recentpopularlog in

jonerp : software   305

« earlier  
To Change or Not to Change: The Decision to Stay on the Green Screen
"Let’s consider a few reasons why you may not want to replace your legacy system, just yet:

They simply don’t break: Like your Grandad’s 1992 Honda or Swiss watch, the thing will pretty much run forever. The technology behind the old IBM mainframes is simple and sturdy, and as long as it is cleaned and maintained it will work. Cloud ERP systems, on the other hand, are only as reliable as your users’ internet connections.
Your business has not changed: We find many scenarios where companies have been doing the same thing for 30 years, and with good reason. Consider a company that manufactures a niche supply part for an industrial manufacturing segment. It may be specialized enough that the barriers and cost of entry is too great for competitors to chase and they have consistent clientele. With no desire to expand, there may be no reason to change what’s working."
digital  strategy  erp  software  selection  cloud  cyber  security  cybersecurity  failures  independent  consultants  top  10  systems  for  2020 
12 days ago by jonerp
10 Ways To Own Your Cybersecurity In 2020
"Vault away passwords to critical systems and data. In the privileged access world of Cybersecurity operations in any organization, password vaults have become commonplace. Password vaults are similar to password managers many people use for their personal devices, web applications, and sites they regularly visit. In the case of a password vault, privileged credentials are checked in and out by admins, with each password automatically rotating to ensure greater randomization."
business  featured  posts  technology  software  trends  &  concepts  amazon  echo  bring-your-own-device  centrify  zero  trust  privilege.  cybersecurity  dashlane  google  home  lastpass 
21 days ago by jonerp
The Evolution of Software Marketing: Hey Marketing, Go Get [This]!
"While sales may be focused simply on opportunities that close bigger and faster than the rest, what the company actually wants is happy customers (to spread positive word of mouth) who renew. Sales is typically compensated on new orders, but the company builds value by building its ARR base. A $100M ARR company with a CAC ratio of 1.5 and churn rate of 20% needs to spend $30M on sales and marketing just to refill the $20M lost to churn. (I love to multiply dollar-churn by the CAC ratio to figure out the real cost of churn.)"
demandgen  enterprise  software  marketing  pipeline  startups  icp  leads  mql  sal  sql 
26 days ago by jonerp
10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
"Track, trace and find lost or stolen devices on or off an organizations’ network in real-time, disabling the device if necessary. Every device, from laptops, tablets, and smartphones to desktops and specialized use devices are another threat surface that needs to be protected."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  platform  resilience  software’s  2019  endpoint  security  report  asset  intelligence 
27 days ago by jonerp
Introducing the Future of Work Global Index
"We believe the convergence of significant macro-trends in the market have attributed to the strong growth of “Future of Work” companies including:

digital transformation and the rapid adoption of cloud technologies in the enterprise
low unemployment forcing companies to investment in technology solution to more effectively streamline critical HR processes
workforce globalization requiring new investments collaboration and productivity tools
rapid automation of jobs and the need to reskill the global workforce"
business  featured  posts  technology  software  future  of  work  hrtech  human  resources  saas  slack 
4 weeks ago by jonerp
Shadow IT Is The Cybersecurity Threat That Keeps Giving All Year Long
"Shadow personal IoT voice assistants, Amazon Kindles, smartphone, and tablet devices are proliferating across enterprise networks today, accelerated by last-minute shopping everyone is trying to get done before the end of December. 82% of organizations have introduced security policies governing the use of these devices but just 24% of employees are aware of them. Meanwhile, the majority of IT senior management, 88%, believe their policies are effective. These and many other fascinating insights are from a recent study completed by Infoblox titled, What is Lurking on Your Network, Exposing the threat of shadow devices (PDF, 7 pp., no opt-in)."
business  featured  posts  technology  software  trends  &  concepts  byod  chief  information  officer  christmas  amazon  shopping  sales  ciso  cybercrime 
8 weeks ago by jonerp
Why Cybersecurity Needs To Focus More On Customer Endpoints
"There are over thirty vendors competing in the endpoint security market right now. A few of the most interesting are Absolute Software, Microsoft, Palo Alto Networks, and others who are seeing a surge of activity from enterprises based on discussions with CIOs and CISOs. Absolute Software’s Persistence self-healing endpoint security technology is embedded in the firmware of more than 500 million devices and gives CIOs, CISOs and their team’s complete visibility and control over devices and data. Absolute is the leading visibility and control platform that provides enterprises with tamper-proof resilience and protection of all devices, data, and applications."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  resilience  (tse:  abt)  asset  management  christy  wyatt  ceo  of  cloud-based  endpoint  protection  platforms  (epp) 
10 weeks ago by jonerp
Decade-end review: Enterprise Applications have NOT eaten the world
"In this greatly fragmented market we are seeing many opportunities in “edges” and “junctions” – Zoho is finding new customers in Nigeria, UAE and other markets that bigger vendors have ignored, Plex is moving into MES as plants are increasingly modernized, Rimini is doing fine with third party maintenance as companies stay with legacy, Workfront is finding traction in new buying centers that have increasingly been digitized – Marketing Operations, New Product Development, and various corporate shared services. RPA vendors like Automation Anywhere, tools like Prism Analytics from Workday and MuleSoft from Salesforce are increasingly bridging gaps across the enterprise fragmentation. The big caveat from this fragmentation – application portfolios are screaming to be rationalized."
business  featured  posts  technology  software 
10 weeks ago by jonerp
Why Digital Disruption is Overrated
"There are plenty of risks when embarking on the journey from your current state of legacy systems to the future state of digital disruption. Yet academics, industry analysts, and other ivory tower types without much relevant hands-on implementation experience fail to mention this important fact.

Note: this is most likely due to the fact that industry analysts are largely supported by the ERP software vendors that have the most to gain from coercing their customers into “digital disruption.” Most buyers of new enterprise technologies with grand visions of technology improvements aren’t aware of the 50% operational disruption rate."
digital  strategy  artificial  intelligence  best  erp  software  disruption  implementation  independent  consultants  iot  organizational  change  management 
11 weeks ago by jonerp
Three Industries Where Technology Is Reducing Our Carbon Footprint
"Greta Thunberg has done an amazing job of raising awareness in younger generations particularly about the dangers of climate change, but even before she burst on the scene, the 2019 regulations governing NEVs (New Energy Vehicles) in China and the 2020 emissions regulations for vehicle manufacturers in the EU (as well as local ordinances by cities restricting access to older, more polluting vehicles and countries on the phase-out date for the sale of Internal Combustion Engined vehicles) meant that vehicle manufacturers have had no option but to get on board with the electrification of cars and increasingly other modes of transport as well."
featured  posts  technology  software  battery  storage  carbon  footprint  clean  meat  co2  electric  vehicles  energy  lithium  ion  renewables  solar 
11 weeks ago by jonerp
7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
11 weeks ago by jonerp
What’s New On The Zero Trust Security Landscape In 2019
"The latest Forrester Wave adds in and places high importance on Zero Trust eXtended (ZTX) ecosystem advocacy, allocating 25% of the weight associated with the Strategy section on the scorecard. Forrester sees Zero Trust as a journey, with vendors who provide the greatest assistance and breadth of benefits on a unified platform being the most valuable. The Wave makes it clear that Zero Trust doesn’t refer to a specific technology but rather the orchestration of several technologies to enable and strengthen their Zero Trust framework. Key insights from what’s new this year in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 include the following.."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  forrester  wave™:  zero  trust  extended  ecosystem  platform  providers  louis  columbus'  blog  mobile  security  mobileiron  mobility  q4  2019 
12 weeks ago by jonerp
10 Charts That Will Change Your Perspective Of AI In Security
"AI’s greatest benefit is the increase in the speed of analyzing threats (69%) followed by an acceleration in the containment of infected endpoints/devices and hosts (64%). Because AI reduces the time to respond to cyber exploits organizations can potentially save an average of more than $2.5 million in operating costs. Source: The Value of Artificial Intelligence in Cybersecurity – Sponsored by IBM Security Independently conducted by Ponemon Institute LLC, July 2018."
business  featured  posts  technology  software  trends  &  concepts  ai  cybersecurity  artificial  intelligence  cyberattacks  fraud  detection  louis  columbus'  blog 
12 weeks ago by jonerp
Undercover: “Independent” ERP Software Selection Firms
"We have stressed this time and time again, but “independent” on paper or promises does not mean your selection firm is truly independent. There are vast mechanisms for vendors, implementation partners and other influencers to create bias within an “independent” firm. The most common is financial, but there are also firms who are simply too lazy to keep up with the changing enterprise technology market and rest on the few vendors they have worked with in the past. This is also very common for smaller shops that were formed by consultants that have moved from the Big 5 consulting space."
erp  software  selection  independent  consultants  best  consultant  top  10  systems  for  2020  what  is  of  breed  erp? 
november 2019 by jonerp
5 Proven Ways Manufacturers Can Get Started With Analytics
" I believe they’re in a tough situation with customers wanting short-notice production time while supply chains often needing to be redesigned to reduce or eliminate tariffs. They’re turning to analytics to gain the insights they need to take on these challenges and more. The graphic below is from Gartner’s latest survey of heavy manufacturing CIOs, it indicates the technology areas where heavy manufacturing CIOs’ organizations will be spending the largest amount of new or additional funding in 2019 as well as the technology areas where their organizations will be reducing funding by the highest amount in 2019 compared with 2018"
business  featured  posts  technology  software  trends  &  concepts  2019  analytics  spending  manufacturing  cio  agenda  heavy  insights  intelligence  crm  gartner  louis  columbus’  blog  cycle  time 
november 2019 by jonerp
Self-Serve ERP Software Please
"ERP software has evolved to the point where it can allow a self-serve methodology to work efficiently and potentially save companies money. Algorithms help point clients in the right direction towards ready-to-use pathways. When done right, this is a win-win. The client gets to interact/transact in their preferred way, and the company can redeploy its human assets."
digital  strategy  hcm  implementations  organizational  change  management  artificial  intelligence  implementation  iot  self-serve  erp  software  top  10  systems  for  2020 
november 2019 by jonerp
Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
"To stop the cybercriminals’ gold rush, merged manufacturing businesses need to take the first step of adopting an approach to secure each acquired company’s identity repositories, whether on-premises or in the cloud. For example, instead of having to reproduce or continue to manage the defined rights and roles for users in each AD, manufacturing conglomerates can better secure their combined businesses using a Multi-Directory Brokering approach."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  resource  planning  erp  louis  columbus'  blog  manufacturing  private  equity  firms 
november 2019 by jonerp
Improving Endpoint Security Needs To Be A Top Goal In 2020
"Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organizations’ endpoints with increasing frequency. Endpoint attacks and their levels of complexity will accelerate as cybercriminals gain greater mastery of these techniques."
business  featured  posts  technology  software  trends  &  concepts  absolute  absolute’s  2019  endpoint  security  report  cyberattacks  cybersecurity 
november 2019 by jonerp
What’s New In Gartner’s Hype Cycle For CRM, 2019
"Four new technologies are on the Hype Cycle for CRM, reflecting enterprises’ need for greater integration of diverse systems and the demand for more predictive and prescriptive analytics-based insights. The four technologies include the following."
business  featured  posts  technology  software  trends  &  concepts  2019  gartner  hype  cycle  for  crm  sales  louis  columbus’  blog  partner  relationship  management  configure  price  quote  cpq  customer 
october 2019 by jonerp
How To Make Complex CPQ Selling Simple With Visual Configurators
"Visual configurators are capable of so much more than they are delivering today. It’s time to graduate beyond the shock-and-awe stage, which has been very successful in driving leads, generating MQLs, and closing deals. It’s time to get down to the hard work of making all those impressive models buildable at scale and profitable. And that comes by doubling down efforts at shortening cycle times from product concept to completed product. That’s the true north of this market and the secret to succeeding. Getting engineering, manufacturing, and sales collaborating using product models as a single source of truth is the best place to start."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
october 2019 by jonerp
How To Improve Your CPQ Pricing Strategies
"The typical manufacturer who has over $100M in sales generates 40% or more of their sales through indirect channels. The channel partners they recruit and sell through are also reselling 12 other competitive products on average. Which factors most influence a distributor or channel partner’s decision to steer a sale to one manufacturer versus another? The following are the steps manufacturers can take now to improve price management and drive more channel sales."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  engineer-to-order  louis  columbus'  blog  price  and  quote  pricing  management  product  configuration 
october 2019 by jonerp
What’s New In Gartner’s Hype Cycle For AI, 2019
"
Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.
Conversational AI remains at the top of corporate agendas spurred by the worldwide success of Amazon Alexa, Google Assistant, and others.
Enterprises are making progress with AI as it grows more widespread, and they’re also making more mistakes that contribute to their accelerating learning curve."
business  featured  posts  technology  software  trends  &  concepts  ai  cloud  computing  gartner  hype  cycle  for  artificial  intelligence  2019  louis  columbus'  blog 
october 2019 by jonerp
How to Define Your Digital ERP Strategy in 2020
"
How important is flexibility vs. scale to your business model?
What are you internal IT competencies, and what would you like them to be in the future?
How does this all align with and support your corporate strategy and objectives – or does it?
How big of a change are we really willing to make as part of our transformation?
How much time and money are we willing to invest?
What is our risk tolerance as an organization?
How will organizational change management need to support our answers to these and other questions?"
digital  strategy  best  transformation  erp  failures  predictions  software  in  2020  industry  for  top  10 
october 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
State Of AI And Machine Learning In 2019
"Data mining, advanced algorithms, and predictive analytics are among the highest-priority projects for enterprises adopting AI and machine learning in 2019. Reporting, dashboards, data integration, and advanced visualization are the leading technologies and initiatives strategic to Business Intelligence (BI) today. Cognitive BI (artificial-intelligence-based BI) ranks comparatively lower at 27th among priorities. The following graphic prioritizes the 27 technologies and initiatives strategic to business intelligence."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  louis  columbus'  blog  machine  learning  ml  state  of  2019  and  in 
september 2019 by jonerp
5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
"Endpoint security controls and their associated agents degrade and lose effectiveness over time. Over 42% of endpoints experience encryption failures, leaving entire networks at risk from a breach. They’re most commonly disabled by users, malfunction or have error conditions or have never been installed correctly in the first place. Absolute found that endpoints often failed due to the fragile nature of their encryption agents’ configurations. 2% of encryption agents fail every week, and over half of all encryption failures occurred within two weeks, fueling a constant 8% rate of decay every 30 days. 100% of all devices experiencing encryption failures within one year.'
business  featured  posts  technology  software  trends  &  concepts  absolute  security  cybersecurity  endpoint  louis  columbus'  blog 
september 2019 by jonerp
Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
Mobile Identity Is The New Security Perimeter
"89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data in the near future according to a recent survey by IDG completed in conjunction with MobileIron, titled Say Goodbye to Passwords. You can download a copy of the study here. Mobile devices are increasingly becoming the IDs enterprises rely on to create and scale a mobile-centric zero trust security network throughout their organizations."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  mobileiron  smartphones  zero  trust  network  security 
september 2019 by jonerp
Plex ML project – something every software vendor/systems integrator could emulate
"Our customers are trying to figure out how to optimize their settings, so when I was pondering that stat – 15% of our tickets are related to configuration settings – I realized this would be a great place to build a machine learning model that could help us understand what the net effect is.

Our desire was to ask “How could a customer use this model to compare it to their settings?” and be able to say, “Here are the settings you should change in order to have the optimum configuration.”
featured  posts  technology  software  cloud  computing  industry  commentary  saas 
august 2019 by jonerp
The Truth About Privileged Access Security On AWS And Other Public Clouds
"In short, native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud, and more provides enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. Often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cybersecurity  security  centrify  louis  columbus'  blog 
august 2019 by jonerp
What Needs To Be On Your CPQ Channel Roadmap In 2019
"Manufacturers can realize greater revenue potential through their channels by combining machine learning insights to find those aftermarket customers most ready to buy while accelerating sales closing cycles with CPQ. Manufacturers want to make sure they are getting their fair share of the aftermarket. Using a machine learning-based application, they can help their resellers increase average deal sizes by knowing which products and services to offer when. They’ll also know when to present upsell and cross-sell offers into an account at a specific point in time when they will be most likely to lead to additional sales, all based on machine learning-based insights. Combining machine learning-based insights to guide resellers to the most valuable and highest probability customer accounts ready to buy with an intuitive CPQ system increases sales efficiency leading to higher revenues."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
august 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Salesforce is acquiring ClickSoftware for $1.35B | TechCrunch
Another day, another Salesforce acquisition. Just days after closing the hefty $15.7 billion Tableau deal, the company opened its wallet again, this time announcing it has bought field service software company ClickSoftware for a tidy $1.35 billion.

This one could help beef up the company’s field service offering, which falls under the Service Cloud umbrella. In its June earnings report, the company reported that Service Cloud crossed the $1 billion revenue threshold for the first time. This acquisition is designed to keep those numbers growing."
Another  day  Salesforce  acquisition.  Just  days  after  closing  the  hefty  $15.7  billion  Tableau  deal  company  opened  its  wallet  again  this  time  announcing  it  has  bought  field  service  software  ClickSoftware  for  a  tidy  $1.35  billion.  one  could  help  beef  up  company’s  offering  which  falls  under  Cloud  umbrella.  In  June  earnings  report  reported  that  crossed  $1  revenue  threshold  first  time.  acquisition  is  designed  to  keep  those  numbers  growing. 
august 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Cloud Applications – A long, winding road dotted with Bystanders
"In wave 1 of the cloud, the economics were compelling. The cloud collapsed 4 contracts from on-prem world – the software, the hosting, the AMS and that of SIs who did frequent upgrades. Multi-tenancy and simplified contracting explained why it was so attractive to look at a Salesforce or a SuccessFactors relationship. But in the last decade, reality has set in. I have heard from a number of customers their incumbent infrastructure is fully amortized – the cloud only adds to that cost layer. I have heard from others who have sharpened their pencils, that buying their infrastructure is still cheaper than subscribing in the cloud when it is annualized. Then there is the expectation that comes from their outsourcing experiences – when you hand someone a 3 or 5 year contract you have the right to expect CMM Level 5 or Six Sigma continuous improvements. Instead, too many SaaS renewals are turning into unpleasant head-butting experiences – no improvements, just massive cost increases."
featured  posts  technology  software  cloud  computing  industry  commentary  saas 
july 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
The Benefits of Business Process Framing
"In selecting and implementing a new enterprise system, business leaders have learned the importance of evaluating business processes. However, they often think that this means they should begin with detailed process mapping of their existing processes. We propose a better way: Begin with an exercise we call business process framing. In this post we provide a definition of process framing, explain the differences between process framing and process mapping, and outline the benefits of beginning with process framing before moving on, selectively, to process mapping."
business  process  improvement  crm  selection  erp  hcm  software  consulting 
july 2019 by jonerp
The DIY movement in IT – what does it take to succeed ?
"If you are modernizing your IT function to enable a largely DIY culture – your economic model will probably need teams to be self sufficient on dev and ops, as opposed to one team having all the fun developing cool stuff and another doing the grunt work supporting it and answering the pager.

Will your software engineers hang around long enough if they are woken up at 3 AM by their buzzing pagers ? Do they have the skills to continuously automate ( the SRE types ) ? As you build follow-the-sun teams across the world – will your engineers have the skills and patience to work with people who are across time zones ? As you become more geographically distributed – will they be ok being further removed from the users for whom they are building software?
featured  posts  technology  software  uncategorized 
july 2019 by jonerp
Salesforce Now Has Over 19% Of The CRM Market
"72.9% of CRM spending was on software as a service (SaaS) in 2018, which is expected to grow to 75% of total CRM software spending in 2019.
Worldwide enterprise application software revenue totaled more than $193.6B in 2018, a 12.5% increase from 2017 revenue of $172.1B. CRM made up nearly 25% of the entire enterprise software revenue market."
business  featured  posts  technology  software  trends  &  concepts  adobe  marketing  crm  customer  relationship  management  hubspot  louis  columbus'  blog  oracle  salesforce 
july 2019 by jonerp
Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
"Immediate visibility with a flexible, holistic view of access activity across an enterprise-wide IT network and extended partner ecosystem. Look for threat analytics applications that provide dashboards and interactive widgets to better understand the context of IT risk and access patterns across your IT infrastructure. Threat analytics applications that give you the flexibility of tailoring security policies to every user’s behavior and automatically flagging risky actions or access attempts, so that you’ll gain immediate visibility into account risk, eliminating the overhead of sifting through millions of log files and massive amounts of historical data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  privileged  access  management  verizon  zero  trust  privilege  security  ztp 
june 2019 by jonerp
Smart Machines Are The Future Of Manufacturing
"Capturing IIoT’s full value potential will require more sophisticated integrated approaches than current automation protocols provide. IIoT manufacturing systems are quickly becoming digital manufacturing platforms that integrate ERP, MES, PLM and CRM systems to provide a single unified view of product configurations and support the design-to-manufacturing process."
business  featured  posts  technology  software  trends  &  concepts  design-to-manufacture  iiot  industrial  internet  of  things  louis  columbus'  blog  manufacturing  intelligence 
june 2019 by jonerp
What Matters Most In Business Intelligence, 2019
"Improving revenues using BI is now the most popular objective in 2019, despite BI initially being positioned as a solution for compliance and risk management. Executive Management, Marketing/Sales, and Operations are driving the focus on improving revenues this year. Nearly 50% of enterprises now expect BI to deliver better decision making, making the areas of reporting, and dashboards must-have features. Interestingly, enterprises aren’t looking to BI as much for improving operational efficiencies and cost reductions or competitive advantages."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  intelligence  dashboards  data  integration  dresner  advisory  associates  louis  columbus’  blog  manufacturing 
june 2019 by jonerp
The State Of 3D Printing, 2019
"Proof of concepts and prototyping dominate 3D printing applications in 2019. Manufacturers are increasing their reliance on 3D printing as part of their broader manufacturing strategies, with production use up to 51% of all respondents from 38.7% in 2018. The following compares 2019’s purpose of 3D prints versus the last five years of survey data."
business  featured  posts  technology  software  trends  &  concepts  3d  modeling  printing  forecast  in  manufacturing  prototyping  design-to-manufacture  louis  columbus'  blog 
june 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
Seven Things You Need To Know About IIoT In Manufacturing
"IIoT platforms are beginning to replace MES and related applications, including production maintenance, quality, and inventory management, which are a mix of Information Technology (IT) and Operations Technology (OT) technologies. IoT Analytics is seeing IIoT platforms begin to replace existing industrial software systems that had been created to bridge the IT and OT gaps in manufacturing environments. Their research teams are finding that IIoT Platforms are an adjacent technology to these typical industrial software solutions but are now starting to replace some of them in smart connected factory settings. The following graphic explains how IoT Analytics sees the IIoT influence across the broader industrial landscape."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  iiot  industrial  internet  of  things  iot  analytics  louis  columbus'  blog  machine  learning 
june 2019 by jonerp
How to Improve Privileged User’s Security Experiences With Machine Learning
"Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. Zero Trust Privilege is emerging as a proven framework for thwarting privileged credential abuse by verifying who is requesting access, the context of the request, and the risk of the access environment across every threat surface an organization has."
business  featured  posts  technology  software  trends  &  concepts  centrify  louis  columbus'  blog  machine  learning  zero  trust  privilege  security  ztp  zts 
june 2019 by jonerp
Industry 4.0’s Potential Needs To Be Proven On The Shop Floor
"In the many conversations I’ve had with mid-tier manufacturers located in North America this year, I’ve learned the following:

Their top investment priorities are upgrading existing machinery, replacing fully depreciated machines with next-generation smart, connected production equipment, and adopting real-time monitoring including Manufacturing Execution Systems (MES).
Manufacturers growing 10% or more this year over 2018 excel at integrating technologies that improve scheduling to enable more short-notice production runs, reduce order cycle times, and improve supplier quality."
business  featured  posts  technology  software  trends  &  concepts  artificial  intelligence  erp  industry  4.0  machine  learning  manufacturing  execution  system  mes 
may 2019 by jonerp
How To Improve Supply Chains With Machine Learning: 10 Proven Ways
"Machine learning-based algorithms are the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. Machine learning and AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where machine learning can contribute to solving complex constraint, cost and delivery problems companies face today."
business  featured  posts  technology  software  trends  &  concepts  analytics  artificial  intelligence  centrify  erp  infor  inspectorio  louis  columbus'  blog 
may 2019 by jonerp
The Rule of 40 — Down, But Not Out!
"I still think the Rule of 40 is a nice way to think about balancing growth vs. profit and Rule of 40 compliant companies still command a disproportionate share of market value. But remember, its explanatory power has dropped in recent years and, if you’re running an early or mid-stage startup, there is very little comparative data available on the Rule of 40 scores of today’s giants when they were at early- or mid-stage scale. That’s why I think early- and mid-stage startups need to think about the Rule of 40 in terms of glideslope planning."
metrics  rule  of  40  saas  startups  uncategorized  r40  software  valuations 
may 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
Why does G Suite keep kicking into Microsoft’s goal post? #googlenext19
"The tragedy in all of this is that Google does have the best capabilities, the best real-time interplay and the absolute best NLP in the market. All sitting atop GCP which remains the best-kept secret on Planet Enterprise. Thanks in part to GCP and in part to the genius of Kahuna co-founder and CTO Jacob Taylor and his team, at Kahuna we on-boarded 80 million consumers in a single day, with zero dev ops support.

And yet, Google misses the forest for the trees by deploying these maddingly sophisticated resources only towards improving the “how”, vs re-imagining the “what”."
featured  posts  technology  software  collaborative  organizations  digital  transformation  enterprise  and  social  sofware  google  next  2019  goognext19 
april 2019 by jonerp
The State Of Cloud Business Intelligence, 2019
"An all-time high 48% of organizations say cloud BI is either “critical” or “very important” to their operations in 2019. Organizations have more confidence in cloud BI than ever before, according to the study’s results. 2019 is seeing a sharp upturn in cloud BI’s importance, driven by the trust and credibility organizations have for accessing, analyzing and storing sensitive company data on cloud platforms running BI applications."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  analytics  aws  intelligence  cloud  bi  analysis  forecast  for  2019  computing  louis  columbus 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
Oracle Cloud ERP: The Sleeping Giant?
"While nearly ever ERP vendor in the market is promoting “cloud” offerings to the point of exertion, many of the industry leaders including SAP S/4HANA and Microsoft Dynamics 365 are still struggling to migrate their full legacy functionality to the cloud. Oracle is no different in working to bring E-Business Suite capability into its cloud offering. However, where Oracle is stepping up their game is in the development and integration of emerging technologies into their ERP offering."
erp  software  selection  oracle  cloud  implementations  implementation  plan  and  budget  strategies  to  implement  better  successful 
april 2019 by jonerp
The Best Cloud Computing Companies And CEOs To Work For In 2019 Based On Glassdoor
"Indexing the most interesting and fastest growing cloud computing companies by their Glassdoor scores and reputations is a great way to begin defining a long-term career growth strategy. One factor not quantified is how well of a fit an applicant is to company culture. Take every opportunity for in-person interviews, read Glassdoor ratings often and observe as much as possible about daily life in companies of interest to see if they are a good fit for your skills and strengths."
business  featured  posts  technology  software  trends  &  concepts  cloud  computing  jobs  cloudian  computer  reseller  news’  100  coolest  vendors  of  2019  fivetran  glassdoor  kony 
march 2019 by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
The State of Recruiting Technology in 2019 — A Year of Consolidation, Growth & Innovation
"Oracle and IBM, in particular, are hemorrhaging market share (see above) and customers are now demanding that their core recruiting platforms do more than just process applicants. They must also become global marketing platforms that engage their audience (i.e. candidates), drive corporate initiatives such as diversity and inclusion, and support career and pay progression."
"Oracle  and  IBM  in  particular  are  hemorrhaging  market  share  (see  above)  customers  now  demanding  that  their  core  recruiting  platforms  do  more  than  just  process  applicants.  They  must  also  become  global  marketing  engage  audience  (i.e.  candidates)  drive  corporate  initiatives  such  as  diversity  inclusion  support  career  pay  progression.featured  posts  technology  software  hr  hrtech  recruiting-technology  venture  capital 
march 2019 by jonerp
Vodafone’s 2019 IoT Barometer Reflects Robust Growth In The Enterprise
"
85% of enterprises who develop deep expertise with IoT succeed at driving revenue faster than competitors.
81% of enterprises say Artificial Intelligence streamlines interpreting and taking action on data insights gained from IoT systems and sensors.
68% of enterprises are using IoT to track the security of physical assets, making this use case the most common across enterprises today.
Transport & Logistics and Manufacturing & Industrials saw the most significant increase in adoption between 2018 and 2019."
business  featured  posts  technology  software  trends  &  concepts  5g  artificial  intelligence  iiot  industrial  internet  of  things  iot  enterprise  adoption 
march 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
The coming Enterprise Software Hurricane
"In the book, I point out that “tilting the bell curve of customers” to move Bystanders into the Risk Taker and Modernizer categories is SAP’s big short term opportunity. The book has several ideas for SAP to do so. Other on-prem vendors have similar opportunities in their own customer bases. And, whoever does it quickly in their customer base will also have a shot at attracting Risk-takers and Modernizers from other on-prem competitors. However, as these vendors introduce new offerings and messages, SaaS, TPM and other vendors won’t stand still – they will update their own offerings to remain competitive."
featured  posts  technology  software  cloud  computing  enterprise  (ibm  microsoft  oracle  saas  sap 
february 2019 by jonerp
Top 25 IoT Startups To Watch In 2019
"The most successful IoT startups selling into enterprises excel at orchestrating analytics, Artificial Intelligence (AI), and real-time monitoring to deliver exceptional customer experiences. As a group, these top 25 IoT startups are showing early potential at enabling profitable new business models, revitalizing industries that have experienced single single-digit growth recently. Each of these startups is taking a unique approach to solving some of the enterprises’ most challenging problems, and in so doing creating valuable new patents that further fuel IoT adoption and growth."
business  featured  posts  technology  software  trends  &  concepts  internet  of  things  startups  louis  columbus'  blog  top  25  iot  2019 
february 2019 by jonerp
Polishing brand ERP
"As an industry, we have implemented or upgraded ERP software tens of millions of times. It is absurd that we tolerate the failure rates and cost overruns that has become synonymous with ERP. Every aspect of ERP was a reason to gouge – close to 100% gross margins on software, ridiculous MPLS circuit and storage pricing, you name it. Offshore vendors who could show CMM Level 5 continuous improvements suddenly forgot that discipline when it came to ERP support. Much of what is delivered by SIs and outsourcers can and should be automated – see several ideas here"
featured  posts  technology  software  accenture  eds)  enterprise  (ibm  (other  vendors)  microsoft  offshoring  oracle  outsourcing  sap 
february 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
Top 10 Ways Internet Of Things And Blockchain Strengthen Supply Chains
"One CIO told me recently his company deliberately spins up several POCs at once, adding “they’re our proving grounds, we’re pushing blockchain and IoT’s limits to see if they can solve our most challenging supply chain problems and we’re learning a tremendous amount.”
business  featured  posts  technology  software  trends  &  concepts  blockchain  forecasts  use  cases  ethical  supply  chains  ibm  food  trust  iiot  industrial  internet  of  things 
february 2019 by jonerp
Facebook’s Tool for Automated Testing at 2 Billion Users Scale
"Recently downloaded Messenger, Instagram and other Facebook apps running on Android now are built with software that has been automatically repaired “using search on test cases using crashes that were automatically designed using search-based software testing,” he said. “An end-to-end process that was completely automated up to the point where the patch that was found was suggested to the developer, and then the developer is the final gatekeeper to say, ‘yes that will going to the codebase.’”
application  security  ci  cd  devops  software  testing 
february 2019 by jonerp
How Machine Learning Improves Manufacturing Inspections, Product Quality & Supply Chain Visibility
"Manufacturers’ most valuable data is generated on shop floors daily, bringing with it the challenge of analyzing it to find prescriptive insights fast – and an ideal problem for machine learning to solve.

Manufacturing is the most data-prolific industry there is, generating on average 1.9 petabytes of data every year according to the McKinsey Global Insititute. Supply chains, sourcing, factory operations, and the phases of compliance and quality management generate the majority of data."
business  featured  posts  technology  software  trends  &  concepts  inspectorio  louis  columbus'  blog  machine  learning  manufacturing  mckinsey  global  institute’  product  inspections  quality 
february 2019 by jonerp
Kellblog Predictions for 2019
"6. Ethics make a comeback, for two reasons. The first will be as a backlash to the blatant corruption of the current administration. To wit: the House recently passed a measure requiring annual ethics training for its members. The second will have to do with AI and automation. The Trolley Problem, once a theoretical exercise in ethics, is now all too real with self-driving cars. Consider this data, based on MIT research in this article which shows preferences for sparing various characters in the event of a crash."
enterprise  software  predictions  uncategorized  2019  kellblog  startups  technology  vc 
january 2019 by jonerp
Which Analytics And BI Technologies Will Be The Highest Priority In 2019?
"82% of enterprises are prioritizing analytics and BI applications and platforms as part of their budgets for new technologies and cloud-based services. 78% of enterprises are prioritizing advanced analytics, and 76% data preparation. 54% say AI, machine learning and Natural Language Processing (NLP) are also a high investment priority. The following graphic ranks enterprises’ investment priorities for acquiring or subscribing to new technologies and cloud-based services by analytics and BI initiatives or strategies. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  and  in  the  age  of  ai  big  data  intelligence  cloud  computing  lake  louis  columbus'  blog 
january 2019 by jonerp
How To Protect Healthcare Records In A Zero Trust World
"Using access credentials stolen from co-workers or stolen laptops, unethical healthcare insiders are among the most prolific at stealing and selling patient data of any insider threat across any industry. Accenture’s study, “Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workforce Survey on Cybersecurity,” found that the most common ways healthcare employees financially gain from stealing medical records is to commit tax return and credit card fraud."
business  featured  posts  technology  software  trends  &  concepts  centrify  healthcare  breaches  protenus  breach  barometer  idaptive  louis  columbus  privileged  access  credentials  zero  trust  privilege 
december 2018 by jonerp
Monday’s Musings: What’s Up With Big Tech Stocks? The Insider View For 2019
"Algo’s have been reset so the markets are operating on different rules and that model will be reset again soon. Why Big Tech? They play in a winner takes all market. Apple and Google provide 99% of all the consumer software in the US. Facebook, Google, and Amazon drive almost 63% of all advertising dollars
Tech is still strong with 20 to 40% growth. Investors will find it hard to find other asset allocation classes this good and this dominant."
business  featured  posts  technology  software  $appl  $goog  $nflx  $tsla  018  2018  2019  adbe 
december 2018 by jonerp
CPQ Needs To Scale And Support Smarter, More Connected Products
"Industrial Internet of Things (IIoT) platforms has the potential of providing a single, unified data model across an entire manufacturing operation, giving manufacturers a single unified view of product configurations across their lifecycles. Producing smart, connected products at scale also requires a system capable of presenting a unified view of configurations in the linguistics each department can understand. Engineering, production, marketing, sales, and service all need a unique view of product configurations to keep producing new products. Leaders in this field include Configit and their Configuration Lifecycle Management approach to CPQ and product configuration."
business  featured  posts  technology  software  trends  &  concepts  cad  configit  configuration  lifecycle  management  configure  price  quote  cpq  crm  integration 
december 2018 by jonerp
Using Machine Learning To Find Employees Who Can Scale With Your Business
"Betting on solid data and personalization at scale, on the other hand, delivers real results. Real data slices through the probabilities and is the best equalizer there is at eradicating conscious and unconscious biases from hiring decisions."
business  featured  posts  technology  software  trends  &  concepts  ai  applicant  tracking  systems  artificial  intelligence  ats  eightfold  hr  machine  learning  human  resource  management 
december 2018 by jonerp
Where Cloud Computing Jobs Will Be In 2019
"The Hiring Scale is 78 for jobs that require cloud computing skill sets, with the average job post staying open 46 days. The higher the Hiring Scale score, the more difficult it is for employers to find the right applicants for open positions. Nationally an average job posting for an IT professional with cloud computing expertise is open 46 days. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cloud  computing  employment  jobs  deloitte 
december 2018 by jonerp
86% Of Enterprises Increasing IoT Spending In 2019
"86% of enterprises expect to increase their spending on IoT in 2019 and beyond. Enterprises increased their investments in IoT by 4% in 2018 over 2017, spending an average of $4.6M this year. Nearly half of enterprises globally (49%) interviewed are aggressively pursuing IoT investments with the goal of digitally transforming their business models this decade. 38% of enterprises have company-wide IoT deployments today, and 55% have an IoT vision and are currently executing their IoT plans."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  f5  idaptive  industrial  internet  of  things  intelligent  enterprise  index 
december 2018 by jonerp
Predicting The Future Of Digital Marketplaces
"Competitive differentiation, buyer retention, buyer acquisition, and social media engagement and the four most common customer-facing challenges marketplaces face today. 39% of marketing execs say that differentiating from competitors is the greatest challenge, followed by buyer retention (32%), buyer acquisition (29%) and effective social media campaigns (29%) Further validation that today’s digital marketplaces are enabling greater digital transformation through personalization is found in just 22% of respondents said customer experience is a challenge."
business  featured  posts  technology  software  trends  &  concepts  altimeter  group  byline=louis  columbus  digital  marketplaces  ecommerce  forrester  google  cloud  platform  kahuna 
november 2018 by jonerp
Which CRM Applications Matter Most In 2018
"Marketing analytics continues to be hot for marketing leaders, who now see it as a key business requirement and a source of competitive differentiation. In my opinion and based on discussions with CMOs, interest in marketing analytics is soaring as they are all looking to quantify their team’s contribution to lead generation, pipeline growth, and revenue. I see analytics- and data-driven clarity as the new normal. I believe that knowing how to quantify marketing contributions and performance requires CMOs and their teams to stay on top of the latest marketing, mobile marketing, and predictive customer analytics apps and technologies constantly. The metrics marketers choose today define who they will be tomorrow and in the future."
business  featured  posts  technology  software  trends  &  concepts  ai  byline=louis  columbus  cloud  computing  cpq  crm  customer  relationship  management  enterprise 
november 2018 by jonerp
« earlier      
per page:    204080120160

Copy this bookmark:





to read