Sunteți pe pagina 1din 36

Riding the Seven Waves

of Change That Will Power, or


Crush, Your Digital Business
From hyper-personalization to API-driven
ecosystems, heres how to master tomorrows
technologies and business models today.

Preface
Amid perpetual and accelerating technology shifts, businesses must ratchet up their
ability to see, make sense of and respond to proliferating volumes of data. This data can
yield predictive insights on everything from developing more personalized products and
services, to unsnarling complex operational logjams.
Progressive organizations are already opening their APIs to business partners and
embracing micro-services to fuel continuous innovation and build profitable e-business
platforms. Meanwhile, these forward-thinking enterprises continue to address persistent
security challenges with pervasive, layered approaches that keep mission-critical data
and networks safe from prying eyes.
What follows is our crystal ball into seven critical technology and business upheavals your
organization must navigate to succeed in the digital age.
We hope you find our perspective thought-provoking and prescriptive. Feel free to contact
me at the e-mail below to discuss how these trends relate to your business and industry.

RAJ BALA
CHIEF TECHNOLOGY OFFICER
COGNIZANT TECHNOLOGY SOLUTIONS
Rajasekaran.Balasubramaniam@cognizant.com

KEEP CHALLENGING January 2016

Executive Summary
Across every industry and in every corner of the globe, customers
are demanding smarter, more personalized and more secure (yet less
expensive) products and services. Meeting these imperatives will require
new technologies and information architectures, as well as new ways of
working and thinking about business and customers.
To understand these emerging business and technology mandates, look no
further than the mirror.
Whether as an individual consumer or a business customer, you are more
apt to buy from companies that dont just meet but anticipate your needs,
as well as customize products and services around your wants and desires.
You mercilessly shop for the lowest price but expect the highest levels
of service. You demand superb, instant support anywhere and anytime
over any device, including mobiles and wearables. And any company that
compromises your personal or corporate information because of a security
breach is relegated to your blacklist.
As buyers and as sellers, the ground is shifting beneath our feet, propelled
by seven fundamental technology and business waves. These include:

1. Gaining insights from the digital data generated by the online


activities of every person, device and process. By analyzing these evergrowing data volumes which we call Code Halos organizations can
uncover opportunities for revenue, savings and the development of
new markets, products and services. Read more about the emerging
insights-driven enterprise on page 6.

2. Serving markets of one by hyper-personalizing products and


services that meet and anticipate customers spoken and unspoken
needs. Business impacts include increased market share and the ability
to command premium pricing. Read more about the coming age of
hyper-personalization on page 9.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

3. Establishing a smart, pervasive security strategy for a hyperconnected world that replaces walled gardens with self-protecting
assets. This approach will enable businesses to securely provide
customers, employees and business partners with the digital
capabilities and information they need. Read more about over-thehorizon developments in pervasive security on page 12.

4. Seeing, knowing and responding in real time, using just-in-time


intelligence from inside and outside the enterprise, including the
ambient information generated by the proliferating Internet of Things
(IoT). Embracing the IoT is already enabling pioneering organizations
to sense and respond to everything from looming problems in machines
and production processes, to subtle but important shifts in customer
behavior and sentiment. Read more about coming trends in just-intime intelligence on page 16.

5. Enabling enterprise control through digital code, using softwaredefined automation. Doing so enables organizations to not only
slash IT and operational costs but also respond more nimbly than
competitors to changing market requirements. Read more about the
expanding software-defined enterprise made possible by automation
everywhere on page 19.

6. Opening application programming interfaces (API) to create


network effects that transform connected applications and data into
holistic business platforms (think Salesforce.com in the software-as-aservice space). These platforms drive revenue as partners leverage
your organizations data and systems. Read more about the evolving
API ecosystem on page 23.

7. Creating new skills and technology sourcing models that dramatically


reduce the cost of acquiring and using information technology.
Tapping new sources of global talent and technology allows businesses
to ramp usage up or down as needed without prohibitive onboarding,
training and other overhead costs. Ultimately this will accelerate the
gig economy trend that has already emerged. Read more about realtime skills sourcing on page 27.

KEEP CHALLENGING

January 2016

Meeting these challenges, and exploiting these new models, requires


a keen understanding of todays dynamic world, in which the pace of
technology change is accelerating more rapidly than ever before. All
of the drivers we have identified are tightly interrelated and cannot be
understood in isolation. The insights-driven enterprise, for example, both
drives the need for and helps deliver hyper-personalized products and
services. Just-in-time intelligence from IoT devices helps deliver real-time
intelligence to enable better business decisions, as well as the real-time
awareness required to improve security.
Understanding and responding to these transformative shifts holistically
is not an academic exercise. In just the last few years, industry giants have
been increasingly challenged and even rendered irrelevant by upstarts
that have applied new technologies and business models to win the hearts
and pocketbooks of switched-on digital consumers.
With shifts in all these areas moving at breakneck speed, the greatest
danger is failing to imagine how an unknown startup could disrupt your
business just when you think all is safe. At the same time, proactively
exploiting these trends can open new horizons in terms of careers,
business models, products, services and lifestyles that are unimaginable
by even the most digitally-savvy industry guru.
Read on to learn more about the opportunities and challenges created
by these seven interrelated trends, and see how our field-proven
recommendations can help your business gain an unfair advantage on the
competition.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

SECTION 1:

The Insights-Driven Enterprise


Move from Raw Data to Insights, Faster
Todays Reality
Enterprises have access to more data than ever, originating from a plethora of
sources, including consumers Web activity, wearable fitness monitors, smart
manufacturing equipment, social media and internal legacy systems (see Figure 1).
Translating these bits and bytes of structured and unstructured data into insights
and foresights is a concept we call Code Halo thinking.1 As computing and storage
costs decline yet enable ever-faster and more precise analysis of this data, enterprises can react more quickly, even proactively, to changing market requirements,
as if they were reading their customers minds.
Being first to discover and act on these insights also enables organizations to
maximize profit margins (through cost reduction or premium pricing) or gain
market share (through smarter upselling and cross-selling). Analyzing sales data
can reduce costly inventory and improve the accuracy of staff scheduling, while
the mining of network log data can uncover hidden security threats. Analyzing
past outcomes can help hospitals save lives by deciding which patients to treat first
in emergencies. Monitoring machine status (such as temperature, vibrations and
energy consumption) can prevent costly damage or failure.

Combining Structured, Unstructured Data to Generate


Actionable Customer Insights
Accurately linking structured data to unstructured data enables actionable customer- and store-level insights that were
previously unavailable with other methods and systems.

System removes unknown variables from


customer feedback and categorizes
.
it
Username: bsmith
E-mail: bsth@yahoo.com
Sex: Male
Age: 22
Location: Madison, WI
Persona: Student
Website: ACME.com
Product: X4 Ultrathin
Review Date: 05/23/2011
Overal Rating: 3.0
Display: 3.0
Performance Rating: 5.0
Convenience Rating: 3.0
Likelihood to Recommend: 8

I was so excited to get my new


laptop from ACME. It has super sick
graphics, beefy cpu and awesome
battery life. The laptop was not easy
ebsite. When I found
to
it I didnt want to pay for the rediculous shipping cost...so I went to the
store to pick it up. The place was a disaster area it made me sick. I couldnt
anything. After waiting for 20
minutes for a yellow shirt
help. Ted was friendly, but, he had no
idea how to answer question about
the X4. Man, i loved that laptop but
this sale should have been easy and
it wasnt. #fail ACME :( Im going to
Target.

Graphics
X4 >
Student

Excitement
X4 > Student

Churn Target
City > Store 1234

Churn Target
City > Store 1234
In-Store Organization
City > Store 1234

Battery Life
X4 > Student

In-Store Wait Time


20 minutes > City

Love
X4 > Student

Store 1234 > Laptops > Ted

ttitude
Store 1234 >
Laptops > Ted
CPU
X4 > Student

Training
City > Store 1234

Buying Experience
City > Store 1234 > Student

Website Search
X4 > Student

Source: Customer Insight Command Center Speeds Just-in-Time


Marketing, Cognizant Technology Solutions, September 2014.

Figure 1

KEEP CHALLENGING

January 2016

Even more powerful are the new business models built around real-time, even
predictive, awareness of customer needs and trends. Examples range from auto
insurers that can price policies based on real-time driving behavior gleaned from
on-board sensors, to Amazons ability to predict orders from a given geography
and pre-ship them to a local warehouse for faster delivery when the actual order
is placed.2
Whatever your industry, failing to move toward an insights-driven approach will
render you progressively blind to market opportunities and risks, and at risk of
being outmaneuvered by competitors with a clearer view of near- and long-term
trends.
The following are some of the new tools businesses are using to build and extract
meaning from Code Halos:

Cognitive computing, which uses machine learning to create systems that are
easier and more natural for humans to use.

Machine learning, in which applications learn new patterns and responses


without being specifically programmed.

Natural language processing that mirrors human speech and writing patterns.

Predictive analytics that anticipate and meet the needs of customers at


ever-lower costs and greater speed.
Prescriptive analytics that help enterprises identify the next best action for a
given scenario.

Tomorrows Possibilities
The dual forces of improved analytics and cost-cutting pressure will lead enterprises to automate more strategic decision-making. This is already happening with
routine text entry and accounts payable tasks and will spread to more sophisticated
decisions, such as audit and tax compliance. Over time, software bots (programs
that operate on behalf of a user or another program and mimic a human activity)
will optimize business processes, bringing more intelligence to both customerfacing processes, such as real-time product recommendations and discounts, and
internal processes, such as IT security and management.
Analyzing consumer data location, purchases, social media postings, etc. will
enable businesses to more accurately predict customer needs and offer customized
solutions. IoT data will enable manufacturers to more completely understand
the lifecycle of the devices they produce and better support them. Recognizing
the importance of customer sentiment, businesses will also look for new ways
to measure emotions such as enthusiasm and excitement, along with customer
actions, such as downloads and clickthroughs.3
At the same time, more powerful analytics and big data tools will enable organizations to move from backwards-looking dashboards to proactively addressing
customer needs, identifying market trends and creating new business models.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

Quick Take
Advice for the Insights-Driven Enterprise

Focus on providing a superior customer


experience, which is where businesses must
outshine their competitors. For example, organizations can build personalized models of various
customer types through machine learning, and
apply predictive analytics to drive higher-margin
sales and improve marketing campaigns. They can
also use social, mobile and analytics tools to collaborate with customers, obtain their early feedback on
new products and services and adapt offerings in
real-time to best meet their needs.

Develop expertise in, and acquire appropriate


tools for, big data analysis, modeling, analytics
and data visualization, such as in-memory
computing or stream processing.4 Put special
emphasis on modeling choosing the proper data,
algorithms and variables and validating that they
reflect how the business actually operates. Learn
when to use deductive modeling (working from
general hypotheses to more specific predictions) vs.
inductive modeling (working from specific observations and building hypotheses from them).

insurer, for example, might focus data collection


on policy holders at risk of developing chronic and
costly conditions such as diabetes. Aggregating
every bit of old and new information from all sources
can drive storage, processing and data management
costs to unacceptable levels. Collecting everything
and sorting out the relationships later can lead to
higher costs and delayed business benefits. Keep in
mind the garbage in/garbage out rule, focusing
relentlessly on data quality.

To make the best use of IoT data, employ abstraction layers, such as master data management and
metadata models, that allow business users, not
just IT professionals, to understand what data
is available, what the data represents and how
to quickly generate insights. Leverage existing
data from legacy industrial sensors, as well as the
analytic models used in legacy systems, to schedule
maintenance, production runs and the ordering of
raw material.

Dont be discouraged if existing algorithms


cannot process the amount and variety of data
generated by devices on the IoT. Employ a divide
and conquer approach, splitting the largest
business problems into subsets that can deliver
useful and accurate results, using current analytics
tools and real-time data.

Remember that human input is still needed to


ensure problems are properly modeled in ways
that reflect the actual data. This is especially true
for activities in which it is unclear which variables
influence each other. Similarly, people-focused
sanity tests should be applied to the insights
generated. Just because an algorithm detects a
customer is pregnant doesnt mean she would
welcome a congratulatory package of coupons
for baby gear, as one U.S. retailer found with an
underage customer living with her parents.5

>> Understand and acquire skills in managing and

analyzing the different types of structured and


unstructured data required for real-time insights
into various types of problems.

Master the visualization and sharing tools


that enable self-service, on-demand analytics for
employees. New services such as Amazon Web
Services QuickSight are already coming online to
provide on-demand business intelligence.

Plan for the move to predictive analytics by identifying key processes for which taking action before
it happens can result in outsized business benefit.

Invest in the infrastructure and application tools


and skills required for agile, relatively low-cost
experimentation, quickly proposing hypotheses,
testing them and then acting on the results. If the
cost of experimentation is too high, businesses will
not be able to build a culture of sustained improvement and innovation.

Carefully choose which data to collect and


analyze based on your specific industry and
business challenges, as well as the value of the
customer, device or process involved. A health

KEEP CHALLENGING

January 2016

SECTION 2:

Hyper-Personalization
Serving Markets of One
Todays Reality
Every customer has unique wants and needs, even if he or she is the same age or in
the same income bracket or ZIP Code as countless others. Todays most loyal and
lucrative customers expect products and experiences to reflect their ever-changing
preferences, needs and context, such as their past behavior, choice of device and
location, and forward-thinking companies are responding (see Figure 2).
By analyzing big data analytics, geolocation and historical metadata, enterprises
can customize products and services to meet, anticipate and exceed customer
needs (see Section 1 on the insight-driven enterprise, page 6). The supply chain for
physical products and digital services must support just-in-time customization, or
hyper-personalization, and technologies such as natural language processing, textto-speech and avatars must provide hyper-personalization capabilities in the most
user-friendly form.

More Than Half of All Marketers Use Personalization


Marketers were asked if they were using real-time (<1 second) personalization in any of the following channels. (Multiple responses allowed.)

HELLO
my name is

44%

42%

17%

Website

13%

Mobile
Web
Website Application

9%
Mobile None of the
App
above / NA

Base: 242 respondents with marketing


or line-of-business titles.
Source: Trends & Priorities in Real-Time
Personalization, Researchscape
International, 2015

Figure 2

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

British Airways Know Me program, for example, combines various data sources
to create a single customer view, and uses it to give extra attention to high-value
customers or those who have recently experienced delays or other problems. It also
allows employees to search Google Images for a photo to immediately recognize
such customers.
Some retailers are already using big data analytics to build detailed records of the
behavior of their best customers and proactively push offers to them in anticipation
of their needs. These records might show, for example, that a customer submits a
clothing order every six to eight weeks at lunchtime on Wednesday. If the shopper
hasnt purchased by Thursday morning on that cycle, the retailer can send an offer
for the customers favorite sweater style in a color he doesnt yet own.
For some products, technologies such as 3-D printing (at a site near the customer
or vendor) can speed production and delivery of hyper-personalized products. An
example is Normal,6 which provides a smartphone app that allows customers to take
a photo of their ear canal, from which the company can custom-print earphones.
Another example of the hyper-personalization phenomenon comes from wireless
provider Virgin Mobile, which enables customers to build their own service plans
based on the number of users and amount of voice, data and texts they wish to
pay for, even how much data different family members can use. In India, wireless
provider Tata Docomo used Facebook Custom Audience to display customized ads
to users based on their recent Facebook activity. As a result, the company won
back more than 350,000 lapsed customers, boosted the use of services such as
paid subscriptions for songs by 26% per user, and realized more than $2 million in
incremental revenue per month.7

Tomorrows Possibilities
The first wave of personalization is well underway, with customers responding to
shopping recommendations from businesses such as Amazon and entertainment
recommendations from Netflix. Such on-the-fly customization is now spreading to
other services and mainstream markets.
In healthcare, doctors sometimes use insights into a patients unique biome
the unique mix of bacteria and other organisms in their bodies to tailor diet or
medication recommendations.8 Successful businesses are also intuiting customers
intentions from their actions, both online and offline, in increasingly sophisticated
ways to understand the implicit requests they make.
For example, a retailers Web analytics might indicate a customer has conducted
three searches on the companys site for extra-large buffalo plaid flannel shirts
but failed to make a purchase. The businesss CRM records might show the customer

10

KEEP CHALLENGING

January 2016

initiated a chat on the issue but gave up after failing to connect with an agent. The
retailer could respond by generating a customized offer to check its remainders,
back inventory and upcoming shipments to find the best price on the specific item.
A customer receiving such proactive help is much more likely to complete that
transaction and recommend the site to others.
Businesses that generate the greatest sales and margins will explore opportunities
to push highly personalized offers to customers, based on their location in the store,
their Web search patterns or other behaviors that indicate a need for assistance
(see Figure 3). This will require the adoption of emerging technologies such as
locator beacons and smart mirrors that allow a customer to view how an item
would look on them, and share the image on social media.
Such on-the-fly customization can boost customer loyalty and sustain, even expand,
market share. Moreover, it can provide the opportunity to create and deliver products
and experiences that command a premium and
possibly disrupt entire industries. Think Uber and
Targeting Customers
its ability to match the needs of individual vehicle
owners (i.e., to earn money) with passengers who
need transport (and are willing to pay).
On a more tactical level, hyper-personalization
driven by analytics and machine learning can
reduce support costs and improve customer
service by providing highly customized services
without costly human intervention. Imagine the
convenience for a commercial customer, and
the associated reduction in administrative costs,
if a supplier could predict its use of various raw
materials and automatically deliver just the right
amount of the right material at the right time.
Assuming an organization has properly tweaked
its supply chain, such hyper-personalization can
also help it profitably serve niche markets with
smaller production runs.

with Custom Offers


Welcome, Angela! Todays
deal: Buy this top for 50% off!

BEACON

Of course, this requires a business to enable


hyper-personalization at low enough cost levels
(or charge enough of a premium) to make the
Figure 3
effort worthwhile. Further, faulty execution (poor
recommendations, hard-to-use interfaces) will
hurt rather than help the brand, as will the failure to create ordering, production
and distribution systems flexible enough to deliver the customized product, services
or content.
Ensuring data quality to support such hyper-personalization can be a major
challenge, especially as data is drawn from multiple internal and external systems.
Finally, organizations need to meet increasingly stringent security demands to
protect customer data (see Section 3 on pervasive security, page 12).

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

11

Quick Take
Advice for Hyper-Personalization

Provide intuitive tools for self-customization of products and services. For example, one wireless provider
already lets customers use their current bill to estimate the most suitable custom plan.

Be clear with your customers about which of their actions are being tracked, and provide an opt out.
Experiment with the proper medium and timing of personalized offers. Many businesses may begin by overpersonalizing their offers in ways that customers reject as intrusive, and then pull back in the face of resistance.

Start small, iterate often and be prepared to fail forward by learning from your mistakes. Even with the most
advanced analytics, it can still be difficult to determine the context of a customers actions and intent.

Put business-savvy humans in the loop for a common-sense review of the validity of the analysis and the
action taken based on it. For example, if an algorithm finds that lower-income home buyers in a specific age group
are a better loan risk than previously thought, human experts should review the underlying data to ensure it has
not been manipulated by, for example, unscrupulous lenders.

SECTION 3:

Smart, Pervasive Security for


a Hyper-Connected World
Deploying Layers of Self-Protecting Digital Assets
to Mitigate Cyber Risk
Todays Reality
Every day, more applications and services move to the cloud, as businesses realize
cost savings and boost agility through highly networked, just-in-time IT and human
resources. Along with the explosion of mobile devices and applications, this
approach dramatically increases the variety and complexity of technologies that
employees, partners and customers need, when and where they choose.
Securing this hyper-connected world requires organizations to move beyond the
traditional secure perimeter they established around their business-IT infrastructure. While this may once have protected their business-critical traffic, attackers
who penetrate the organizations walled garden can now compromise almost any
critical system, posing unacceptable risk. This is a no-win proposition in todays
digital age when its difficult to predict which employees, business partners and
customers may need system resources at any time.
The dangers are only magnified by the rise of organized hacking for profit, and
espionage or sabotage by nation-states. One look at the rise of security breaches
in the retail space such as the recent hacks into toymaker VTechs website and
Mattels Hello Barbie algorithmically-powered doll9 reflects the magnitude of the
problem that will only get worse over time if organizations do not plug the gaps in
todays leaky IT environments (see Figure 4, next page).

12

KEEP CHALLENGING

January 2016

Retail Under Siege

BARTELL HOTELS
UPS

Digital theft and fraud committed in 2014.

AARON BROTHERS

400K customers
credit & debit card
information stolen

TARGET

40M individuals
contact information
stolen
MICHAELS

2.6M individuals
credit card
information stolen

JAN

FEB

MAR

APR

MAY

SALLY BEAUTY

Company admits that about


25K credit card numbers
350K individuals were compromised,
credit card
but others speculate
information stolen that 280K+ records
may have been impacted
NEIMAN MARCUS

55K customers
Customers
information
personal
reportedly stolen
information
KMART
from 60
Malware stole
UPS stores
credit card
compromised
numbers
GOODWILL
from 1,200
868K credit &
Kmart stores
debit cards
for over
P.F. CHANGS
reportedly stolen a month
33 P.F. Changs
locations affected
NOV
JUL

JUN

ALBERTSONS
SUPERVALU

AUG

SEPT

OCT

HOME DEPOT

56M individuals
credit card
information
stolen

Payment card data


compromised at
180 Supervalu
stores between
STAPLES
June 22 & July 17 113 U.S. stores
affected, 1.16M
shoppers debit &
credit card data
stolen

DAIRY QUEEN

Credit & debit


card information
compromised at
395 Dairy Queen
and Orange Julius
stores

Source: 2015 Dell Security Annual Threat Report, Dell Computer, 2015.

Figure 4

The answer lies in implementing pervasive layers of assets that are intelligent
enough to protect themselves. Such approaches include containerization
multiple, isolated environments that enable personal and professional use of the
same system and technologies like encryption and mobile management tools that
control what users can do with their company-supplied or personal devices.
Machine learning and artificial intelligence also help by correlating multiple securityrelated events from various systems to identify the source of a breach, and
adaptively learning how to counter it.

Tomorrows Possibilities
The number and types of systems vulnerable to attack will explode with the accelerating adoption of mobile technology, as well as the 50 billion smart devices expected
on the IoT by 202010 (see Figure 5, next page). Public concerns over IoT security will
only grow as more revelations emerge, such as the misuse of embedded software
to seize control of a vehicle11 and the hacking of medical equipment to change drug
dosages.12
Securing devices on the IoT will be especially challenging because some, such as
sensors, lack the computing power or memory to support security mechanisms
such as encryption and authentication. Because of their long lives, variety and
upgrading difficulties, these devices will continue to be a weak link in the security
chain. This reinforces the impossibility of physically controlling every end point,

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

13

Meeting tomorrows security challenges will require a


multi-layered approach and ongoing investment in
assessing, monitoring and remediating an ever-changing
mix of attack vectors, as well as ongoing cooperation from
and monitoring of business partners.
as well as the need for stronger authentication models (certificate revocation,
biometrics, a trusted platform module) to protect not only dumb devices but also
the software bots that will increasingly perform functions such as price negotiation on behalf of people.
Meeting tomorrows security challenges will require a multi-layered approach and
ongoing investment in assessing, monitoring and remediating an ever-changing mix
of attack vectors, as well as ongoing cooperation from and monitoring of business
partners. Stakeholders must realize that vulnerabilities considered acceptable
when applications were seen only by employees must now be addressed now that
every breach is open to the world. Businesses should assume they have been compromised (because they likely have been) and reinvigorate their attempts to identify
anomalies in network traffic and application behavior that could indicate a breach.

The Exploding Internet of Things


Number of connected
objects expected to
reach 50 billion by 2020.

50

50.1

42.1

5%

40

30

Penetration of
connected objects in
total things expected
to reach 2.7% in
2020 from 0.6% in 2012.

34.8
28.4
3%
22.9

18.2

20
14.4
11.2
10

2%

8.7

2012

2013

2014

2015

2016

2017

Number of global connected objects


in billions

Figure 5

KEEP CHALLENGING

2019

2020

Percent of total things


in the world

However,
new
technologies
and
ongoing user education require serious
investment and effort. Correctly calibrating the cost of security with its benefits
is difficult and can lead to over- or under-spending. Security staffs must also be
careful not to reflexively deny access to corporate systems without evaluating the
business benefits of such access, so they are not seen as or actually become a
roadblock to innovation.

Source: Cisco

14

2018

With the right approach to security,


organizations can avoid regulatory
fines, reputational damage and sales
declines, as well as plummeting market
share and customer loyalty in the wake
of breaches. Additionally, businesses can
also use security as a competitive differentiator that enhances their brand,
given increased consumer awareness
of cyber risks. Consistent, reliable and
easily implemented security measures,
supplied by multiple layers of selfprotecting assets, can also drive the
business by allowing it to more quickly
and easily access, analyze and share data
with employees, customers and business
partners. Building security at all levels
also gives businesses the confidence
to move quickly, innovating and experimenting with the knowledge that their
core assets are protected.

January 2016

Quick Take
Advice for Pervasive Security
The most important pillar in a digital security strategy is new thinking. Security is no longer only the job of the IT department,
and cannot only be focused on the perimeter. Security must now be the concern of every employee and business unit, with the
understanding that its not a matter of if, but when, the business will be compromised. The chief information security officer
(CISO) needs visibility into, and a reporting relationship with, the highest levels of management. CISOs must make it clear
that security is no longer a gating function that slows innovation but a critical enabler of the business and protector of the
brand. As organizations adopt DevOps13 to speed application deployment, they should consider adding security experts to the
scrum teams. Security must also be industrialized through increased automation and the auditing of not only code but also
production and test environments at all stages of the development lifecycle.

Security must be the concern of every employee and


business unit, with the understanding that its not a matter
of if, but when, the business will be compromised.
Technologies

Processes

Pervasive security requires a host of emerging and established technologies, deployed in multiple locations, including:

Software-defined security that allows multiple layers of

assets to protect themselves, using abstraction technologies that apply customized policies to any combination
of users, devices or assets and among multiple service
providers. Much as software-defined networks can be
reconfigured without touching physical devices, softwaredefined security can easily adapt to changes in business
processes, the sensitivity of data or the needs of customers,
employees or business partners.

Homo-morphic encryption, which enables workers to


use encrypted data without decrypting it. Data remains
protected even if the corporate firewall is breached.

Ephemeral systems, which are built from known


components and last only as long as the business needs
them, which reduces the number of vulnerable assets.

Micro-services that can be cost-effectively plugged


into applications. This approach can provide pervasive
security by enabling functions such as identity and access
management or encryption. The business owner of each
process must ensure adequate levels of security for each
corporate resource or process. (Read more about microservices in Section 6 on API-driven ecosystems, page 23.)

Easier to use and more robust authentication


approaches. Such techniques include multi-factor authentication, such as verification codes sent to smartphones,
and identification of a users unique pattern of typing or
shifting among applications.

Robust audits and sharing of detailed post-incident


analysis across the business to reinforce that security is
everyones responsibility.

Creation of detailed user- and platform-specific


baselines of normal behavior to help identify potential
threats anywhere in the enterprise.

Use of automation to cost-effectively protect exponential increases in users, data and traffic. This includes the
use of IT forensics and related technologies and algorithms
to detect potential breaches more quickly.

Tailoring

of security to specific devices and users to


minimize cost and effort. For example, clusters of devices
with lower levels of CPU and memory might use symmetric
key pairs to manage encryption, while more capable
devices could employ a public key infrastructure (i.e., the
use of keys and digital certificates to verify identities and
allow the secure exchange of data over public networks)
with asymmetric keys.

Rewards such as less stringent security requirements


for users who follow best practices, such as the use of
strong passwords, not downloading malware or keeping
applications patched.

Ensuring pervasive security through automated threat


tracking to determine which vendors are safe to work with,
and what data to share with them.

Use of DevSecOps (the integration of development,


security and operations teams) to include security in all
phases of the development lifecycle.

Ongoing user training and education to guard against


phishing or other fraud schemes.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

15

SECTION 4:

Just-in-Time Intelligence
Sense and Respond in Real Time
for Customer Benefit
Todays Reality
Through the IoT, businesses face an historic opportunity to use just-in-time intelligence to create new business models or extend existing ones that save customers
time and money, as well as make their lives safer and easier. IoT data is well on its
way to tracking everything from the fuel consumption of a jet engine in flight, to
the temperature of a pallet of frozen food, to a shoppers location in a mall or their
heart rate at the gym (see Figure 6). Devices ranging from drill bits to production
machinery and household appliances are, or soon will be, continuously sensing and
responding to environmental conditions, and sending updates about their health
and status.

How IoT Helps Generate Value

Estimated cost savings (cumulative) in five industries


over 15 years, propelled by a 1% reduction in fuel,
capital expenditures and inefficiencies.

30

66

billion
Gas generation
efficiency

billion
Jet fuel

COMMERCIAL AVIATION

Through better flight


planning and operational
changes.

POWER

Improved gas-generation
through integration of
natural gas and power grids.

RAIL TRANSPORTATION

63

billion
System
inefficiencies

27

billion
System
inefficiencies

Reduced maintenance costs through


real-time diagnostics and predictive
analytics, and eliminating waste
in fleet scheduling through fleet
instrumentation.

OIL & GAS


HEALTHCARE

Identify equipment issues and improve


resource usage and outcomes to drive down
the cost of clinical and back-office operations.

90

billion
Capital
expenditures

By boosting availability of key


equipment sets, reduced fuel
consumption, enhanced production
rates and reduced costs.

Source: Decomposing the Internet of Things: A $14.4 Trillion Opportunity, Cognizant


Research Center, 2014.

Figure 6

16

KEEP CHALLENGING

January 2016

Imagine having a complete view across the value chain, from the latest cost and
shipping time for a raw material, to the status of work in progress in the factory,
to the latest social media sentiment about your organizations brand and product
usage statistics from the field.
Take the Nest thermostat, which learns a homeowners schedule and automatically
adjusts heating and cooling to match it. Manufacturers of products ranging from
commercial air conditioners to truck engines and transformers in electric grids are
reducing repair costs and improving customer service by analyzing performance
trends to identify problems early on and trigger repairs to prevent more costly
failures.

Tomorrows Possibilities
Just-in-time intelligence will expand as Web-enabled sensors become embedded
in clothing, facilitating continual remote health monitoring. Businesses can use
this data to offer products and services, including customized training regimens,
health alerts and personalized equipment, such
as an ankle brace if a sensors analysis of a
runners stance indicates he needs one. One
company already offers shoes that sync with
customers smartphones, track their location
and provide directions by generating vibrations
in the shoes.14

The combination of realtime information on location,


weather and other elements,
combined with the instant
delivery provided by drones,
will provide unparalleled
levels of convenience, as well
as new sales opportunities.

Sensors embedded under the skin could


eliminate the need to wear a separate monitor,
and even be used for authentication to log
into devices or open doors. Sensors from
cars, buildings, roads and weather monitoring
facilities will create smart cities that help
citizens avoid traffic jams, reduce energy use
and react more quickly to safety issues, allowing
authorities to instantly close streets and route
traffic around emergencies. The combination of
real-time information on location, weather and other elements, combined with the
instant delivery provided by drones, will provide unparalleled levels of convenience,
as well as new sales opportunities.

Just-in-time intelligence will be the next competitive battlefield, as businesses race


to meet consumer and business expectations for immediate information, entertainment, help and product delivery. For businesses, timely analysis of field data
will improve the tracking of goods in transit and in the production process, reduce
inventory overhead through just-in-time delivery, and cut transportation costs
through more efficient routing. Better monitoring of equipment in remote locations
will allow proactive detection and resolution of problems, reducing downtime and
repair costs. Analyzing patient information in real time will reduce costs and enable
remote diagnostics and personalized coaching to prevent or reduce the impact of
chronic disease.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

17

Such real-world, real-time awareness if communicated to the right stakeholders


and acted on properly could also help prevent extinction events15 that threaten
the survival of a brand. Consider, for example, if location data from smartphones
indicated that large numbers of customers at a restaurant chain are arriving during
lunch hour but then leaving. The business could immediately investigate to see if
the problem is long lines, poor customer service or discourteous wait staff. On the IT front, real-time analytics of network,
user and application behavior can uncover security breaches
while they are happening, allowing organizations to address
them before they do harm.

Real-world, real-time
awareness if communicated
to the right stakeholders
and acted on properly could
help prevent extinction
events that threaten
the survival of a brand.

However, with so much data available from so many sources,


businesses can incur unnecessary costs, or fail to generate
insights in a timely manner, by storing more data than they
need. Additionally, as with other insight-driven services,
businesses will also need to respect customers privacy and
ensure their security. This will be especially challenging for
IoT sensors that lack the compute or memory resources to
support robust encryption or authentication (see Section
3 on pervasive security, page 12). Early movers must work
around a lack of standards that makes it more expensive and
difficult to integrate legacy or proprietary devices into modern networks, and raises
the risk of vendor lock-in. Organizations must also ensure data quality and consistency between fast-changing edge data and historic information stored at the
core of the network for longer-term analysis.

Quick Take
Advice for Just-in-Time Intelligence
Tapping

the radical new possibilities created


by just-in-time intelligence requires a broader
view of customer needs and potential new
markets. Engage with stakeholders from across
the business and with external partners (legacy
and startups) to uncover the broadest range of
opportunities to add value. While cost reduction,
efficiencies and incremental sales might drive
the first round of innovation, do not overlook
the transformational potential of entirely new
business models built around the convenience,
speed and health benefits of real-time intelligence.

Avoid

big bang initiatives and instead


experiment with relatively quick, easy and inexpensive analytics projects that test and refine
hypotheses about critical business trends.
Scalable, cloud-based platforms for storing and
sharing data will help enable a fail-fast-and-learn
strategy.

18

KEEP CHALLENGING

Machine learning, cognitive computing and


other advanced analytics techniques will be
essential for improving both the quality of the
insights generated, and the speed with which

January 2016

they can be shared and acted on. Finding staff


with the appropriate skills in these areas may
require retraining or finding creative approaches,
such as crowdsourcing.

While the technical challenges are formidable,


organizational and cultural issues are equally
important. Real-time edge analytics involve
activities that occur closest to the business and
the customer, whether that is at an oil wellhead,
retail store or customer smartphone. Successful
companies will effectively use the real-world
experience of savvy front-line staff to decipher
clues that emerge from sophisticated machine
learning environments.

To

be sure just-in-time insights dont sit on


the shelf, share them not only with headquarters, but also with customer-facing employees
and decentralize authority to empower front-line
decisions. For example, a local restaurant or
store manager might be given more freedom to
change hiring practices or prices or take other
remedial action, based on their knowledge of the
local market.

SECTION 5:

Software-Defined Everything/
Automation Everywhere
Enterprise Control through Code
Todays Reality
Two related trends virtualization and automation are changing the face of
everything from network security to insurance underwriting.
Virtualization (the abstraction of software from hardware) is rapidly spreading
from servers and storage to other devices and services. Everything can be defined
as software, from enterprise networks (and underlying systems), to business and
IT functions such as security, in the form of abstraction layers and code that can
be easily deployed on-premise or in the cloud. eBays online auction service, for
example, has made infrastructure a competitive differentiator through the creation
of a software-defined data center that automates not only infrastructure but also
load balancing, object storage, databases as-a-service, configuration management
and application management.
At the same time, businesses are better able to cut costs and cycle times by
automating processes, thanks to increasing computing power, the ability to perform
faster and more predictive analytics and the development of new tools to model
and describe processes, from claims processing, to invoice entry, to x-ray analysis.
An example is drones that scan inventory in warehouses and, if Amazon has its way,
deliver packages to consumers.
Within IT, more and more tasks (from application testing to infrastructure
deployment) are performed reliably and inexpensively by rules-based scripts,
providing the IT infrastructure that produces the
insights on which the business relies.
Automation enabled by mobile devices provides
consumers with a virtual control panel to function
in an increasingly automated world, allowing them
to control everything from thermostats to security
systems through mobile applications. Robotic
vacuum cleaners and pets are already available for
the home, with automated care-givers not too far
behind.16

The common thread in this


drive toward automation
is the ability to use code,
rather than human interaction,
to perform critical everyday
functions.

The common thread in this drive toward automation


is the ability to use code, rather than human interaction, to perform critical everyday functions. While cost reduction is the short-term
business driver, the long-term payoff lies in greater agility and the ability to costeffectively experiment by developing new products, services and business models.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

19

Tomorrows Possibilities
Automation, currently confined to provisioning and management of the IT infrastructure, will next expand to IT processes.
For example, developers working in multiple locations today must alert each other
when they commit code to a repository. It can then take days to compile the source
code and create a build that can be tested before it is deployed. A fully automated
process would algorithmically create new builds, test them and then return them to
developers with a list of defects or enhancements for the next build. These levels of
continuous integration and deployment are needed to deliver market-facing applications quickly enough to define and dominate new markets.
Moving beyond IT into business process automation will take longer and require
improved skills in business process modeling to accurately replicate manual
processes in software.
A further step is automating interactive repetitive services, such as answering
questions from customers and conducting routine transactions. Early versions of
this capability can be seen in the automated wealth management and robo-advisors
at some of our clients in the financial services industry. If this could be extended
to service processes in every company providing
automated, intelligent answers to customers the
benefits of lower prices and higher quality would be
immense.

Moving beyond IT into business


process automation will take
longer and require improved skills
in business process modeling
to accurately replicate manual
processes in software.

For example, within a month of deploying an


autonomic platform, a U.S. investment bank with
which we work was able to resolve 80% of failed
trades without human involvement. It reduced
average resolution and fix time from 47 minutes to
four minutes while reducing staff costs 35%.

Another frontier is marketing automation, which


analyzes customer behavior over various channels
and automatically provides the next best offer (whether content or a product
or service promotion). The logical next step would be combining the automated
services with marketing, and automating processes such as price negotiations,
buying and reordering.

Over time, the increased use of machine learning (the use of algorithms that can
learn from experience) and predictive analytics will allow these robots to take
on more and more complex tasks. For instance, many news aggregation websites
use automatic authoring tools to deliver customized news updates to readers,
while programmatic direct ad buying provides advertisers a guaranteed number of
impressions from consumers on publisher sites.

20

KEEP CHALLENGING

January 2016

Automation enabled by hardware virtualization allows administrators to reconfigure networks and change security or service policies with a mouse click rather than
visiting a server rack. It reduces management costs and errors while improving
security through automated, error-free configuration and policy-based, real-time
responses to threats.

Autonomics Drives Efficiency and Flexibility


COST REDUCTION

SERVICE LEVEL
ENHANCEMENT

Reduction of operational support


costs on average by 30% to 35%.
IT avoidance of unnecessary
automation software licensing costs.

Dramatic enhancement of service


level and improvement in SLAs with
reductions in cycle times.

IMPROVED PREDICTABILITY
& AVAILABILITY

Significant improvement in application


service availability. Significant
improvement (approximately 60%)
in mean time to resolution (MTTR).

SERVICES
SCALABILITY

Unlimited scaling of virtual engineers for


automating repetitive and mundane taks;
freeing expensive and critical resources
for innovative and people-focused work.

FLEXIBILITY

Interoperability with current


support infrastructure and
investments.

Source: Autonomics: Mastering Self-Learning and Self-Healing, Cognizant Technology Solutions, March 2014.

Figure 7

Just as in application development, automated straight-through processing can


also deliver lower costs, shorter time to market and improved customer service for
business processes (see Figure 7). (Read more in Section 1 on the insights-driven
enterprise, page 6.) Imagine, for example, the integration of multiple automated
activities that enable customers to select a vehicle, choose financing and insurance,
and complete the purchase through a single user interface. Analysis of consumer
choices could be used to continually refine the interface, as well as the associated
products and services that can be cross-sold or up-sold to different customer
segments.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

21

Quick Take
Advice for Software-Defined Everything/Automation Everywhere
Automate

IT infrastructure provisioning
and management first, as it is typically the
most mature organizational area, delivers
the greatest short-term cost savings and is
essential to driving business agility.

each application does not need its own instance


of an operating system.

To

automate business processes, take


advantage of emerging tools, such as the
S-BPM (subject-oriented business process
management) modeling language that allows
users to describe processes in a way that is
understandable to both people and computing
systems. Focus first on processes that dont
change too often.

Automate specific steps such as the creation

of user interfaces or testing, as well as


code hand-offs from requirements through
deployment. A good starting point is automating
the creation of regression test cases, along with
continuous integration and build. Getting to
full seamless automation requires overcoming
concerns (such as security) about sending test
data and code to the cloud.

Automation can also be aided by the use of


containers, which create secure sandboxes
for multiple applications sharing a common
operating system. This significantly reduces
the amount of CPU and RAM required because

Digitize all the relevant data as early in the


process as possible and present it in a single
user interface. Doing so minimizes the delays,
errors and costs of manual re-input.
Focus on the low-hanging fruit those
processes in which productivity is so low or
volume is so high that even modest reductions
in effort yield significant results.

Automate IT infrastructure provisioning and management


first, as it is typically the most mature organizational
area, delivers the greatest short-term cost savings and is
essential to driving business agility.

Automation also requires


balancing the benefits of lower
costs and greater speed against
the loss of human control over
business-critical infrastructure
and services.

Organizations must carefully assess whether


these software-defined capabilities will scale and
perform as promised, and sometimes wait for robust
management and security capabilities. Automation
also requires balancing the benefits of lower costs
and greater speed against the loss of human control
over business-critical infrastructure and services.
Organizations may also struggle with how to costeffectively and securely extend automation across
on-premise and cloud environments. Staff who built
their careers on manual configuration and finetuning of infrastructure might lack the willingness or
the ability to switch to a more automated, programmatic approach. This could require new skills or new staff, replacing single-platform
experts with those who have the big-picture view, as well as the skills to implement
best practices as scripts and algorithms.

22

KEEP CHALLENGING

January 2016

SECTION 6:

API-Driven Ecosystems
Delivering the Network Effect for Enterprises
Todays Reality
As software eats the world,17 APIs are becoming
a core corporate resource, as they allow applications to communicate with other systems.
The power of APIs lies in their speed and ease of
use, compared with the brittle system-to-system
interfaces that businesses have historically used to
connect applications to each other or to back-end
systems.

The platform economy spans


organizational boundaries, fueling
innovation from internal business
groups and trusted partners.

On a tactical level, businesses tap APIs from business partners and vendors to
enable rapid, easily maintained connectivity among an ever-changing mix of data,
services and devices (see Figure 8). They also publish their own APIs to create
interoperable ecosystems with customers, and to enable business partners and
other third-parties to connect with their systems and applications. A leading
discount drug retailer, for example, uses APIs to allow users of third-party mobile
applications to print photos directly from their smartphones at their local store.
This not only drives revenue from photo printing services but also draws customers
into stores for possible additional purchases.18
On a more strategic level, easy-to-use APIs can turn a
business into a platform from which it as well as thirdparty developers can generate revenue (see Figure 9,
next page). The platform economy spans organizational
boundaries, fueling innovation from internal business
groups and trusted partners. APIs from Salesforce.com,
for example, allow third-party developers to write applications that increase the value of its namesake customer
relationship management system. Googles APIs allow
developers to tap into Google services such as its maps,
resulting in the funneling of users and ad revenue to
Google. APIs generate nearly half of the annual $3 billion
in income at Salesforce.com, and close to 90% for the
Expedia travel website.19

The Art and Science of APIs


Partner Apps

Application
Programming
Interface

Companys App

Users benefit from


a robust, streamlined
experience.

Tomorrows Possibilities
The importance of APIs increases with the sale of
every smartphone, wearable fitness tracker and smart
appliance or industrial device. Each of these devices
instantly generates data about its status, communicating its owners wants, needs and behavior. The metadata
generated enables organizations, or their partners, to
derive and apply insights (see Section 1 on the insightsdriven enterprise, page 6). This may be as straightforward
as offering homeowners insurance to an auto insurance
policy holder who just changed addresses, or as complex

Figure 8

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

23

APIs by the Numbers


In a survey of 300 IT decision-makers:

OVER

%
50
of whom

75%

said their
company has
an API strategy

API

said they are


generating revenue
via an API or will
within a year.

50%
OF MEDIA/
TELECOM
COMPANIES

33%
OF FINANCIAL
SERVICES
ORGANIZATIONS

are deriving revenue from


APIs, making over $10 million
through the channel.

70%

of organizations are
integrating about 20 apps.
OF THOSE MAKING
$10 BILLION OR
MORE IN REVENUE:

50%

are integrating
100 or more apps.

Source: Mulesoft 2015 Connectivity Benchmark Report, Mulesoft, May 2015.

Figure 9

as tweaking the fuel flow in a jet engine running too hot for peak efficiency. APIs
can deliver anything from the seemingly simple Log in with Facebook button that
makes it easier for new customers to register at your site, to more complex services,
such as receiving a real-time video security feed from home.
Almost any business with data or expertise (including business rules embedded
within legacy applications) must master the disciplines required to develop, secure,
share, use and monetize APIs. They will become even more essential and strategic
tools in organizations push for market share and revenue as the number and
variety of applications, devices and data types grow.
APIs also ease the move to micro-services architectures by replacing monolithic Web
applications with services that can be deployed and changed as needed. They slash
the time required to integrate organizational systems with those from a business
service provider to drive joint revenue. An example is the applications interoperability that allows United Airlines passengers to book a ride with Uber from within
Uniteds mobile app.20

24

KEEP CHALLENGING

January 2016

APIs also make it relatively easy to enhance


an application, such as adding support for
a new mobile payments platform or a new
trading partner, because each micro-service
is operationally encapsulated. Developers
seeking to make use of the service only need
to understand the API, not the inner workings
of the application or service to which they are
connecting. This agility is enhanced when the
use of APIs is leveraged by DevOps, which
combines development and operations to
speed app deployment.

Developers seeking to make


use of the service only need
to understand the API, not
the inner workings of the
application or service to which
they are connecting.

API-driven ecosystems also allow enterprises to sell selected internal systems


or data as profit-making products. One leading bank worked with us to offer an
internal training platform to its partner banks, turning what was an internal cost
center into a revenue source. Other financial services firms with which we work
offer APIs that make it easier for new applications such as mobile payment systems
to work with their legacy platforms. This prevents the loss of revenue and market
share from customers defecting to newer direct banks, or allows existing banks
to sell back-end processing services to such new entrants.
We assisted a U.S.-based bank holding company to develop a micro-services architecture that allows outside developers to create mobile applications that help
customers apply for auto and home loans. Our work began with a functional analysis
of 150 existing loan-related services that suffered from a lack of governance,
support and evaluation of the business requirements for the mobile applications.
Based on this, we published and documented a set of core services through APIs,
and defined an orchestration layer to handle specific channels such as Web and
embedded software for devices on the IoT. We also developed requirements and
implemented DevOps to build, deploy, configure and monitor the services.
The failure to deliver secure, easy-to-use APIs (or choose the right APIs from a
partner) can isolate systems and data from customers and partners, depriving organizations of potential revenue and market share. Businesses should also consider
the costs of delivering, maintaining and managing APIs, realizing that every microservice requires ongoing support and enhancement.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

25

Quick Take
Advice for API-Driven Ecosystems

Build APIs with the end customer and the


data to be transferred in mind, which includes
thorough documentation and ease of use. A
retailer that sells product sales data through
an API, for example, should include granular
access controls over which manufacturers can
see what data and for how long, while ensuring
that competitors cannot see each others information, and that the data access does not slow
the retailers own systems.

To avoid the creation of too many expensive

services, we recommend designing them to


support specific business capabilities, such as
price look-up or inventory check, rather than
technical functions, such as data access. Design
each service to be as small as possible while
still delivering its required function. Service
creation and deployment can be aided by
useful open source tools, as well as emerging
integration platform as-a-service offerings.

To avoid the creation of too many expensive


services, we recommend designing them to
support specific business capabilities, such as
price look-up or inventory check, rather than
technical functions, such as data access.
The use of pre-fetching or caching can help A
improve performance on the recipients end.

Consider platforms that help companies


develop, secure, share, monitor and monetize
their APIs, such as Apigee and Mashery.

The use of the 12-Factor App methodology

21

can help enforce best practices. Examples


include explicitly declaring dependencies. (i.e.,
the databases or other systems on which an
application relies so they can be accessed when
needed) and keeping the development environment as close to the production environment
as possible to reduce the risk of code failing
when put into production.

26

KEEP CHALLENGING

January 2016

successful API-powered micro-services


strategy requires DevOps, continuous integration, testing, logging and tracing, monitoring,
messaging, service registration and discovery.
Service design reviews help avoid duplicate
services, while service structure reviews ensure
that services follow approved designs. Use of
JSON22 or a similar language makes it easier for
other developers to understand and work with
the services offered by the business.

SECTION 7:

Digital Sourcing
For Your Next App or Next Employee,
Look to the Cloud
Todays Reality
Between the rise of global services and open source software, enterprise sourcing
models have changed more in the last decade than in all of the previous decades of
the information age.
However, those changes pale beside the shifts that businesses
will make to meet tomorrows demands for low-cost, highquality and agile delivery to accommodate, if not exceed, the
needs of digital business. Fewer organizations can afford the
massive internal IT staffs or proprietary hardware that sits on
the balance sheet whether theyre used or not. Nor can they
watch competitors grab market share while HR seeks specialized skills with the latest data query language or IT deploys
the servers needed to deliver responses to real-time queries.

Cloud, the New Normal


In a recent survey of 930 IT professionals,

93% are using the cloud.


The public cloud makes up 88% of users, and
63% of users employ the private cloud, while
over half use both.

On the skills front, new cloud and Web-based sourcing


provides IT with high levels of flexibility and efficiency with
the additional benefit that customer and provider need not be
in the same town, time zone or even continent. Many of these
collaborators inside and outside the organizational firewall will
leverage open source software for everything from research
and development applications to software testing. Increasingly,
talent will come and go on an as-needed basis, in what has
increasingly been termed the gig economy.23
On the technology front, everything from open source development platforms and applications to security will be available as
a service from the cloud (see Figure 10). This will save massive
investments in in-house data centers, but decimate sales and
margins at legacy vendors. As a result, the shift is already
on to small, innovative software vendors, many of which sell
products based on lower-cost (and often more feature-rich)
open source software (OSS) that customers can tweak to meet
their needs (see Figure 11, next page).

Source: 2015 State of the Cloud Survey, Rightscale,


Feb. 18, 2015.

Amid these changes, enterprises must balance the drive for


Figure 10
efficiency and agility with their need for security and reliability. Legacy systems that would be too difficult, expensive or
sensitive to move to the cloud must co-exist with cloud-based services. To help

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

27

Open Source Takes Off


In the next 2-3 years, corporate participation
in open source solutions will increase.

47%

39%

will release
internal tools
and projects as
open source

plan to start
own external
OSS project

53%

expect to
reduce barriers
to employee
participation in
OSS
Source: 2015: The Future of Open Source, Blackduck Software, April 15, 2015.

Figure 11
manage this mix, many IT organizations are struggling to become honest brokers
of internal and external services, expert at assessing their own capabilities and proactively looking outside for faster, less expensive or more effective solutions.

Tomorrows Possibilities
With growing levels of education and broadband penetration, the global pool of
independent, highly skilled workers will grow rapidly. According to McKinsey & Co.,
up to 540 million people worldwide could benefit from online talent platforms by
2025, boosting global GDP by $2.7 trillion.24 Advances in analytics and machine
learning will provide businesses with increasingly rich real-time insights into the
skills and qualifications of this talent pool. Declining costs for cloud-based services
(Amazon Web services cut its price 8% from Oct. 2013 to Dec. 2014, while Google
and Microsoft dropped prices 5% to 6%25) and new business models such as crowdfunding26 will help collapse barriers to entry for new competitors.
Organizations should look for:

The provision of more IT and business services over the cloud, with increased

automation through software-defined services and improvements in machine


learning and predictive analytics (see Section 5 on the software-defined
everything/automation everywhere, page 19).

28

KEEP CHALLENGING

January 2016

Many IT organizations are struggling to become honest


brokers of internal and external services, expert at
assessing their own capabilities and proactively looking
outside for faster, less expensive or more effective
solutions.
The spread of open-source software, forcing reliance on a distributed volunteer
global support system that is not accountable through traditional contracts.

The explosion of shadow IT as business units bypass central IT to meet urgent

needs. This will drive adoption of software-defined infrastructures and pervasive


security that is flexible enough to manage and protect decentralized infrastructures.

Tapping global talent reduces costs and improves quality. Walmarts use of the
Kaggle crowdsourced platform to analyze pricing strategies led not only to useful
insights but also the hiring of specialists that the retailer might otherwise have
overlooked.27 We used our Crowd-on-Cloud crowdsourcing solution to field-test
a mobile financial education application for global financial services giant UBS.
Seasoned staff in different locations tested the
application on a variety of devices for performance,
functionality, security, content and user interface
parameters. This helped boost the applications
performance while speeding turnaround and
reducing costs.28
Skilled local workers can help organizations
tailor their products, marketing and business
practices to a new market, and quickly ramp staff
up or down without committing to full-time staff.
Crowdsourcing is also an opportunity to apprentice
or audition staff before hiring them.

CIOs that can change their skill


sets and mindsets can gain
influence by becoming trusted
brokers that monitor the
market for needed technologies
and skills, and help manage the
risks and benefits of working
with new providers.

The smaller data center footprints found in this new


model do not have to mean reduced clout for IT.
CIOs that can change their skill sets and mindsets
can gain influence by becoming trusted brokers
that monitor the market for needed technologies and skills, and help manage the
risks and benefits of working with new providers. By protecting core data and
systems while meeting rising needs for data and services, they also can become
trusted guardians of the enterprises core assets.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

29

Quick Take
Advice for Digital Sourcing
Technologies

such as semantic search and


machine learning can help find and rank
workers, while new collaboration tools will make
it easier for them to share their work, be evaluated and get paid. Technology vendors such
as Textkernel offer software that provides
multi-lingual parsing of resumes and semantic
search that understands when employers and
job seekers use different terms or phrases to
describe the same assignment or skill. Wazokus
Idea Spotlight allows
users to capture, evaluate,
prioritize and select ideas,
and provides analytics to
track activity on crowdsourced projects.29

A loosely-coupled
architecture, in
which applications
and services are
not tied to specific
hardware, makes
it easier to switch
suppliers of either IT
or business process
services

Organizations
must
understand local labor
laws and how they
affect how this distributed workforce is paid,
the benefits they receive,
and who owns the code
and other intellectual
property they generate.

30

KEEP CHALLENGING

Business and IT leaders should work


together to understand the specific levels of
skill and experience required, in which specific
areas, for each potentially crowdsourced task.
This will make it easier to create rules for the
predictive analytics required to accurately
rank potential collaborators.
Using cloud services across the enterprise
reduces capital and operating costs for the
distributed workforce by allowing the provisioning of virtual devices as needed, as well
as automating their management. The use
of API-enabled systems, such as identity and

January 2016

As

IT struggles to weigh the security and


reliability risks of purchasing from smaller,
lesser-known vendors against the cost and
agility benefits, effective due diligence will
become more important than ever. Businesses
should work closely with their organizations
legal department to understand the licensing
and intellectual property issues around open
source software, and how use of the cloud
could be affected by the latest rulings and
regulations around data privacy (particularly
in regions such as the European Union, where
privacy regulations are particularly restrictive).

The gig economy is an opportunity to work

more closely with business heads, legal and


project management offices to minimize the
risk of working with new providers. This might
include terms, conditions and contracts for
trial runs that allow businesses to end the relationship without loss once short-term goals are
attained, or if the vendor cant deliver.

Creative organizations
should tap the power
of social platforms to
allow peers to rank each
others skills, much as
renters (and guests) rate
each other on Airbnb. The tools to automatically, and accurately, assess and verify such
skills are not yet widely available, but this is
an area IT organizations should monitor.

access management, can ease the use of distributed systems through single sign-on, as well
as enabling logging and analytics. A looselycoupled architecture, in which applications
and services are not tied to specific hardware,
makes it easier to switch suppliers of either
IT or business process services (see Section
5 on software-defined everything/automation
everywhere, page 19).

Organizations should assign an individual


or group to monitor sources of alternative
technology, such as crowdfunding sites and
universities. Furthermore, decision-makers
should seek out the most innovative individuals
or groups within their organizations to discover
best practices and sources of technology.

Internal crowdfunding programs should be


considered that allow employees to vote
(with company dollars) for the projects they
believe would deliver the most business value.

These new staffing models can fail if IT cannot properly evaluate and verify the
identities, skills and experience of contributors, or find the required gig economy
skills. Lapses in these areas can cause waste, delay and even security risks.
Businesses must educate just-in-time staff on their priorities, cultures and goals,
and battle reluctance to trust unknown outsiders with corporate data or code. This
is where a micro-services architecture can help by providing standalone test environments that do not expose core systems to vulnerabilities, while pervasive and
self-protecting assets defend against attacks that penetrate the corporate core.
(Learn more in Section 3 on pervasive security, page 12.)
On the infrastructure front, use of the cloud especially combined with traditional
on-premise IT may trigger complex licensing, access management, data privacy
and security issues. Some legacy systems will be too difficult or expensive to move
to the cloud, requiring costly integration or the movement of large amounts of data
to and from the cloud. Local privacy and security regulations may make it impossible
or cost-prohibitive to move some operations or data among cloud providers.

Footnotes
1

Code Halo thinking describes the art and science of distilling and applying
meaning from the digital code that surrounds people, process, organizations and
devices, or things. To learn more, read Code Rules: A Playbook for Managing at
the Crossroads, Cognizant Technology Solutions, June 2013, http://www.cognizant.
com/Futureofwork/Documents/code-rules.pdf, and the book, Code Halos: How
the Digital Lives of People, Things, and Organizations are Changing the Rules of
Business, by Malcolm Frank, Paul Roehrig and Ben Pring, published by John Wiley &
Sons. April 2014, http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118862074.
html.

Greg Bensinger, Amazon Wants to Ship Your Package Before You Buy It, Wall
Street Journal, Jan. 17, 2014, http://blogs.wsj.com/digits/2014/01/17/amazonwants-to-ship-your-package-before-you-buy-it/.

Laurie Sullivan, Disney Finds Emotion Next Targeting Metric For Advertising,
Marketing, MediaPost, Oct. 2015, http://www.mediapost.com/publications/
article/259739/disney-finds-emotion-next-targeting-metric-for-adv.html.

Stream processing allows some applications to exploit a limited form of parallel


processing. Source: https://en.wikipedia.org/wiki/Stream_processing.

Kashmir Hill, How Target Figured Out A Teen Girl Was Pregnant Before Her Father
Did, Forbes, Feb. 6, 2012, http://www.forbes.com/sites/kashmirhill/2012/02/16/
how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/.

Normal website, https://nrml.com/.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

31

32

KEEP CHALLENGING

January 2016

Tata Docomo: Hyperpersonalization Direct Marketing by Interface Business


Solutions, Coloribus, Jan. 2013, http://www.coloribus.com/adsarchive/directmarketing/tata-docomo-hyperpersonalization-18372455/.

Melissa Dahl, The Future of Dieting Is Personalized Algorithms Based on Your


Gut Bacteria, New York Magazine, Oct. 2, 2015, http://nymag.com/scienceofus/2015/10/future-of-dieting-is-personalized-algorithms.html.

Chris Morris, More than 20,000 Kids Just Got Hacked, Fortune, Nov. 30, 2015,
http://fortune.com/2015/11/30/vtech-hacking-children-data/; Whitney Meers, Hello
Barbie, Goodbye Privacy? Hacker Raises Security Concerns, Huffington Post, Nov.
30, 2015, http://www.huffingtonpost.com/entry/hello-barbie-security-concerns_565
c4921e4b072e9d1c24d22.

10

Gartner Says 4.9 Billion Connected Things Will Be in Use in 2015, Gartner press
release, Nov. 11, 2014, http://www.gartner.com/newsroom/id/2905717.

11

Andy Greenberg, Hackers Remotely Kill a Jeep on the HighwayWith Me in It,


Wired Magazine, July 21, 2015, http://www.wired.com/2015/07/hackers-remotelykill-jeep-highway/.

12

Kim Zetter, Hacker Can Send Fatal Dose to Hospital Drug Pump, Wired Magazine,
June, 2015, http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/.

13

DevOps is an approach to software development that is focused on streamlined


communication, collaboration, integration and automation (of testing as well as
coding), as well as measurement of cooperation between software developers and
other IT functions. The term was popularized through a series of DevOps Days
starting in 2009 in Belgium. Since then, DevOps Days conferences have been
held in many countries worldwide. Source: https://en.wikipedia.org/wiki/DevOps.
For more on DevOps, read our white papers How DevOps Drives Real-Time
Business Growth, http://www.cognizant.ch/InsightsWhitepapers/How-DevOpsDrives-Real-Time-Business-Growth.pdf, and DevOps Best Practices: Combine
Coding with Collaboration, http://www.cognizant.ch/InsightsWhitepapers/
DevOps-Best-Practices-Combine-Coding-with-Collaboration_nn.pdf.

14

Amanda Kooser, Smart Shoes Vibrate You in the Right Direction, CNet, July
29, 2014, http://www.cnet.com/news/bluetooth-smart-shoes-vibrate-you-in-theright-direction/.

15

To learn about extinction events caused by the inability by companies to


compete on code, read Code Halos: How the Digital Lives of People, Things,
and Organizations are Changing the Rules of Business, by Malcolm Frank, Paul
Roehrig and Ben Pring, published by John Wiley & Sons, April 2014, http://www.
wiley.com/WileyCDA/WileyTitle/productCd-1118862074.html.

16

Timothy Torres, Are You Satisfied With Your Care? New Gentle Caregiver Robot
from Japan Enters Experimental Stage, Tech Times, March 2015, http://www.
techtimes.com/articles/36950/20150303/satisfied-care-caregiver-robots-japan.
htm.

17

An expression coined by Netscape inventor and venture capitalist Marc


Andreessen to explain how software pervades todays products and services.
Source:
http://forwardthinking.pcmag.com/none/300368-marc-andreessenexplains-why-software-is-eating-the-world.

18

Walgreens: Putting an API around their Stores, Apigee, http://apigee.com/


about/customer-story/walgreens-putting-api-around-their-stores.

19

Pratap Ranade, Devin Scannell, Brian Stafford, Ready for APIs? Three Steps
to Unlock the Data Economys Most Promising Channel, Forbes, Jan. 7, 2014,
http://www.forbes.com/sites/mckinsey/2014/01/07/ready-for-apis-three-stepsto-unlock-the-data-economys-most-promising-channel/.

20

Dennis Schaal, Uber Secures a Top Spot in Uniteds Mobile Apps in Business
Travel Push, SKift, Aug. 20, 2014, http://skift.com/2014/08/20/uber-secures-aspot-in-uniteds-mobile-apps-in-business-travel-push/.

21

The Twelve Factor App website, http://12factor.net/.

22

JavaScript Object Notation is an open standard format that uses human-readable text to transmit data objects consisting of attributevalue pairs. Source:
https://en.wikipedia.org/wiki/JSON.

23

Arun Sundararajan, The Gig Economy Is Coming. What Will It Mean for Work?
The Guardian, July 25, 2015, http://www.theguardian.com/commentisfree/2015/
jul/26/will-we-get-by-gig-economy.

24

Connecting Talent with Opportunity in the Digital Age, McKinsey Global


Institute, June 2015, http://www.mckinsey.com/insights/employment_and_
growth/connecting_talent_with_opportunity_in_the_digital_age.

25

Cloud Computing Price War, Only the Beginning, Cloud Tweaks, January 2015,
http://cloudtweaks.com/2015/01/cloud-computing-price-war-beginning/.

26

2015CF: The Crowdfunding Industry Report, Crowdsourcing.org, April 7, 2015,


http://www.crowdsourcing.org/editorial/global-crowdfunding-market-to-reach344b-in-2015-predicts-massolutions-2015cf-industry-report/45376.

27

Walmart: The Big Data Skills Crisis and Recruiting Analytics Talent, Forbes, July
6, 2015, http://www.forbes.com/sites/bernardmarr/2015/07/06/walmart-the-bigdata-skills-crisis-and-recruiting-analytics-talent/#2715e4857a0b153185cd247d.

28

Cognizant 2014 Annual Report, Cognizant Technology Solutions, 2014, http://


www.cognizant.com/SiteDocuments/Cognizant_Annual_Report_2014L.pdf.

29

More information on Textkernel and Wazoku can be found at http://www.


textkernel.com/ and http://www.wazoku.com/.

Credits
This white paper was researched and written by the Cognizant Global Technology Office (GTO).
Providing key technology trend insights and analyses were Joseph Tobolski, GTO Vice-President and
U.S. Chief Technology Officer, as well as Gerhard Koch, Prabhakaran Sabhapathy, Uma Ramachandran,
M. Murali and Mahesh Balaji, who function as business unit CTOs and play key roles within the
Cognizant Technology Labs organization.

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

33

34

KEEP CHALLENGING

January 2016

RIDING THE SEVEN WAVES OF CHANGE THAT WILL POWER, OR CRUSH, YOUR DIGITAL BUSINESS

35

About Cognizant Technology Labs


Cognizant Technology Labs is Cognizants specialist technology
group that researches, pilots and prototypes emerging technologies with the highest potential for sparking transformative
business innovations. Our eight Research and Acceleration
Centers focus on extending our footprint in specific areas
where we believe technology trends are headed. We develop
solutions that bring real value to our clients businesses, and
help them own and embrace emerging technologies in ways
that make sense for their organizations. We also draw on our
existing building blocks and emerging technology expertise to
accelerate development of new applications, bringing tangible
and immediate benefits to our clients.

About Cognizant
Cognizant (NASDAQ: CTSH) is a leading provider of information
technology, consulting, and business process outsourcing services, dedicated to helping the worlds leading companies build
stronger businesses. Headquartered in Teaneck, New Jersey
(U.S.), Cognizant combines a passion for client satisfaction,
technology innovation, deep industry and business process
expertise, and a global, collaborative workforce that embodies
the future of work. With over 100 development and delivery
centers worldwide and approximately 219,300 employees as of
September 30, 2015, Cognizant is a member of the NASDAQ-100,
the S&P 500, the Forbes Global 2000, and the Fortune 500 and
is ranked among the top performing and fastest growing companies in the world. Visit us online at www.cognizant.com or
follow us on Twitter: Cognizant.

World Headquarters
500 Frank W. Burr Blvd.
Teaneck, NJ 07666 USA
Phone: +1 201 801 0233
Fax: +1 201 801 0243
Toll Free: +1 888 937 3277
inquiry@cognizant.com

European Headquarters
1 Kingdom Street
Paddington Central
London W2 6BD
Phone: +44 (0) 207 297 7600
Fax: +44 (0) 207 121 0102
infouk@cognizant.com

India Operations Headquarters


#5/535, Old Mahabalipuram Road
Okkiyam Pettai, Thoraipakkam
Chennai, 600 096 India
Phone: +91 (0) 44 4209 6000
Fax: +91 (0) 44 4209 6060
inquiryindia@cognizant.com

Copyright 2016, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means,
electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is subject to
change without notice. All other trademarks mentioned herein are the property of their respective owners.
TL Codex 1320

S-ar putea să vă placă și