be connected with their colleagues and customers<br />

remotely through mobile computers and more recently, through smartphones. Further, people have been<br />

able to collaborate more effectively over long distances through teleconferencing, videoconferencing and<br />

webcasting. While we tend to think of such people as “knowledge workers,” the availability of consumer<br />

technology means that more and more people will be able to make choices about where they work.<br />

Key facts<br />

■ The human cloud represents a new source of human resources and a divergence from the traditional<br />

ways of hiring of labor.<br />

■ Acquisition of human resources from the cloud will be enabled by social networks and online services<br />

for crowdsourcing.<br />

■ Resources will be acquired depending on skill and attention; from highly specialized to<br />

mundane activity.<br />

■ Workforces are becoming more mobile in terms of commercial flexibility, skills adoption and<br />

physical location.<br />

■ Organizations will have greater choice over how they can benefit from human resources.<br />

Key questions<br />

■ Which of your business functions could be serviced from a human cloud?<br />

■ What are the risks and benefits of employing crowdsourcing?<br />

■ How would you use technology to enable greater mobility in your organization?<br />

70


Twelve key predictions<br />

and their implications<br />

What do we know today?<br />

From incremental advances to game-changing innovations, the future is always shaped by the<br />

developments taking place in the present. There may be uncertainty around the extent and implications<br />

of change, but like a ship’s navigator, we can observe our course and the prevailing conditions and<br />

make some assumptions about where we may end up<br />

We can’t, of course, know the unknowable. However, by taking a pragmatic, realistic and informed view,<br />

we can consider the future with greater confidence and give ourselves a much more stable platform and<br />

context for planning. After all, the most successful business leaders in the world – think about Bill Gates<br />

or Steve Jobs – have not built their achievements on getting things exactly right, but on being mostly right.<br />

Gaining insight into changes that are affecting numerous intersecting areas can lead to practical and<br />

profitable conclusions.<br />

We started this analysis by considering this question: If we were looking back from five years’ time, what<br />

could we say that we knew today?<br />

As a result, we have identified 12 predications for change that we think are safe bets. They are<br />

developments that we see carrying solid momentum and which are backed up by strong evidence,<br />

but which are yet to pass their tipping points into the mainstream. Each one carries significant<br />

implications, which we have attempted to capture.<br />

As you read through these 12 predictions and their implications, consider the following questions:<br />

■ Are the relevant people within your organization aware of these developments and in a position to act<br />

on them?<br />

■ Which topics can you safely put on the “back burner,” and which do you need to act on immediately?<br />

■ Which of these developments pose the largest risk? Which offer the most opportunity?<br />

■ What processes will you need to have in place to manage the required change?<br />

71


1. Smartphones will become pervasive.<br />

While sales of traditional handsets are reaching a plateau (at a high level), the global market for<br />

smartphones and mobile-computing devices is growing at an incredible rate. These devices are putting<br />

users in touch with digital content and experiences, wherever and whenever they choose. And crucially,<br />

the developing world is seeing massive growth and is skipping a generation of fixed-computing<br />

technology; the increasing mobile market is rapidly connecting people in huge numbers that were<br />

once beyond the reach of online services.<br />

Implications:<br />

■ Demand for global digital services will rise exponentially.<br />

■ Smartphones will be the channel through which the largest numbers of customers can be reached,<br />

and new, smartphone-enabled markets will emerge.<br />

■ Digital interfaces will become ubiquitous; everything will be available, and context and location will be<br />

known and understood by the systems they access.<br />

■ Mobile devices will become the main focus for business, and technology innovation and the global<br />

common denominator for consumer transactions.<br />

■ Innovation will be strong in developing countries, where cellular networks account for a greater<br />

proportion of Internet use.<br />

■ Competing organizations will find it easier to reach each other’s customers, even from overseas.<br />

■ The word “mobile” will lose its meaning – at least in a technology context.<br />

2. Social media will deliver real business value when used in scale.<br />

Information technology has come a long way since the days of the mainframe – when “they” provided<br />

computing for “us.” We are in an age in which digital content is created and shared by individuals, and<br />

social media enables this interaction in vast numbers. For organizations, perceptions of social media and<br />

social networking as only the preserve of teenagers – and timewasters – are changing fast; like it or not,<br />

they have little choice but to embrace this major channel to their customers. But there is a catch: Where<br />

companies seek to control and place boundaries around social media, they will fail. The value of the<br />

networks comes from their organic nature and in order to capitalize, organizations must look beyond<br />

their own boundaries and open up to these developments.<br />

Implications:<br />

■ All customer applications will have social media functionality built into them.<br />

■ Communications tools will either be replaced by social media/networks or evolve to incorporate their<br />

characteristics.<br />

■ Organizations will have to look beyond their traditional boundaries.<br />

■ These platforms will enable companies to gain a greater understanding of their markets and how their<br />

businesses function.<br />

■ The word “user” will lose its connotation of a passive technology consumer – and may disappear entirely.<br />

■ The lines between “producers” and “consumers” will become blurred.<br />

72


3. Speed of information will be everything.<br />

The last couple of years have seen huge changes in the way we use technology, and one of the<br />

most significant has been in real-time information. When we search, we are no longer content with<br />

information from a year ago, or even more recently. We need to know what is happening now, this<br />

second. It would seem a safe bet that real-time social-media searches will continue to develop and<br />

become more sophisticated, but also that real-time information will become more embedded in<br />

operational and business systems.<br />

Implications:<br />

■ Decision-making time will be reduced.<br />

■ Organizations will learn how to exploit “free” information from social searches and the real-time Web.<br />

■ Operational technology and information technology will converge; sensor technologies will provide<br />

information from the ground up.<br />

■ Competing organizations will engage in information arms races.<br />

■ By investing in technology, organizations may gain a better understanding of their competitors’<br />

customers than even their competitors have.<br />

4. Organizations will consume business services, not technology services.<br />

Cloud computing will see us consuming technology resources in an on-demand, subscription-based<br />

fashion. As a result, technology will become abstracted from us. We will stop caring about detailed technical<br />

requirements, such as makes and models, and will focus exclusively on what services we need. This will<br />

naturally drive a change of focus from technology requirements to business outcomes. No longer requiring<br />

the expertise of IT departments, business functions will be able to consume business services directly.<br />

Implications:<br />

■ New markets will appear for pay-per-use business activities, and agreements will become more flexible<br />

and based on outcomes.<br />

■ Organizations will become outward-looking rather than inward-looking with regard to technology and<br />

services; information supply chains will replace reference architectures.<br />

■ <strong>Technology</strong> resources will be modular and highly scaled. They will be provisioned rapidly, elastically and<br />

dynamically. Services will come from a variety of physical channels.<br />

■ Financial models will emphasize operational expenditure rather than capital expenditure, and the focus<br />

will be on management and aggregation of suppliers rather than management of physical resources.<br />

73


5. Support of choice will become essential.<br />

The world is becoming ever more complicated and the pace of change is accelerating. In every walk of<br />

life, there are more options available to us than ever before. We have entered an era in which change<br />

is the norm and stasis the exception. Flexibility and agility are becoming key attributes for thriving<br />

organizations; in contrast, those which respond by limiting choices will struggle. Successful organizations<br />

will be the ones that position themselves to capitalize on the huge value that technology and social<br />

change is delivering.<br />

Implications:<br />

■ Organizations will replace inflexible technologies or architectures, such as application silos or<br />

“fat” clients.<br />

■ Governance and risk perception will change to enable greater agility and empowerment of individuals.<br />

■ Self-service and consumer services will become the norm.<br />

■ Organizations will have to be able to determine the best source of any service at any given time, and<br />

continually respond and adapt.<br />

■ Agile working and fast decision making will become crucial.<br />

6. Crowdsourcing will become a major supply of human resources.<br />

Crowdsourcing – the outsourcing of tasks to a large pool or community of people with an open request –<br />

is enabling human resources to be engaged in an on-demand fashion. Mirroring the way that<br />

technology resources are consumed through cloud computing, human resources can be engaged through<br />

crowd-sourcing without the normal overheads associated with fixed labor. While crowdsourced labor is<br />

not always a substitute for direct hires, it will offer a significant new channel to deliver reduced cost, and<br />

greater speed and flexibility.<br />

Implications:<br />

■ Crowdsourcing will fulfill many human resource requirements.<br />

■ Human resources will be engaged on a task and utility basis: elastic, scalable, and pay-per-use<br />

approaches.<br />

■ Business activities that can be specified as discrete tasks will be resourced from crowds.<br />

■ Greater value will be obtained by leveraging free or very low-cost human input.<br />

■ Crowdsourcing will play a critical role in specific functions, such as technical support or medical<br />

diagnosis.<br />

74


7. Enterprise users will procure and manage their personal technology.<br />

People have become comfortable with technology and the assumptions on which enterprise IT has grown<br />

up with – that technology is expensive, complicated and inaccessible – no longer hold true. Individuals are<br />

better placed than ever before to make decisions about what technology they use in their daily lives and<br />

we have seen so many times before, for example with travel or personal finance. Once people gain a level<br />

of familiarity, self-service is greatly preferred.<br />

Implications:<br />

■ We will see the end of the help desk as we know it.<br />

■ Internally provided desktop services will provide help for specific business activities and security access<br />

rather than help with general technology use.<br />

■ Retailers will be used to provide bulk of technology and related services to individuals.<br />

■ The application of computing technology will lose its white collar implication – everybody will use<br />

technology.<br />

■ A wide variety of form factors and devices will proliferate in enterprises.<br />

8. Location and context data will become embedded in our digital<br />

interactions.<br />

As technology plays an ever greater part in our lives, so our technology experiences are becoming ever<br />

more personalized and contextualized. We are already seeing many location-based services develop<br />

around mobile devices, delivering information related to our geographic position. As mobile services<br />

proliferate, we can only expect to see this type of functionality accelerate. While users will benefit from<br />

new features, providers of services and applications will be able to exploit an important new source of<br />

information about their customers.<br />

Implications:<br />

■ New application functionality will be realized that provides location or context-based services<br />

and exploits information about users.<br />

■ Systems will become ever more responsive to the needs of their users, offering ever improving<br />

experiences<br />

■ Integration of location details will further accelerate the importance of social networking and<br />

social media.<br />

■ Huge new markets will likely open for location-based services and applications.<br />

■ New privacy issues will arise.<br />

■ Uptake of related technologies – such as sensors and smart devices – will accelerate.<br />

75


9. Uncontrollable areas will need to be secured.<br />

Many of the changes we are anticipating describe a move from a stateful environment to a stateless one.<br />

A world in which technology services are very much defined by the physical environment, and location of<br />

their source is giving way to a world in which services are fluid and dynamic and can be consumed from<br />

anywhere. Security models that exist today are inadequate to support this new way of working and new<br />

solutions will need to be found.<br />

Implications:<br />

■ Managing stateless data will become a key challenge.<br />

■ Security models will evolve to emphasize protection of the unit of data (becoming information-centric)<br />

and trusted sources of user credentials.<br />

■ The corporate perimeter will decline in importance and relevance. Trust will become the enabling factor;<br />

people and organizations will collaborate extensively.<br />

■ Data protection and privacy will derive much more from personal control than from organizational or<br />

governmental control.<br />

■ Adoption of identity management and biometric technologies will accelerate.<br />

■ Our perception of risk will change.<br />

10. Apps are here to stay.<br />

It is fair to say that enterprise IT has really struggled to find a simple way of distributing applications,<br />

and it seems ironic that, with the rise of the app store, the consumer sector has found it. The corporate app<br />

store will become a reality, delivered by some focused internal development, but mostly exploiting the<br />

huge scale of the open market.<br />

Implications:<br />

■ Commodity applications, delivering most requirements off-the-shelf and immediately, will be more<br />

attractive than custom development.<br />

■ Innovation will accelerate in the business applications market and the cost of failure will fall.<br />

■ Applications will be lighter and developed faster, and big development projects will decline.<br />

■ User ratings rather than acceptance testing will determine the quality of applications.<br />

■ Development efforts will focus on creating composite applications, mashups and niche functionality.<br />

■ Monolithic applications will become less common, but legacy systems will persist where they provide<br />

core business services or brand value.<br />

76


11. IT functions will lose their buying monopoly.<br />

IT functions exist because they have expertise in a technology that is required to support the operation<br />

of their businesses. The relevance of this expertise is in decline as individuals become more familiar with<br />

personal technologies and cloud computing offers for utility consumption of technology services. IT<br />

departments will change as a result and may even contract: Some of their current functions, such as<br />

sourcing decisions, will move into businesses.<br />

Implications:<br />

■ Business functions will buy technology services directly from the market (rather than through the<br />

IT department).<br />

■ Individuals will choose and purchase their own technology, and use it to access business and personal<br />

services accordingly, enjoying the best possible experience.<br />

■ Business governance will become more important than IT governance.<br />

■ Technical skills will move from in-house IT organizations to technology companies.<br />

12. People and markets will determine service levels.<br />

As we move towards the on-demand consumption of technology services, we will be participating in a<br />

dynamic market place. The concept of a service agreement as something pre-determined by the customer<br />

and supplier will change to being defined in the market. The quality of the service will be what the market<br />

says it is. As such, the duration of service consumption and the nature of contracts will also change:<br />

Services will be consumed until a better service is available somewhere else, at which point the customer<br />

will switch.<br />

Implications:<br />

■ Service quality will be defined by real-time customer satisfaction rather than contractual service-level<br />

agreements.<br />

■ Contract durations will shorten, and contracts will change very rapidly.<br />

■ Services will be terminated whenever quality drops below the acceptable market level, bringing<br />

structures much like price-comparison sites to B2B offerings.<br />

■ These effects will accelerate as Generation Y makes up an increasingly large percentage of the adult<br />

population.<br />

77


On the horizon<br />

Things on their way in<br />

These trends are coming. Big.<br />

As we prepared these materials, we had to restrict ourselves a bit. Our “Nine key trends” focused on the<br />

developments that we believe will have the greatest impact over the next three to five years. However,<br />

there are many burgeoning technologies that, in the long run, might have a far more significant impact<br />

than the trends that we have examined more closely. Here are a few nascent trends to keep on your radar.<br />

Data Center on a Chip: As Moore’s law continues to hold, building servers on a chip will soon be a reality<br />

with the potential to revolutionize current infrastructure models and bring massive gains in computing and<br />

energy efficiency. These advances will also present a different set of challenges: system integration with<br />

other technologies, such as networking, where the rate of miniaturization is slower.<br />

Sensors and Sensor Networks: By gathering real-time information on every conceivable variable to<br />

monitor conditions and react automatically, interlinked sensors will play a big part in making systems (and<br />

systems of systems) more efficient. This will put more data in our hands in a more timely and relevant<br />

manner. Sensors have the potential to deliver technology systems on a vast and even societal scale.<br />

These giant systems providing, for example energy, traffic or agriculture management, will change our<br />

world radically.<br />

Internet of Things: Forget about phones and computers; imagine if everyday items were addressable<br />

over a public network – your car, your fridge, even your medical prescriptions. We will soon have countless<br />

numbers of miniature tags, sensors and processors sending and receiving information. As a result, we<br />

will gain even greater knowledge and control over the world around us, and even over our own bodies.<br />

Recording, informing, responding, tuning, pre-empting. This is the Internet of things and it is not far away.<br />

Tactile Interfaces and Haptics: Until now, our ability to interact with devices has been fairly limited: mostly<br />

just pressing keys and sliding a mouse around. Multi-touch devices, such as phones and tablets, are<br />

already teaching us about the shortcomings of the mouse and keyboard. But there are many more ways<br />

that we can provide input into digital systems, and such systems will be capable of providing feedback to<br />

us via touch. Adding a tactile dimension to 3D images will take virtual reality to a new level.<br />

Semantic Web: In many ways, Internet-powered machines have become our eyes and ears – scanning the<br />

globe to find information for us. However, those machines are still very limited when it comes to drawing<br />

useful conclusions from what has been found – a computer on its own cannot read and understand a Web<br />

page. The concept of a Semantic Web envisions a world in which machines not only find the dots, but also<br />

connect them. They won’t just provide information for us to analyze, they will be able to initiate action on<br />

what they find.<br />

78


Wireless Energy: We saw what happened when we cut the cords off our telephones. What will happen if<br />

we cut the cords off a myriad of other devices? Supplying power without cables has long been a dream. It<br />

will soon be part of everyday life.<br />

Augmented Reality: Augmented reality uses computers to project a layer of graphics or information on<br />

top of physical environments. This technology is being used for applications ranging from video games<br />

and automotive navigation displays to computer-enabled weapons and surgery assistance systems.<br />

79


Rest in peace<br />

Things on their way out<br />

Their time has come. And gone.<br />

It’s often difficult to envision a world without the tools that we rely on. However, as revolutionary as some<br />

advances are, they are not necessarily permanent. As a case in point, just look at the rapid rise and<br />

subsequent decline of the fax machine. Once a highly useful technology, these devices have nearly faded<br />

into oblivion. Here are eight things that will soon go the way of the fax.<br />

E-mail: The mobile revolution has been accompanied by a boom in text messaging; the domination of<br />

social media, instant messaging, chats, status updates, and even video calls are replacing e-mail. The<br />

purpose of e-mail has changed markedly over its lifetime – from an expression of thought to an expression<br />

of identity – and is being used to unite multiple online profiles.<br />

Mice and Keyboards: Touch, movement detection and speech input are on the advance and even cameras<br />

and microphones are able to scan your environment and grab the information that you need to enter.<br />

Newspapers: Struggling newspapers have been trying to reinvent themselves for quite some time now. It’s<br />

not working. Digital media are crushing their print counterparts and making a financially sound transition<br />

to the new platform is a huge challenge.<br />

Scheduled TV Programming: Viewers are already putting together their own entertainment smorgasbord<br />

based in their personal preferences and schedule. Sporting events are pretty much the only thing left to<br />

stay on a strict schedule.<br />

3G: Rollout of 4G technologies is already beginning. Fourth-generation cellular technology is poised to<br />

bring us more data at higher speeds and in better quality.<br />

Physical Media Formats: The advances of networking technology combined with the rise of cloud storage<br />

will put the focus on the data, making the media that it is stored on irrelevant. Data carriers like CDs<br />

and DVDs will quickly become obsolete, and Blu-ray discs may be remembered for being the last physical<br />

media format.<br />

Large IT Projects: Rather than design, build and test custom applications associated with long delays and<br />

high risk, organizations are increasingly piecing together modularized, commoditized elements to meet<br />

their needs more quickly and inexpensively. Agile development and exploiting on-demand technology will<br />

be the order of the day.<br />

80


Long-term Contracts: We are moving toward outcome-based, agile contracts. These agreements will<br />

move parties towards a common desirable result rather than trying to define a certainty. Where the<br />

telecoms and utilities industries have led, with consumers regularly switching to get the best deal, other<br />

industries will follow.<br />

Business Desktop Services (as we know them): IT users are increasingly tech-savvy and desktop<br />

technology has matured. As enterprise IT becomes consumerized, retailers will be providing bulk<br />

technology services to individuals.<br />

81


Conclusions<br />

Drawing conclusions<br />

Our perspective<br />

In this paper, we have discussed some of the forces that are driving change and discussed some of its<br />

implications. We have examined nine key trends. We have looked at information: the social media<br />

revolution, the demand for information in real-time and how this can be secured and protected. We have<br />

surveyed some of the major trends in technology – the emergence of cloud computing, the ubiquity of<br />

personal devices and the commoditization of applications – and we have investigated changes to the<br />

business landscape, the workplace and to human values. By analyzing these trends, we have distilled our<br />

12 predictions and attempted to capture their key implications. We have looked at what is coming on<br />

the horizon and those things whose days are numbered.<br />

We started out with a single assumption – that the world is becoming more complicated. And this is<br />

about the only thing we can say with any confidence about the future. But while we should acknowledge<br />

uncertainty, we believe it is crucial to anticipate change and plan for the implications of it.<br />

So what should you takeaway from this? We have examined a large number of ideas covering many<br />

different types of technologies and human activities. But what are the important principles effecting the<br />

changes that we are anticipating?<br />

To conclude, we have highlighted some themes that we believe are particularly relevant to navigate the<br />

coming period of change. These themes run like currents underneath the visible surface changes that we<br />

have been describing.<br />

Freedom of choice<br />

The evidence points to us moving to a world of greater choice. Whatever we plan to do, we are confronted<br />

with many alternative ways of realizing our objectives. Choice is increasing at every level of decision<br />

making, whether it is an individual deciding which phone to buy or a large organization contemplating<br />

an outsourcing decision. With the genies of consumer technology and cloud services out of the bottle,<br />

organizations will struggle to maintain a single set of technology sources or styles of provision. And to do<br />

so might be to ignore a growing source of value. Having a clear idea of needs, preferences and wants will<br />

be crucial in a world of greater choice.<br />

We believe that organizations will need to evolve to make the management of choice a business practice.<br />

They will need to be able to move dynamically between strategy and execution, and understand the<br />

parameters that led to a certain choice being made. In the world of cloud computing, seemingly<br />

innocuous changes – a change in the cost of online storage say - may have major implications for the<br />

enterprise technology strategy. Organizations will need the visibility and agility to respond to market<br />

changes to ensure they are pursuing the optimum strategy at any given point in time.<br />

In order for organizations to make informed choices, it is critical that they understand their own<br />

businesses. They need to know which activities are core to their existence and identity, and which exist<br />

82


The information supply chain<br />

Production<br />

Creation of<br />

components,<br />

application<br />

development,<br />

technology,<br />

e.g. storage,<br />

network, etc.<br />

Increasing value<br />

Aggregation Integration Presentation Consumption<br />

Bundling of<br />

components<br />

into information<br />

services,<br />

e.g. a healthcare<br />

app from a<br />

bundle of apps<br />

Configuration<br />

and implementation<br />

in a<br />

particular context,<br />

e.g.<br />

organization or<br />

region-specific<br />

or configured<br />

to interface to<br />

other services<br />

Presentation of<br />

the information<br />

service to its<br />

target audience<br />

Consumption of<br />

the service by<br />

the subscriber<br />

Revenue<br />

to service the organization. They need to be aware of how much services cost to provide, and how they<br />

provide value to the business.<br />

A new vocabulary<br />

The world seems to be moving toward a place where technology is much more abstracted, both at the enterprise<br />

level, where everything is becoming virtualized to the individual level, where people expect technology<br />

to work off-the-shelf. Organizations will need to be able to articulate technology investment and<br />

purpose much more in terms of business outcomes – e.g. the IT spend required to attract a new customer,<br />

or the carbon footprint of a credit card transaction. There will be greater opportunities for organisations to<br />

consume business services from suppliers directly – particularly as we have seen in the consumption of activity<br />

and content modes of cloud consumption. In order to accomplish this, the culture of the organization<br />

must move away from one that thinks only in terms of resources and activities. Online business services<br />

will become ever more important as human resources begin to be supplied and consumed in a cloud<br />

engagement model. In effect, organizations will have to reassess – and adapt – their business models.<br />

83


The Information Value Chain is one way that an organization can view the relationship between<br />

technology, service and business value that underpins how they function. A value chain is about<br />

identifying the component outputs of a business, how they are built up and delivered, and where the<br />

value in them is created along the way. These components are composed of products and services, and<br />

may be created or carried out by a number of different parties – both internal and external – in<br />

exactly the same way as a manufacturing supply chain. By taking a value chain view, it is easier for an<br />

organization to focus on what they are trying to achieve and the best way of doing it. It enables<br />

organizations to be agnostic about which components are provided by suppliers and to have greater agility<br />

in the way they architect their businesses. The information value chain gives an organization greater clarity<br />

of the areas in which they can uniquely add value and everything that underpins their brand (see Fig.<br />

above). We believe the value chain view will equip us better for the future than the more traditional and<br />

real estate-based reference architectures. Increasingly, what will be important is plotting the external<br />

services that are supplied, the relationships between them, and how value and risk flow throughout.<br />

Service aggregation will play a key role in the value chain. Third-party aggregators will assemble and<br />

execute areas of the chain on behalf of a customer. The marketplace will move so that the components in<br />

the chain will become commoditized and flexible. Long-term contracts will become rare and SLAs will be<br />

determined by the market. The vision of a flexible, responsive and dynamic business is at last becoming<br />

a realistic possibility.<br />

Organic solutions<br />

Complexity and control exist in a trade-off relationship. The more complicated things become, the harder<br />

it is to control them. We think that organizations are already struggling with complexity and many will find<br />

adopting new ways of working, such as consumption of cloud services or self-procurement too difficult<br />

to achieve. But there is some good evidence, particularly from the world of social media and social<br />

networking, that organic mechanisms can successfully generate value in a complex system. A social<br />

network is organized on the sum of all the decisions of its members. A group of people, provided there is<br />

a payoff for a ‘successful’ interaction, will naturally organize themselves to create value. It is of course<br />

important for an organization to recognize the activities that are crucial to its business, and control these<br />

proactively. But for many other transactions, an organization might see greater value by relaxing control.<br />

Examples are outcome-based or agile contracts – agreements that move parties towards a common<br />

desirable outcome rather than trying to define a certainty – or trust models in security.<br />

When it comes down to it, this is a question of risk. We have seen that the challenge is to enable value<br />

for an acceptable level of risk. But we also have to recognize that, in the context of a rapidly changing,<br />

interconnected world, our assessment of risk and value may need to be recalibrated.<br />

Innovation can be game-changing and, when it is, we need to rewrite the rule book.<br />

84


Credits<br />

Acknowledgements and disclaimer<br />

About the author<br />

David Gentle, Strategy Manager, <strong>Fujitsu</strong> Global Business Group<br />

David is an analyst working in <strong>Fujitsu</strong>’s Global Business Group, providing thought leadership both internally<br />

and to customers, and shaping business and technology strategy across the global <strong>Fujitsu</strong> organization.<br />

He has 15 years’ experience of working in the IT industry, five of which have been with <strong>Fujitsu</strong>. David has a<br />

background in leading large IT infrastructure projects with blue-chip customers in the U.K. and abroad. He<br />

has a degree in economics from the University of Bath.<br />

With special thanks to Marc Silvester as well as Craig Baty, Terry Blow, Christina Blunt, Andrew Brabban,<br />

Richard Clarke, Guy Daniels, Adrian Dickson, David Hannam, Tatsuya Hidano, Ian Humphries, Alan Goswell,<br />

Paul Higgs, Glen Koskela, Kim Kranz, Andreas Lechner, Mark Locke, Manuel Ludwig, Alex Macadam, Mike<br />

Macken, Mark McGuire, Cameron McNaught, Heiko Mergard, Steve Nunn, Claire Pritchard, Dr. Joseph Reger,<br />

Vincent Rousselet, Pernille Rudlin, Lester Russell, Jat Sahi, Michael Schmitz, David Smith, David Steven,<br />

Clive Tillotson, Masayuki Tokuda, Sabine Twest, Sanya Uehara, Bala Varadarajan, Stefan Vomstein, Sophie<br />

Weguelin, Susanna Wendelin, Rachel Wellings, Lynn Willenbring, Mark Wilson, and Philip Oliver.<br />

Cautionary Statement<br />

These presentation materials and other information on our meeting may contain forward-looking statements that are based<br />

on management’s current views and assumptions, and involve known and unknown risks and uncertainties that could cause<br />

actual results, performance or events to differ materially from those expressed or implied in such statements. Words such as<br />

“anticipates,” “believes,” “expects,” “estimates,” “intends,” “plans,” “projects,” and similar expressions that indicate future<br />

events and trends identify forward-looking statements. Actual results may differ materially from those projected or implied<br />

in the forward-looking statements due to, without limitation, the following factors:<br />

General economic and market conditions in the major geographic markets for <strong>Fujitsu</strong>’s services and products, which are<br />

the United States, the EU, Japan and elsewhere in Asia, particularly as such conditions may effect customer spending;<br />

Rapid technological change, fluctuations in customer demand and intensifying price competition in the IT,<br />

tele-communications, and microelectronics markets in which <strong>Fujitsu</strong> competes;<br />

<strong>Fujitsu</strong>’s ability to dispose of non-core businesses and related assets through strategic alliances and sales on commercially<br />

reasonable terms, and the effect of realization of losses, which may result from such transactions;<br />

Uncertainty as to <strong>Fujitsu</strong>’s access to, or protection for, certain intellectual property rights;<br />

Uncertainty as to the performance of <strong>Fujitsu</strong>’s strategic business partners;<br />

Declines in the market prices of Japanese and foreign equity securities held by <strong>Fujitsu</strong>, which could cause <strong>Fujitsu</strong> to<br />

recognize significant losses in the value of its holdings and require <strong>Fujitsu</strong> to make significant additional contributions<br />

to its pension funds in order to make up shortfalls in minimum reserve requirements resulting from such declines;<br />

Poor operating results, inability to access financing on commercially reasonable terms, insolvency or bankruptcy of <strong>Fujitsu</strong>’s<br />

customers, any of which factors could adversely affect or preclude these customers’ ability to timely pay accounts receivables<br />

owed to <strong>Fujitsu</strong>; and Fluctuations in rates of exchange for the yen and other currencies in which <strong>Fujitsu</strong> makes significant<br />

sales or in which <strong>Fujitsu</strong>’s assets and liabilities are denominated, particularly between the yen and the British pound and<br />

U.S. dollar, respectively.<br />

85


FUJITSU LIMITED<br />

Shiodome City Center, 1-5-2 Higashi-Shimbashi<br />

Minato-ku, Tokyo 105-7123, JAPAN<br />

Tel. +81-3-6252-2220<br />

www.fujitsu.com<br />

Copyright © 2010 <strong>Fujitsu</strong> Limited<br />

All rights reserved. No reproduction, copy or transmission of<br />

this publication may be made without prior written permission<br />

of <strong>Fujitsu</strong> Limited.<br />

86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!