tech trends 2015: the fusion of business and it

28
www.deloitte.com/us/techtrends2015

Upload: deloitte-united-states

Post on 14-Jul-2015

22.153 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Tech Trends 2015: The fusion of business and IT

www.deloitte.com/us/techtrends2015

Page 2: Tech Trends 2015: The fusion of business and IT

Bridging business and technology, new CxO roles, and the

possibilities of tomorrow with the realities of today.

Page 3: Tech Trends 2015: The fusion of business and IT

3 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

Intel

• The role of the CIO is evolving as technology transforms existing business models and gives rise to new ones

• Who better than the CIO to take advantage of shifting technologies and harness them for the business?

• New CxO roles—Chief Digital Officer, Chief Innovation Officer, Chief Data Officer—are cropping up with technology at their core

• CIOs acting as chief integration officers can serve as the glue linking various initiatives together

AIG

Brown-Forman

Page 4: Tech Trends 2015: The fusion of business and IT

4 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

Evaluate current positioning: understanding the balance sheet of IT is a requirement

Mind the store: invest in underlying capabilities to improve departmental efficacy

Engage leadership: Solicit feedback and understand priorities

Knock down walls: tap into ideas through new employee and partnership channels

Show, don’t tell: prototype and demo to make art of the possible become feasible

Industrialize innovation: standardize approach for new technology

As security breaches become more frequent, senior stakeholders expect that their organizations will be kept safe and secure. CIOs can create strong linkages between IT and other functions by emphasizing cyber risk and privacy, embedding cyber defense as a discipline. IT departments are in a position to orchestrate awareness of and responses to cyber threats.

WHERE DO YOU START?

CYBER IMPLICATIONS

Page 5: Tech Trends 2015: The fusion of business and IT

Integration as a discipline, exposing core assets for reuse, growth, and

innovation.

Page 6: Tech Trends 2015: The fusion of business and IT

6 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

Web 2.0

• Application programming interfaces (APIs) are evolving from a development technique to a business model driver and boardroom consideration

• The API revolution is upon us, more than 10,000 have been published to-date1

• Core assets can be reused, shared, and monetized through APIs—creating a growing need for management platforms and experts

• The opportunity exists to provoke and harvest how business services and underlying APIs can reshape how organizations compete

Netflix

Federal Data Services Hub

1ProgrammableWeb, http://www. programmableweb.com/category/ all/apis?order=field_popularity

Page 7: Tech Trends 2015: The fusion of business and IT

7 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

Clarify strategy: clearly define the intention, value, and audience of the API

Establish ownership: placing effort under an IT executive can simplify the path forward

Embrace the necessities: evaluate the available tools, platforms, and integration possibilities

WHERE DO YOU START?

Plan big, start small:businesses should balance payoff with added complexity

See it through: drive a sustained campaign for awareness and support, while keeping ongoing documentation and maintenance needs in mind

Cyber risk considerations should be at the heart of API strategies. An API built with security in mind can be a more solid cornerstone of every application it enables; done poorly, it can multiply application risks. New controls and tools are likely necessary to protect unbounded potential use cases while providing end-to-end effectiveness.

CYBER IMPLICATIONS

Page 8: Tech Trends 2015: The fusion of business and IT

Harnessing the real potential of the Internet of Things.

Page 9: Tech Trends 2015: The fusion of business and IT

9 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

ComEd

• IoT is becoming a reality with connectivity and intelligence increasingly embedded in assets across the value chain

• But putting the estimated 11 billion sensors1 to work is the challenge, along with deciding which of the 1.5 trillion objects in the world2 should be connected and for what purpose

• The goal should not be the Internet of Everything; it should be the network of some things, deliberately chosen and purposely deployed

Nest Labs

Streetline

Bosch SI1 Karen A. Frenkel, “12 obstacles to the Internet of Things,” CIO Insight, July 30, 2014,http:// www.cioinsight.com/it-strategy/infrastructure/ slideshows/12-obstacles-to- the-internet-of-things.html, accessed November 12, 2014. 2 Cisco Systems, Inc., Embracing the Internet of Everything to capture your share of $14.4 trillion, February 12, 2013, http://www.cisco.com/ web/about/ac79/docs/innov/IoE_Economy. pdf, accessed November 12, 2014.

Page 10: Tech Trends 2015: The fusion of business and IT

10 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

Beware fragmentation: compelling use cases will require cross-organizational collaboration

Stay on target: avoid distractions from exciting new technologies by starting with concrete business outcome

User first: usability should guide implementation, even if the solution is automated

WHERE DO YOU START?

Network: don’t lose sight of the importance of connectivity, especially for items outside of established facilities

Stand by for standards: IoTstandards will continue to evolve, but don’t wait to invest until standards are finalized, help shape them

New security risks are embedded in each layer of IoT: sensors, networks, integrations, rules engines, people, and processes. IT leaders should be extra cautious when scenarios move from signal detection to actuation. Consider cyber logistics before placing new objects into the IT environment and take a broad approach to proactive risk management.

CYBER IMPLICATIONS

Page 11: Tech Trends 2015: The fusion of business and IT

Modern marketing brings new challenges in customer engagement,

connectivity, data, and insight.

Page 12: Tech Trends 2015: The fusion of business and IT

12 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

Insurance Industry

• A new vision for marketing is being formed as CMOs and CIOs invest in technology to reach digitally connected customers

• Four new dimensions are being added to original marketing mix: engagement, connectivity, data, and technology

• Technology and analytics can deliver convenient, contextual, and hyper-targeted customer experiences

• CIOs can help deliver analytics, mobile, social, and web while maintaining security, reliability, and interoperability

Rocket Fuel

Telstra

Page 13: Tech Trends 2015: The fusion of business and IT

13 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

Customer-led: understand the customer journey and focus on authentic engagement

Focus on data: big data and predictive analytics should play a role in how you invest in targets and priorities

Holistic approach: explore new channels and tools to complement existing ones

WHERE DO YOU START? Content management: authoring,

provisioning, and measuring usage and effectiveness should be seamless processes that provide users with contextual content across channels

Social activation: move beyond passive listening to inspiring brand ambassadors

There are privacy concerns, laws, policies, and standards for using personal data for marketing which may limit the degree to which marketers can use data for personalization and outreach. Establishing and maintaining trust is key. Organizations should consider public policies, privacy awareness programs, and end-user license agreements joined with explicit security and privacy controls.

CYBER IMPLICATIONS

Page 14: Tech Trends 2015: The fusion of business and IT

The entire operating environment—server, storage, and network—

can now be virtualized and automated.

Page 15: Tech Trends 2015: The fusion of business and IT

15 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

Cisco

• The entire operating environment can now be virtualized and automated, elevating infrastructure investments from costs to competitive differentiators

• Savings come from retirement of gear, shrinking of data center footprints, and lowering of recurring maintenance costs

• And it’s not just about the cloud; it’s about removing constraints and being a platform for growth

• First movers will likely benefit from greater efficiencies and eventually reshape how their companies work

AmerisourceBergen

eBay

Acxiom

Page 16: Tech Trends 2015: The fusion of business and IT

16 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

WHERE DO YOU START?

CYBER IMPLICATIONS

The software-defined stack will require new tools, but it can also help produce more streamlined, responsive IT capabilities where risk management becomes muscle memory. Standardization can minimize vulnerabilities and variances, and produce an accurate assessment of your risk profile.

Consider financing: some vendors may accommodate creative financing arrangements

Standardize design: emphasize templates and commonality to manage complexity

Facilitate teamwork: infrastructure and application teams should work in tandem for rapid deployment

Support migration: existing assets should be analyzed application by application to determine the technical considerations needed to support migration. The business needs should then be layered on.

Beyond the data center: companies may realize benefits by coupling SDDC initiatives with a broader IT transformation effort

Page 17: Tech Trends 2015: The fusion of business and IT

Replatforming, architecting, and revitalizing IT at the heart

of the business.

Page 18: Tech Trends 2015: The fusion of business and IT

18 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

Sysco

• Core system investment can be the foundation for growth and new service development

• 80% of time, energy and budgets are consumed by the care of existing IT capabilities1

• Many organizations are modernizing to pay down technical debt and remove barriers to performance

• One size does not fit all: replatform, remediate, revitalize, replace, or retrench

ElectronicsIndustry

The Bureau of Engraving and Printings

1Bob Evans, “Dear CIO: Is the time bomb in your IT budget about to explode?,” Forbes, January 22, 2013, http://www.forbes.com/ sites/oracle/2013/01/22/dear-cio-is-the-time-bomb-in-your-it-budget-about-to-explode/, accessed January 14, 2015.

Page 19: Tech Trends 2015: The fusion of business and IT

19 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

Have a plan: balance business needs with limitations of existing systems and potential of emerging technology

Spark a light: find a burning platform to move the conversation about the core to the center stage

Plant the seed: invest deliberately in the core to eventually become a catalyst for growth

WHERE DO YOU START?

CYBER IMPLICATIONS

Partner up: strategic vendors can be allies in exploring new solutions for existing issues

Design as a discipline:embrace a living approach to architecture with usability, integration, data, and security in mind

Identify what attracts cyber threat and be vigilant in protecting your assets. Scratch the assumption that the emerging technologies are inherently riskier than the legacy systems and, regardless of the platform, define probable and acceptable risks. Leverage vendors to outsource risk, but recognize that your organization still retains responsibility for its security.

Page 20: Tech Trends 2015: The fusion of business and IT

Augmenting and enhancing the individual with emerging

technologies—cognitive analytics,

visualizations, wearables, and beyond.

Page 21: Tech Trends 2015: The fusion of business and IT

21 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

• Artificial intelligence is now a reality, but the more promising application is not in replacing workers, but augmenting their capabilities

• True impact comes from putting insights to work and changing behavior at the point where decisions are made

• The human element remains critical to discovering new patterns and identifying the questions that should be asked

• Solutions should start from the user down, not from the data model and analytics up

University ofMinnesota

Los AngelesPoliceDepartment

Oil & GasIndustry

Page 22: Tech Trends 2015: The fusion of business and IT

22 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

Ask questions: develop wish list to guide priorities and reveal what data is needed

Be honest: balance opportunity against expected organizational resistance; it may take time to become a data-driven culture

WHERE DO YOU START?

Design from the user down: let user experience dictate the format, granularity and decisiveness of insights

Enhance the worker: be transparent in intent and consider programs to retool and redeploy workers

CYBER IMPLICATIONS

Traditional techniques to protect your data when it is at rest, in flight, and in use become less effective as the development of criminal products, services, and markets advances. Machine learning and predictive analytics can take cyber security a step further. Leading cyber initiatives balance reactionary methods with advanced techniques to identify the coming threat and proactively respond.

Page 23: Tech Trends 2015: The fusion of business and IT

STEAM, not just STEM—fine arts alongside deep technical talent.

Page 24: Tech Trends 2015: The fusion of business and IT

24 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

LESSONS FROMTHE FRONT LINES

AIG

• Scarcity of technical talent is a concern across many industries as the legacy-skilled workforce retires and new technologies emerge

• Companies likely need to cultivate workers with new habits, incentives, and skills; hands-on capabilities may trump credentials

• Nature of employment changing: alternative models include virtual work arrangements, crowdsourcing, contract work

• Support knowledge sharing by cross-pollinating teams with a mix of new and experienced, cross-functional, diverse workers

GSA

Deloitte

Page 25: Tech Trends 2015: The fusion of business and IT

25 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

WHERE DO YOU START?

Balance the need for security with a focus on user experience by creating a well-integrated risk framework that is anchored around the end user’s journey. Teach your workers how to manage risk, and embed cyber security into all aspects of your organization—software delivery, system maintenance and business process execution.

CYBER IMPLICATIONS

Incentivize IT leaders: activate communities around them

Rethink hiring: include externships, hackathons, and recruit those with design aptitude

Industrialize innovation: introduce mechanisms to submit, explore, and potentially develop new ideas

Create a virtual culture: provide tools that support remote workers

Venture out: leverage crowdsourcing, incubators and start-up spaces

Invest in your own IT workforce: drive retention and encourage referrals

Transform HR: shift the focus to talent attraction and development

Page 26: Tech Trends 2015: The fusion of business and IT

Science and technology breakthroughs advancing faster than Moore’s law,

potentially impacting 230 lives.

Page 27: Tech Trends 2015: The fusion of business and IT

27 Copyright © 2015 Deloitte Development LLC. All rights reserved.Deloitte University Press | Tech Trends 2015 | @DeloitteOnTech @DU_Press #techtrends

FOUR DIMENSIONS FOR EFFECTIVE INNOVATION STRATEGY

• Trend sensing: stay on top of new developments—use “show” vs “tell” in demos and prototypes

• Ecosystems: combine the traditional allies with players from relevant adjacencies such as entrepreneurs, start-ups, venture capitalists and engineers

• Experimentation: fail fast and cheap, move forward, and think about the impact, feasibility and risk

• Scaling edges: achieve innovation at an institutional level by establishing new teams on the fringes of the organization

Page 28: Tech Trends 2015: The fusion of business and IT

Follow @DU_Press and @DeloitteOnTech

Sign up for Deloitte University Press updates at www.dupress.com.

About Deloitte University PressDeloitte University Press publishes original articles, reports and periodicals that provide insights for businesses, the public sector and NGOs. Our goal is to draw upon research and experience from throughout our professional services organization, and that of coauthors in academia and business, to advance the conversation on a broad spectrum of topics of interest to executives and government leaders.

Deloitte University Press is an imprint of Deloitte Development LLC.

This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or its and their affiliates are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your finances or your business. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser.

None of Deloitte Touche Tohmatsu Limited, its member firms, or its and their respective affiliates shall be responsible for any loss whatsoever sustained by any person who relies on this publication.

About DeloitteDeloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

Copyright © 2015 Deloitte Development LLC. All rights reserved.Member of Deloitte Touche Tohmatsu Limited