Professional Documents
Culture Documents
IN THIS ISSUE:
Approaching & Embracing SMAC SMAC Dened How CIOS Use IT Partners The Cloud Goes to Washington SMAC in Marketing NFC and Augmented Reality Are Changing the Shopping Experience Social Collaboration BYOD by the Numbers Machine-to-Machine Connectivity
One Rate
With our ground-breaking One Rate Level Pricing and innovative preventative maintenance processes, were saving customers 40%-50% over traditional managed services models. No more overages or penalties, and we are highly incentivized to perform.
Q4 Cloud Announces
3 Editors Letter
Forecast: What Can We Expect?
4 11
1
14
IT Partners Help to Strategize & Implement CIO Business Mobility Plans The Cloud Goes to Washington
17 22 25
23
Technology Gives Marketing Wings LinkedIns Secret to Becoming the Go-To Professional Social Networking Site is in the Analytics
STAFF
EDITOR-IN-CHIEF Robert H. Steele MANAGING EDITOR Androniki Bossonis COPY EDITOR Katie Petito COORDINATOR Pamela Vega
NFC and Augmented Reality: How Companies Are Creating Memorable Consumer Experiences with New Technologies
34
WRITERS Brian Hall Sarah Roullard Melissa Rudy Stacy Ranta Androniki Bossonis Robert H. Steele Dhru Desai Tim Peterson ADMINISTRATOR Charisma Cabal ART DIRECTOR Nancy Ruzow ADVERTISING DESIGNERS Pamela Vega Phu Michael Luong Alex Bash BUSINESS DIRECTOR Robert H. Steele MARKETING MANAGER Androniki Bossonis The SMAC Report Q4 Mobile 17300 Red Hill Ave, #100, Irvine, CA 92614 www.smacreport.com smac@smacreport.com The SMAC Report is a Q4 Systems Corporation publication.
to TV Advertisers?
EDITORS Letter
We are excited to introduce and make publicly available The SMAC Report, which is a printed version of the newsletters we originally created to keep our client base informed of trends and changes in the fast-evolving IT landscape. What we consider to be important or gamechanging news in the market, we hope will be important to you. We hope to be able to give you an idea of what your competitors may be doing and how to stay one step ahead of them. We bring together some of the brightest minds in the industry, knowing all will benefit from the mind share. As a company, Q4 is just emerging from a period of aggressive expansion in the Healthcare, Financial Services, IT Consulting, and Retail sectors, as we gear up to enter a phase of wider deployments of our SMAC (social, mobile, analytic, and cloud) platforms across these industries. Obviously, keeping our customers up to date can only help them derive revenue and gross margin growth from these technology solutions; however, it seems in keeping with our advancements toward cloud and open source structures that we also share our thought leadership universally as well. We look forward to having you as regular subscribers, either to our quarterly print or online editions, and welcome your questions and feedback. We want to make this the magazine you turn to for everything SMAC. Lets get SMACing.
3
FORECAST:
BYOD. Really.
Gartner has put forward that 70% of mobile professionals will conduct their work on personal smart devices by 2018. Currently, 82% of companies allow their workers to bring their own devices to work, but by 2017, 82% of employers will require all of their workers to bring their own devices, as IT departments shift their focus from configuring and maintaining workstations to device certification and advanced security measures. (Gartner, Inc., 2013)
BY ROBERT H. STEELE
There has always been a debate whether great leaders are born or made. There is discussion about how the ability to adapt defines a true visionary. The ability to reinvent yourself, either as an executive or a company, is what will ultimately define your true success. This is unquestioned, whether the leader is standing on the sideline of a playing field or occupying the corner office.
SMAC has been defined as A new master that IT architecture social, blends
are priced in the triple digits. It is obvious that current SMAC strategies are not working for many companies. Like any entity, a business is oriented toward the what produces
mobile, big data analytics, and cloud technologies . . . emerging to catalyze organizational tiveness. There is certainly no shortage of information available about SMAC from those peddling its benefits in the information technology industry. But, as has been demonstrated in recent waves of new information technology, this does not lead the way to success, or even survival, for an industry. Ironically, those in the information and hightech sector have suffered the most: productivity and busines competi-
most profits. Generally, that is not the way that SMAC is currently being regarded. This is due for a change, which is obviously too late for the shareholders of Kodak, The Los Angeles Times, and possibly even Xerox. Each failed to embrace new technologies that came to dominate the industry even though all had huge institutional advantages. But for other entities formulating a SMAC strategy, and more importantly one oriented toward producing profits, there will be great benefits. More satisfied clients, more sales resulting in increased revenues, and a more robust bottom line with a higher net profit margin awaits those who create a SMAC strategy that works for their business. For that, a strategic sourcing decision must be made for all SMAC matters. That has been structured by
5
As Winston Churchill once counseled, you must prepare for change or prepare to be changed.
As Winston Churchill once counseled, you must prepare for change or prepare to be changed. That is happening across the corporate landscape with the new digital technology imperatives of social, mobile, analytics, and cloud, often times referred to collectively as SMAC.
The Los Angeles Times is bankrupt, along with many other newspapers, despite an explosion of news; Kodak has gone out of business, even though more pictures are taken now than ever, and it invented digital technology; and Xerox is trading in the single digits, almost a 50% drop from its 10-year high, while other high-tech concerns
some as requiring four sourcing mandates from the C-Level management team: Sourcing that may involve embracing new software and new software development approaches; Sourcing that entails a detailed analysis of the market; Sourcing for mobile technology that involves the entire network of its engagement apparatus where BYOD (Bring Your Own Device to work) is fully engaged; and Sourcing for cloud services in information management.
seminated throughout the ranks. That, regrettably, is where so many companies are falling short today: a failure to understand how the SMAC Stack is altering the marketplace. Eventually, it will be realized. But that will be a costly lesson, courtesy of the market. When this happens, in the words of one Wall Street executive, it will be, crude, rude, and effective.
Each one of these new endeavors will bring new risks to any organization. Through proper planning, these risks are minimized and controlled. All must
6
ed for in any formulation of SMAC strategy. It is absolutely critical here that the impact of the SMAC Stack on old-school business models is fully controlled by the corporation and its affiliates. Should it fall under the dictates of the market, then the company will soon find itself out of control, and quickly going the way of Kodak, Xerox, and The Los Angeles Times. It must also be identified and then understood where the SMAC process results in change for the company. For a company to successfully transform itself, it must first define what exactly is the goal of acquiring the new technology network. It is not enough to just state more mobility as that is not a strategy. That is defining how a customer or exchange is engaged. How the SMAC Stack is changing the world as it relates to the business model of the enterprise much be ascertained first at the corporate level and then dis-
At this time, corporate America is looking at the fifth wave of the information technology tsunami.
But that does not have to be the case. First, an honest and comprehensive assessment of your company must be performed at the highest level. If the business is more than a decade old, the information technology structure is more than likely ill-suited for todays business environment. While those in C-Level suites may not realize it, employees certainly do, as do investors, and more importantly, customers do or soon will. Eventually, the bottom line will make that point when it is much too late. As one observer termed it, yesterdays world of widgets are floundering in todays onslaught of digits. This business transition from widgets to digits is forcing a massive change in the business paradigm of many industries:
move forward with a SMAC strategy, or a tremendous competitive advantage will be ceded to rivals. After all, the definition of an entrepreneur is a risk taker. Even many law firms, among the most risk-adverse of all business, are moving to a completely paperless regime by 2016 as a result of SMAC technology components, according to a recent study by Iron Mountain.
Business models must also be accounted for in any formulation of SMAC strategy.
More movies and television shows are being watched at home, but the show is over for Blockbuster as the new program features Netflix being one of the best performing stocks in the market; Book sales have increased, but Borders and other book shops have decreased in number while the share price of Amazon has soared; and In a burgeoning development that will also disrupt the market, business software is becoming so powerful that hardware firms such as F5 have recently been downgraded.
Iron, mainframe computers were produced by a number of companies from the 1950s to the 1970s. At that time, the mainframe computer industry was known as IBM and the Seven Dwarves. Eventually, the companies died off due to more powerful small computers, even laptops. As for the fate of the mainframe computer: NASA shut down its last one in 2012. Next was the minicomputer. These are computers that lie in the middle between workstations and mainframe computers. Minicomputers are multiprocessing systems that can support between 4 and 200 users at any one time. As the market has evolved, the distinctions between these various types of computers has become even more blurred . . . count on the smaller, more mobile ones to prevail! After the minicomputer came the client/ server. This is an application structure
from research commissioned by the U.S. Government to create a secure means of communication. While there is no single date for the advent of the Internet, it is generally considered to be in the 1980s. Its commercial applications are still evolving and appear to be boundless. About one-third of the worlds populace uses the Internet, an increase of more than 100 times since 1995.
At this time, corporate America is looking at the fifth wave of the information technology tsunami.
TRENDS THAT WILL ONLY ACCELERATE.
What will also continue and increase along with those trends is the role of SMAC Stack technologies. That is the history of information technology: one of change and disruption that floods the marketplace, wave after wave. It is also the nature of the business when profits are realized and wealth created for the owners. At this time, corporate America is looking at the fifth wave of the information technology tsunami.
We are now in the midst of two more waves. One being the SMAC Stack. The other is more capable open- source software making its impact felt.
We are now in the midst of two more waves. One being the SMAC Stack. The other is more capable open-source software making its impact felt. An article a short time ago in Barrons by Terrian Ray supported this new view. So powerful is this software that it is performing many of the functions that were previously handled by network solutions. In Rays piece in Barrons, As Software Takes Over, Network Gear Could Be in Jeopardy, it was noted that . . . as general- purpose computers become more powerful, they could absorb functions that previously required specialized computer
that partitions workloads and duties to the providers of resources or service, or the server. The client/server model was developed at Xerox PARC in the 1970s. Portending its decline, Xerox, like Kodak with digital photography, lost control of the technology it founded. Eventually, the market took over and the end result was crude, rude, and effective. Current examples of client/servers are email systems and network printing. The most recent wave to swamp the
world was the Internet. The Internet can be traced back to the early 1960s
hardware, the way many functions can be performed on PCs today that once required mainframes. So much for the fate of the first wave! Each of these waves has lasted about a decade in market disruption and dominance. All resulted in increasing business productivity much more than had ever been expected. Each focused initially on essential business processes. All resulted in new developments never before expected, resulting from the genius of the individual. Every wave, after greatly increasing productivity and profits, was eventually confronted by diminishing returns, however, due to the unyielding forces of competition. That is the basic fundamental of free market economics.
8
When a new good or service is introduced, profits soar as buyers rush in to gain an advantage. Competitors quickly enter the market to capture the profits being generated by the market dislocation, narrowing the margins. Eventually, through the principle of substitution, a better or alternative product is produced. Then, what was once a growth company in the hightech sector becomes one that is attractive for its healthy dividend payment, like Apple, Intel, or Microsoft. At present, SMAC Stack technologies are engaging in severe displacement in the marketplace. From that inefficiency, there is a tremendous opportunity for businesses to establish a competitive advantage over rivals. Based on the history of the previous waves of technology disruption, this should last about a decade. That is an eternity in the universe of high technology and some executives careers. That is also a tremendous opportunity for companies to profit from a superior SMAC Stack technology infrastructure. It does not matter how firmly entrenched rivals are in the industry. In all the previous waves of technology advances, the brick-and-mortar regime had seemingly insurmountable advantages. Take SalesForce, for example. No one believed that any company in their right mind would trust their most sensitive asset, prospect and client data, to be held in the cloud. SalesForce executives and all of their shareholders are laughing all the way to the bank.
The end result is that the digit winners all created a new insurmountable advantage in the free market.
The end result is that the digit winners all created a new insurmountable advantage in the free market. Each had a value chain that was harmonized with the demands of the market: crude, rude, but effective in enriching these digit firms while driving the widget companies out of business.
At present, SMAC Stack technologies are engaging in severe displacement in the marketplace. From that inefficiency, there is a tremendous opportunity for businesses to establish a competitive advantage over rivals.
A major advantage that the companies in the previous waves of information technology had was that the C-Level executives were at the front line. The early billionaires from the high-tech era were all graduates of the Home Brew Computing Club from Silicon Valley in the 1970s.
Although it would be nice, the next Bill Gates is not required to sit in the corner office. Business will prosper from advancing a new aggressive SMAC strategy and embracing related aspects of the new open-source technology craze.
The circle is now complete, once again, with SMAC Stack technology. applications. It should also always be remembered that Bill Gates was ostracized from the Home Brew Computing Club for pushing for the commercial development of intellectual property. Although it would be nice, the next Bill Gates is not required to sit in the corner office. Business will prosper from advancing a new aggressive SMAC strategy and embracing related aspects of the new open-source technology craze. Executives at all levels must focus on: SMAC Stack technology both within the corporation with employees, and outside with all business associates, ranging from clients to vendors to any partners or affiliates.
A company today must recreate itself so that it benefits from the SMAC Stack disruption in its business sector.
A major advantage that the companies in the previous waves of information technology had was that the C-Level executives were at the front line. The early billionaires from the high-tech era were all graduates of the Home Brew Computing Club from Silicon Valley in the 1970s. Those were computer geniuses who ate, breathed, and lived in code. As a result, their companies did not just meet the need of the market, the goods and services they produced created the market. There were no corporate layers separating the customer from the corporate chief. Here it should never be forgotten that the genius of Bill Gates was in realizing the previously unappreciated capabilities and potential of software
3. FOCAL POINTS
Each firm has what Clausewitz termed the center of gravity. These are critical areas where the knowledge functions intersect that will benefit the most from a SMAC strategy. Focusing on these segments will result in the greatest profit potential for any business entity seeking to gain from advanced information technology applications. There is only one Bill Gates. But that should not stop the C-Level executives at a company from recognizing the profit potential in SMAC technology. Approaching SMAC and embracing SMAC as a profit center will change a company for many years to come. In addition, it will render to your firm a decade-long advantage before history repeats itself with the next new wave of information technology advances that disrupt the marketplace once again.
9
1. TECHNOLOGY
So that the downstream impact of the SMAC Stack results in a transformation of the business that results in a substantial competitive advantage in the marketplace. Remember, there is about a decade to complete this before the next information technology wave of change arrives to offer more opportunities.
2. BUSINESS MODELS
A company today must recreate itself so that it benefits from the SMAC Stack disruption in its business sector. If it is a decade old, it is at a disadvantage. The firm must endeavor to create a business model that maximizes the impact of
TIM PETERSON
Think back a decade. We had just come out of the Y2K crisis, the Internet was in its infancy and we were on the brink of a significant stock market correction with the dotcom bust. We could not know then that these events would lead to todays massive SMAC opportunity. SMAC, short for social mobile - analytics - cloud, represents the confluence of mobile devices and enterprise mobility, social media, cloud services, and analyzing the Big Data each of these generates. To fully understand SMAC, we need to go back to the original promise we saw in the Internet more than 10 years ago. The Internet was touted as the thing that would change everything. In many ways it has. Its hard to imagine life without it. There have been bumps along the way, however. We were promised an age of total connectedness. We drooled at the prospect of revolutionary and immediate improvements in productivity, collaboration, and integration. Perhaps more importantly, we were convinced that these improvements, like the Internets reach, would be widespread, inclusive, and easy to attain. Reality has proven to be quite different from our initial expectations. IN THIS ARTICLE, WE WILL: Review Internet technology expectations and past promises Align past and current market conditions with two well-known and one lesserknown Technology Laws Explain why it has taken more than a decade for the original promise of the Internet to become an achievable reality Define SMACs value as a disruptive group of technologies
11
TECHNOLOGY LAWS
Most of us in IT are familiar with Moores Law. The doubling of integrated circuit capacity (performance) every 18 months has enabled the Internets supporting infrastructure to expand to accommodate the explosion of digital information and supporting technologies. In fact, todays move back to centralized computing aka The Cloud would not exist without the technological advances Moores Law correctly predicted. Just as important is Metcalfs Law what many believe to be the Internets guiding law. Metcalfs Law states that the value of a network rises exponentially relative to square of the numbers using it. In other words, each new connected user adds power or value to those already on the network.
KAOS LAW
Theres a hidden or lesser known Internet Law that ties Moores Law and Metcalfes Law together and encapsulates what we have long hoped the Internet would deliver: Kaos Law. Kaos Law states that the power of a network increases exponentially by the diversity and divergence of those connected to it. In other words, as more users (and devices) are able to connect to a network and add their unique perspectives, the more powerful the network itself becomes. And theres the rub: Kaos Law assumes that there are no barriers preventing this diversity to be absorbed by the network in a timely and meaningful way. This has not been the case. The barriers encountered in integrating the disparate devices,
software programs, and individual networks used by diverse businesses, industries, people, and applications has long since limited the promise of Kaos Law.
UNDERSTANDING SMAC
The reason SMAC is so powerful is because it finally allows us to integrate each of these disparate parts solving the integration problem, and thus enabling the optimum value of the network to be realized. To understand this we need to break each element or pillar of SMAC down individually to arrive at a collective SMAC value. We will also explore the internal and external impacts on business and clarify some common misconceptions about the roles of each pillar in an organization.
One of the most easily misinterpreted areas of SMAC is the Social element. In fact, there are actually two components to the Social pillar of SMAC Internal and External.
12
At the risk of oversimplifying, we are Internally Social every day by collaborating with our coworkers, customers, and partners. Bear in mind theres a big difference between the unstructured information explosion in Instant Messaging and email, and the structured information contained within integrated enterprise collaboration software tools, for example. In addition, for Kaos law to fully apply, the Externally Social diversity layer must be accounted for. Understanding how a companys products or services are being received by the market has an entirely different look in todays world. Platforms like Facebook, Twitter, and LinkedIn allow the consumer to become an integral voice, and a companys ability to harness the massive volumes of social data relating to their brand and distill it into meaningful data can be crucial to brand management. Internal and External components also apply to the Mobile aspect of SMAC. Internal Mobile needs include integration with legacy enterprise software solutions, sign on, security, and workflow routings. These are all examples where integration barriers have fallen, collaboration has increased, and reveals the diversity available in a SMAC-enabled network. External Mobile solutions allow the consumer more access to a companys product or service, and offer them new levels of convenience. The emerging trend toward mobility enables internal and external diversity across our network, and allows participants to contribute on devices they choose, often strengthening brand loyalty. Companies today need to allow both internal and external participants to contribute to or access their platform. Initiatives such as Bring Your Own Device (BYOD) highlight the flexibility necessary for todays business climate. This also reveals how we are moving closer to realizing Kaos Law and the full promise of the Internet.
So far we have covered the impact of removing integration and collaboration barriers. A byproduct of these barriers coming down is an exponential rise in the amount of information created and available to the network itself. Storage Area Networks (SAN) are one of ITs fastest and most steadily growing market segments. To keep pace with the Big Data explosion, many companies embark on massive Data Mart and Data Warehouse Business Intelligence (BI) projects. While these projects have paid some dividends, settling on a BI architecture that meets current demand while remaining flexible and elastic enough to meet constantly shifting future requirements is challenging and expensive. Companies need options. Think about the radio telescope and how creating an array of smaller telescopes and linking them together has allowed scientists to hear further into space than ever before. The future of BI seems to be following a very similar path. The ability to quickly and accurately mine an ever-increasing universe of decentralized information is perhaps the Holy Grail of Analytics. Solutions are emerging that address this need and SMAC architectures of the future will embrace these new paradigms. Cloud computing is the common term used to describe the services and applications available when multiple computers and servers are connected to one another in real time. The Internet itself is a massive cloud computing architecture. Despite this, five years ago, one of our most innovative and successful IT executives called the Cloud water vapor. Weve come a long way since then. Virtualized environments are everywhere, infrastructure as a service (IaaS) is commonplace, and cloud initiatives are a strategic goal for CIOs around the world. Scalability, redundancy, and cost are primary concerns. Without the cloud, mobile services and social media platforms cannot function. The value of cloud computing truly comes into focus when you consider that it allows us to increase capacity or add capabilities and features on the fly without investing in or implementing additional infrastructure, training personnel, or paying for software upgrades or licensing. Cloud computing includes any software as a service (SaaS) or pay-per-use service that, in real time over the Internet, extends the existing capabilities of IT.
13
SUMMARY
While SMAC has its roots in the very underpinnings of the early days of the Internet, its potential and that of Kaos Law can only now be realized. The rapid growth of smartphones and social media, and the expansion of cloud computing, have all led to an amazing opportunity. Everyone is connected, every business is connected, and these connections are not only increasing the value of the network but leading to new ways of discovering and extracting that value. SMAC will impact every business. Those who embrace its potential are likely to leapfrog their competition.
IT PARTNERS HELP TO
he job of a Chief Information Officer (CIO) is to oversee all of the technical equipment and latest software for their companies. In the last 20 years, CIOs have seen the industry change from one gigantic computer to machines so small and affordable that everyone carries them. Previously, corporate equipment and software have lasted anywhere from three to five years until there was enough advancement to warrant an upgrade. But as new software and technology are released once or twice a year now, companies are finding it necessary to update more frequently. In todays business world, CIOs are partnering with IT specialists to develop and implement business plans that embrace the latest trend: mobile communication and control.
CIOs & IT Partners Devise & Initiate Mobility Plans CIOs that are already working with a mobility plan face more business challenges than ever before. Mobility plans are expensive. Between new equipment, new software, and initial IT hours spent upgrading, the costs can exceed $100,000. This is the first challenge faced by CIOs and their IT partners when strategizing a new mobility plan. Depending on the industry and how much confidential information is required to conduct business, one of the most cost-effective plans has been to allow CIOs and IT partners to upload only the most basic applications to an employees existing tablet or laptop. While the information will always be encrypted to protect against hacking, mobility plans present another challenge: security risks. Business servers and computers have always been at risk from internal and external influences intent on stealing personal information or wreaking random havoc. While this is stressful enough, mobility plans introduce many new levels of potential security breaches. The best solutions so far have been to keep track of every login time and length, from which device, what tasks are completed, and what data is accessed. For more efficient monitoring, there are apps available to install on each mobile device connected to the server. Its in the actual implementation phase that CIOs most rely on the support of their IT partners. Whether the company decided to buy all new mobile devices but are allowing employees to use their personal devices, it is important for CIOs and IT partners to determine exactly who will have mobile access to secure server data. Working in part with business management, CIOs and IT partners will need to have mobile access to the server beyond that, only a handful of key employees should have that responsibility. This decreases the security risks CIOs will have to deal with, while the IT partners help non-mobile and mobile users resolve everyday issues.
15
business management,
How Mobile Devices Shaped the Business World In todays technology-driven age, its difficult to find someone who doesnt have some kind of mobile device. Cell phones presented the biggest breakthrough in business communications since the invention of the computer. The first versions were massive and barely worked, but quickly grew in popularity as the general public clamored for more portable and affordable versions. Cell phones introduced technology as a daily norm and mobile technology exploded quickly, continuing to advance about every six months. Now, every employee from the temps to the CEO has a cell phone, laptop, or tablet on which they can communicate with customers, from anywhere.
. . . mobile technology exploded quickly, continuing to advance about every six months.
17
loud computing is taking IT by storm, including in Washington and throughout government agencies, large and small. Cloud computing is a means of allowing organizations to access server capacity, IT services, and functions on-demand. With cloud computing, large data centers can offer a range of customers, everything from a small start-up to a massive government agency, quick access to low-cost IT infrastructure. Pay only for the services and capacity needed. Of course, one major factor driving adoption of cloud computing is the fact that employees bring their own mobile devices to work. The combination of smartphones, apps, and personal cloud services, such as Dropbox, for example, or Gmail, lead staff (and customers) to demand like-services from government IT.
18
can take years and cost millions of dollars to complete. Cloud-based services should allow for rapid provisioning, implementation, growth, and changes as necessary get what you need when you need it.
In government, the primary services or applications moving to the cloud are: Storage Conferencing and collaboration On-demand computing resources Messaging services Business process applications Office and productivity applications
SECURITY
For the government, in particular, cloud computing security issues are a major concern. The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program tasked with creating a standardized approach to security issues. Security issues for cloud computing are many and include: Security policy of the cloud provider Security policies regarding information access and storage Change control processes Physical access to and protection of infrastructure Data destruction Security policies related to third-party vendors Backup and encryption Data segregation, as cloud providers support many organizations Disaster recovery Audits Compliance certification (as needed) Licensing
Major government agencies in the U.S., UK, Canada, and elsewhere are migrating computing services to the cloud. This is good news as now even small agencies with limited budgets can access capacity as needed and take advantage of skilled IT management and best practices. The federal governments Federal Cloud Computing Initiative (FCCI) is tasked with driving the adoption of cloud computing throughout the federal government. The goals for the FCCI are to help agencies increase efficiencies, optimize common IT-related services across agencies and boundaries and foster a more unified approach. The FCCI creates standard cloud computing contracts and teaches agencies the benefits of cloud computing solutions. The hope is that the FCCI will help government leverage the same advanced, lowcost IT services available to the private sector. One major barrier in government is its inability to react quickly and effectively to changes in technology. By some estimates, the average IT effort in government
The cloud market is red hot growing at a compound annual growth rate of 26% and garnering an increasing share of IT dollars. Given the size of government, it is no surprise that many vendors are clamoring to offer cloud-based services, infrastructure, and support. It will be interesting to watch the U.S. government (and others) restructure and relocate their operations to the cloud.
razor
Mobile Engagement.
QR codes and NFC tags are being used everywhere, including print advertising, product packaging, signage, television advertising, internet advertising, and in-store product and display labeling. QR Codes and NFC tags can initiate Click to Pledge, Click To Buy, Click To Like On Facebook, click to perform a function, display a url, launch an app, etc. The applications are endless. Adobe InDesign Plug-In for easy QR Code creation and integration.
www.QRazor.com
BRIAN S. HALL
Google has been steadily gaining traction with its Google+ (G+) social networking platform. Thanks to a recent update, iOS users (iPhone/iPad) can take advantage of the services newest features, which had previously been available only on Android. With the new app update, iPhone users now have the same automatic photo enhancement capabilities, along with the ability to create animated GIFs of their G+ pictures. Thats not all. While offering a much more robust photo upload, sharing, and enhancement experience, there are some other ease-of-use enhancements to the Google+ app as well. These include a series of automated hashtags to assign to status updates and new features to make organizing photos simpler. Other improvements to the app include: Ability to use hashtags to discover new content. Ability to edit comments. More text features, such as strikethrough. Profile edits made from within the iPhone. Google+ is considered a social network as users can freely post items of interest, share photos and videos, and chat with friends and followers. It is also an identity service as all a registered users activity across all Google services are linked back to Google+. Favoriting a YouTube video simultaneously posts it to within Google+. Or, for example, clicking on the red G+ button on a website is a way to instantly tell friends on Google+ that you liked the page. Google touts this as a social layer across all its services, making for a more seamless
20
Google+ is the second-largest social networking site in the world, behind only Facebook. Google claims 500 million registered users, about half of whom actively use the service in any given month. Google+ was launched two years ago, on June 28, 2011. Like Facebook and similar services, Google requires Google+ users to provide their real name and gender.
For iPhone users unaware of the service, Google+ is much more than a social network.
experience one that competing platforms just cannot match. Along with the Google+ website, users can interact with the service via their Android or iPhone app. The iPhone app is fairly easy to navigate. This is especially useful considering the robust feature set of Google+. The social networking tools in Google+ allow you more opportunities to connect with friends and professional contacts. From within the app, you can use Messenger to chat with connections, browse friends photos, set events, and include real time, event-related information, and join various Communities. These include communities for car enthusiasts, photography, programming, and more. In this way, Google+ combines elements of Facebook, Twitter, and LinkedIn.
Google+ also includes some innovative multimedia features not found elsewhere. Circles is a simple way to group friends and followers. A user may want to share some information with their Family circle, for example, or Upper Management or Professional Colleagues circle. There is no real limit. Privacy settings can be managed for each circle. Another unique feature is Hangout. Hangouts let any Google+ member initiate or participate in a video chat. There is a limit of 10 people within a Hangout. Note that while Hangouts is a part of Google+, on iPhone it is accessible only within a separate (standalone) Hangouts app. The sheer volume of features tends to scare away some users. That said, taking a bit of time to learn Google+ can prove a boon to your personal and professional life.
21
As of this writing, Google+ has a 4.5 star (out of 5) rating, with approximately 1,500 reviews. Hangouts has a 3.5 star rating with 1,000 reviews. Both are free.
Best Practices
Melissa Rudy Here are ten best practices your business can follow to develop and implement a secure and consistent mobile business environment that encourages productivity.
Top 10 BYOD
mobility features such as integrated voice, messaging, app and document sharing, video, conferencing, and single number reach in a familiar interface. These tools use a private network, which also helps to improve productivity.
ANDRONIKI BOSSONIS
Marketing is a more complex discipline than ever. By successfully utilizing technology, marketers have an opportunity to create distinct advantages over their competitors.
Successful marketers are working in pairs with CIOs to navigate change and build more effective, efficient organizations. Marketing efforts are now entirely organized around technology, implementing systems and mining data and the cloud to be more relevant to consumers over an increasing number of channels.
With buzzwords such as social enterprise popping up, we can see why social media has become a game changer for organizations
With buzzwords such as social enterprise popping up, we can see why social media has become a game changer for organizations. A poorly performing competitor can jump through the ranks by unleashing waves of SEO-optimized content, and good business can suffer from a few bad reviews. Social media is now woven into the purchase decisions of buyers, and consumers can contribute to the success or failure of a brand just by discussing it on social channels. As social media continues to rapidly flourish, brands lose more and more influence over buyer perception. Managing the social aspect of marketing has become a critical corporate function, and as our team of writers and number and size of social channels continues to grow, it is easy to see how a company might struggle to keep track of its own social presence. Fortunately, there are tools available for marketing automation, social media optimization, and social intelligence that can help tame the social beast.
Data-crunching platforms break down the massive volumes of data from various marketing and social channels, informing marketers as to how they can tailor their approach
Big Marketing:
23
As we search, socialize, purchase, and congregate online, we leave behind a trail of trackable data. The demand to utilize this data for the purposes of intelligent, targeted marketing has resulted in the development of sophisticated, algorithm-based platforms designed to provide meaningful big data analysis and significant insights, thereby bridging big data and marketing. These data-crunching platforms break down the massive volumes of data from various marketing and social channels, informing marketers as to how they can tailor their approach in response to what their target audiences are doing and saying online. Comprehensive social listening platforms can automate sentiment analysis, provide demographics, pinpoint and interact with influencers, and even establish a social CRM to help understand and manage our share of voice. Emphasis must be placed on the quality of the data that these tools find and use. Spam postings present a challenge to accurate filtering. Also, if your brand name contains a common word such as apple or market, then the code must discern which mentions of those words actually pertain to you.
By embedding tracking code in social media, email, and web pages, we can monitor the behavior of anyone interested in a product to determine level of interest.
Marketing Intelligence:
By embedding tracking codes in social media, email, and web pages, we can monitor the behavior of anyone interested in a product to determine level of interest. Intelligence tools can record which social media group or thread they followed, which link was clicked on in an email, or which search term was used to access a website. Multiple link analysis can then track buyer behavior. This allows more accurately targeted response and the development of a nurturing program specifically targeted toward their interest and vertical market.
keting automation involves multiple areas of marketing and is really the marriage of marketing technology coupled with a highly structured sales process.
Task automation, such as automated social posting tools, can significantly save time while improving social reach.
Marketing Task Automation:
Facilitates automation of marketing processes and tasks to help marketing teams manage all the moving parts and marketing assets without being overburdened by repetitive processes. These include everything from budgeting and resource planning to the marketing calendar to automatic social commenting, posting, and scheduling. Task automation, such as automated social posting tools, can significantly save time while improving social reach. We can see that the role of marketing has evolved to not only understanding customers, but to respond to customers as individuals. Marketing can only do this if they can mine and organize vast amounts of unstructured data, and generate predictive insights on an enormous scale. In order that they connect with individual customers at each of several touch points effectively, they must employ an engagement system that provides value with each interaction. Thus, the entire process of marketing and how we understand its impact relies completely on the intelligent pairing of Marketing and IT.
24
Prospects are rated based on their tracked activities, and then presented scheduled campaign messaging via email and social and mobile channels, thus nurturing them from initial interest through to sale.
Marketing Automation:
Usually linked to a CRM, marketing automation tools focus on nurturing and moving leads from the top of the marketing funnel through to becoming hot leads at the bottom of the funnel. Prospects are rated based on their tracked activities, and then presented scheduled campaign messaging via email and social and mobile channels, thus nurturing them from initial interest through to sale. Mar-
25
LINKEDINS SECRET
SARAH ROULLARD
inkedIn is a recognizable force in the professional world. Career-driven individuals use LinkedIn to job search, submit job applications, interact in professional groups, and consume work-related content. The popularity of LinkedIn.com translates into a global Alexa web traffic rank of 14, beating search engine giant Bing, which sits at a global rank of 16. LinkedIns success as a leader in the social networking world resulted from smart first steps, most notably the companys initiative to implement analytics to identify
popular features on the site and convert those to premium offerings. LinkedIn is an example of the strength in social, analytics, and even mobile focuses components of SMAC.
LinkedIns Beginnings
Entrepreneur and investor Reid Hoffman co-founded LinkedIn in 2002. Hoffman, a former PayPal Executive Vice President, used his own money to start the new venture, pulling together a team composed of former classmates and colleagues. Linkedin.com launched in
May 2003. The site offered the LinkedIn Personal account, which the company promised to always provide free of charge.
Data from LinkedIns own analytics also distinguished opportunities for focused advertising, prompting the company to develop Targeted Recruiting Advertising opportunities.
announced three premium accounts, starting with LinkedIn Business Accounts for recruiters and researchers. Business Accounts provide users with powerful search tools to more efficiently discover job candidates and experts. The company wrapped up 2005 with the announcement of Pro and Personal Plus Accounts, providing job seekers and networkers with the ability to connect with more members and better identify job opportunities through increased search result volume. In 2006 LinkedIn announced its first profitable year.
In March 2005, LinkedIn announced its first premium offering, LinkedIn Jobs, a relationship-powered job network that connects job applicants with hiring managers, HR professionals, or recruiters. Later that year LinkedIn
LinkedIn Milestones
December 2002 Reid Ho man cofounds LinkedIn March 2005 The social networking site announces LinkedIn Jobs, a relationship-powered job network March 2006 LinkedIn reaches protability
LinkedIn currently boasts 225 million users across more than 200 nations . . .
Data from LinkedIns own analytics also distinguished opportunities for focused advertising, prompting the company to develop Targeted Recruiting Advertising opportunities. According to a 2011 Forbes article, LinkedIn reported that profit from corporate customers utilizing job listing and advanced recruitment tools contributed 50% of the companys revenue, emerging as the companys most profitable income source.
al recruiters and employers, and Recruiter for enterprise recruiters. These accounts can range from $20 per month to thousands of dollars a year.
In Q4 2012 LinkedIn reported its highest revenues yet, boasting $303.6 million.
In Q4 2012 LinkedIn reported its highest revenues yet, boasting $303.6 million. LinkedIns Premium Subscriptions brought in approximately $61 million, Marketing Solutions advertising services contributed approximately $82 million, and Talent Solutions recruitment tools achieved more than $161 million. On the surface LinkedIns social networking features may appear to be the driving force for its success; however, the companys efforts in incorporating mobile, and particularly analytics into their technology mix distinguish it from other services. The companys successful use of social, mobile, and analytics exemplify the advantage in incorporating SMAC components into a modern business model.
LinkedIn Today
LinkedIn currently boasts 225 million users across more than 200 nations, providing LinkedIn.com in a wide variety of languages. The social network provides members with a mobile site as well as free iOS and Android apps. LinkedIns premium account product offerings have expanded even further to serve more types of users. The social network offers the following accounts: Business for general business users, Job Seeker, Sales Navigator for sales professionals, Talent Finder for individu-
27
June 2008 Bain Capital Ventures, Sequoia Capital, Greylock Partners, and other venture capital rms purchase a 5% stake for $53 million, valuing the company at ~ $1 billion
May 2011 LinkedIn celebrates its IPO and trades its rst shares on NYSE
29
30
nhancing the consumer experience has become the goal for many businesses, as technology continues to advance and consumers get harder to impress. Most people today own own at least one smartphone or other high-tech mobile device, and they often serve as the primary drivers for the latest consumer tech. Mobile devices have given marketers a whole new way to promote products and services.
NFC and augmented reality are already being used by some companies to bring creativity and innovation to the consumer experience . . .
Augmented reality and NFC are two of the latest technologies to expand into consumer applications. Here are the terms briefly defined: Augmented reality projects real time enhancements, or augmentations, onto real-world environments using computergenerated data. An example of this might be map overlays onto GPS images or video. NFC stands for near field communication, which is a type of wireless technology with the ability to transfer data between two NFCenabled devices when theyre physically close togetherusually one inch apart or less. The data might be phone numbers, web addresses, or small application launchers. NFC and augmented reality are already being used by some companies to bring creativity and innovation to the consumer experience, from paying for purchases with a smartphone to virtually test-driving a new car. Here are just a few examples of these technologies in action.
While only a handful of the latest smartphone models are equipped with near field communication capabilities, the role of this technology in consumer marketing is expanding rapidly.
A few of the ways businesses are using augmented reality include: Augment This app for Android and iOS shows consumers how products will look when placed in the home or office. Through Augment-connected ecommerce sites, you can point your device camera where youd like to place an item and project an image of anything from household dcor to furnishings into place on the device screen. The app features controls that let you move items backward or forward, rotate them, or place them flush against a wall.
31
Audi offers an augmented reality app that lets consumers drive the newest Audi models from a smartphone.
The webcam social shopper from Zugara lets shoppers try on new outfits with no need for dressing rooms, by turning computers or mobile devices into digital dressing rooms. In addition, Bodymetrics is developing full-body scanners to help Bloomingdales customers find clothes that fit perfectly, and Intel Labs is creating a line of in-store kiosks to allow consumers to virtually try on clothes, and also experience the fabric by simulating how an outfit would move while youre wearing it. Audi offers an augmented reality app that lets consumers drive the newest Audi models from a smartphone. The simulated driving experience also provides additional information about a vehicle, and sensory input like the way the engine sounds. Called Audi Vision, the app uses images from the companys 2013 manufacturers guide to offer virtual test drives on new cars. Try-it-out apps arent the only ways companies are using augmented reality. From Dutch brewing company Heineken comes a prototype for a new beer bottle outfitted with LED lights, sound, and motion sensors. The Heineken Ignite, now in the pre-launch phase, lights up when two bottles are tapped together or when someone drinks from it. In addition, the lights pulse and flash in sync with loud music.
Mobile payments are among the most talked-about areas for NFC development.
Mobile payments are among the most talked-about areas for NFC development. Shoppers will be able to pay for store items by waving or tapping an NFC-enabled smartphone on a sticker or label containing NFC data. Other mobile payment options, such as Google Wallet, are already gaining traction, but NFC mobile payments are poised to increase in popularity. But the biggest potential for NFC lies in programmable NFC tags. These are typically small objects, such as key fobs, plastic chips, wristbands, or stickers with an embedded NFC-enabled microchip. These tags can transmit a variety of data to NFC-enabled devices, such as discounts and special offers, virtual business cards, and additional product information. NFC tags can also launch actions or applications, signing up customers for a Facebook page, Twitter feed, or email marketing list. Augmented reality and NFC present an entirely new field of possibilities when it comes to creating memorable consumer experiences. Will your business tap in?
32
While only a handful of the latest smartphone models are equipped with NFC capabilities, the role of this technology in consumer marketing is expanding rapidly.
34
COMPANIES CAN USE SOCIAL COLLABORATIVE MODELS TO REACH NEW LEVELS OF PRODUCTIVITY
Not too long ago, communicating with your coworkers involved nothing more complicated than walking across the hall and dashing off an email or perhaps a quick phone call. As corporations have grown in size and technology has gotten more complex, many companies are turning to social media models and tools to increase productivity and make collaboration among employees faster and easier. Before we dive into how social collaboration tools can help companies, its useful to define the term. For the scope of this article, a social collaborative tool is software that encompasses a wide range of features that allow users to easily share information and work together as a team. They use a unified platform and may include file sharing, video conferencing, milestones, messaging, and time tracking. The software can be hosted on the companys intranet or a cloud-based service on a remote server. Popular examples include Basecamp, Teambox, TeamWork, and Zoho.
Information contained in nonsearchable formats such as on an employees computer or in their email inbox forces coworkers to spend excessive amounts of time communicating with other workers and hunting the information they need. The McKinsey & Company report states highly skilled information workers spend an average of 28% of their work week reviewing and responding to email and another 19% gathering information. Only 39% of the workers time is spent on productive tasks specific to their role. Social collaborative tools turn this information into content that is freely accessible to others, eliminates whose got the ball update conflicts, and allows employees to easily share ideas and feedback. The report estimates if companies were to fully adopt social technologies, their employees could reduce time spent on email by 25% and information gathering by 35%. This would free up a total of 14% of their workweek for other productive tasks. For example, take a group of six employees working on a single project. Two of the employees work out of the office. Under the old system, managing the flow of information between all the group members was a challenge and valuable time and effort could easily be lost. If multiple members worked on the same aspect of the project independently, there was a potential for two people changing it at the same time in different ways. If the project scope changes, some group members might work on outdated versions with information that no longer applies. Using social collaborative tools, all of the project resources can be hosted on a page that any of the group members can access from anywhere on a range of devices. Members can leave messages and feedback for other members, and the latest version of the project is always available. When they need to collaborate in real time, workers can use instant messaging or video conferencing functions built right into the page. Its clear that social collaboration is here to stay, and companies are adopting social media tools to some degree. However, many companies could increase the productivity of their most valuable workers by doing more to apply the technology.
35
People found ways to connect online even before the Internet was available to the general public. The public has embraced social media faster than any previous technology. It took Facebook one year and Twitter only nine months to hit 50 million users. Companies have also jumped on the social media bandwagon. McKinsey & Company surveyed executives at 4,200 companies worldwide in 2011 about their social technologies and published the results in a July 2012 report. The companies ranged across a wide variety of industries, from aerospace to retail banking. According to their findings, 72% of the companies they surveyed were using social tools in some way, and 90% of those companies were experiencing benefits from the technology. However, only 3% of the companies were using social collaboration to the fullest extent and reaping significant benefits.* While many companies can benefit from social collaboration, McKinsey & Company estimated the ones that have the greatest potential for savings have a high percentage of knowledge workers and place a lot of value on brand recognition, credibility, and consumer trust.
* http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_social_economy
The numbers are clear. BYOD bring your own device is a mobile revolution that cannot be stopped. And while BYOD may make for happier, even more productive employees, it comes with a host of security risks. A RECENT SURVEY BY INTEL REVEALS THE RAPID GROWTH AND PRESSING CONCERNS OF BYOD
However,
36
of surveyed companies in 2013 allow some or all workers to use employee-owned devices but less than half the CIOs surveyed are ready to support BYOD.
of all IT managers surveyed list Lack of compatibility with our IT infrastructure as a key reason for outlawing BYOD, but concerns vary by country and platform.
Security is by far the biggest BYOD objection worldwide: its viewed as the #1 BYOD concern in the U.S., Germany, South Korea, and Australia.
Bring your own device includes smartphones, tablets, laptops, and other mobile devices that employees may use to access and/or distribute privileged information, applications, and resources. However, it is the smartphone revolution that has spurred the BYOD movement. As employees may access, store, distribute, and/or download company data, services and applications on their personal mobile device, companies must respond to the potential security risks. These include:
INFECTED MOBILE APPS This is particularly a problem for Android devices, as there are a host of app markets available to users. Apps may be infected with viruses that can make it into the enterprise network or contain malware which siphons off important data on the mobile device some of which could be work data. PUBLIC HOTSPOTS Company data may be exposed when employees use their mobile device over an open Wi-Fi network.
DEVICE THEFT
Smartphones are relatively easy to steal. Policies must be put in place that all mobile devices used by staff include at minimum a four-digit PIN lock. There should be a means to track or at least wipe the device in the case of theft.
DISGRUNTLED EMPLOYEES An unhappy employee and/or one leaving to a competitor may have vital company information stored on their personal mobile device. IT and HR policies must be in place to track this and prevent such exposure.
WHAT STEPS CAN YOU TAKE? How can employers safeguard data and maintain security considering the plethora of devices and OS versions employees may bring to the workplace? Employers are being proactive about having employees enroll their devices for certification, either by their own IT departments or by independent device certification and testing companies such as DeviceQA. Tools such as ActiveSync can notify IT if any non-certified devices try to connect. Some employers are also integrating geolocation tools to find and erase any lost or stolen devices that may contain valuable company data. There are also tools to prevent employees from jailbreaking their device, which can leave a device open to malware, to name just a few of the precautionary steps that can be taken to find harmony between company security and employee devices. BYOD causes security breakdowns, necessitates policy changes, and demands new tools to monitor and safeguard IT resources. Your business needs to take action sooner than later. Youll be glad you did.
37
38
THE RISE OF
Machineto-Machine
CONNECTIVITY ZOPPORTUNITY
Machine-to-machine connectivity, also called M2M, has begun altering how businesses function and flourish. Likely, this is only the start. It has been predicted that the M2M market for applications, devices, and services will top $1 trillion by 2018. Indeed, according to Cisco, the next nine billion devices connected to the Internet in 2020 will incorporate some form of M2M linking the physical world to the global web via sensors that will take continuous readings from their immediate surroundings and deliver that information to the cloud. SAPs prediction is even larger as they suggest that 50 billion devices will be connected to the global web by 2020. Wikipedia defines M2M as technologies that allow both wireless and wired systems to communicate with other devices of the same ability. Think of items at a grocery store, all with RFID tags, communicating to a warehouse or to every individuals refrigerator. Similarly, the homeowners refrigerator could be in contact with their smarpthone, updating the grocery list, for example. Or a homes energy meter could be in constant contact with the utility company, enabling everyone to optimize usage and minimize costs. Cars can be in contact with the dealer, and a service reminder sent to the car automatically based on the autos condition. Another obvious real-world example is the growing area called the Internet of Things, where every machine and device has connectivity, typically wireless, to the web. The hope is that the constant connectivity and data which each machine offers, while slight on an individual level, will in the aggregate enable greater insights. These insights should lead to an increase in productivity, efficiency, energy savings, convenience, and encourage better decision-making.
39
TRILLIONDOLLAR MARKET
This lMachina Research report predicts the M2M market will grow from $200 billion to $1.2 trillion in 2022. According to Frost & Sullivan, the areas driving M2M growth will be primarily found in the automotive sector, with new smart cars, utility companies integrating home energy readers with their
The rapid spread and reduced costs of smartphones and wireless connectivity, SIM cards, and RFID chips, are helping to propel M2M applications. Suhas Uliyar, M2M expert at SAP, states that forward-looking businesses are realizing the tremendous potential of connecting the physical world to the Internet. M2M is opening up new ways of doing business, such as dynamic pricingand allowing new customer interactions to engage end users.
.
cloud platform for libraries
With seamless database integration, easy-to-use Admin Panel and powerful Analytics, Libserra is revolutionizing the Library industry with it's Library Cloud Platform. While libraries appreciate the unparalleled efficiency and greater reach, their patrons appreciate the features and convenience. It's a win-win situation for Libraries and their patrons and offers such features as: Mobile Notifications Multi-Channel Messaging Mobile App QR Codes & NFC LibraryTV Fundraising Cloud ILS Social Media and Ask-A-Librarian
How is Twitter
Positioning Itself
42
n 2006, the microblogging service Twitter came on the social networking scene. It was built to give users the ability to send and read text-based messages made up of 140 characters or less. The tweets, as theyve been called, have become very trendy over the years. Yet critics often cite that the companys business model is inadequate because it doesnt generate a sufficient amount of revenue. But that estimation may drastically change since Twitter has introduced a new advertising platform available to all businesses and individuals on its site. Companies can utilize to Twitters self-service ad tools for their own advertising benefit. Essentially, Twitter is trying to mold itself into a supplemental medium that exists between television and digital media.
to TV Advertisers?
However, its important to point out that this setup isnt just focused on television. Amplify will also include magazine publishers, sports leagues, and even music groups.
ALYSSA BURRIS
43
Twitter feeds. Since television shows have 10 to 15 ads per half hour, it could frustrate users to see 10 to 15 tweets interrupting a chat stream. However, this possible annoyance isnt holding up Twitters momentum. Global ad revenues are expected to almost double this year, potentially reaching $583 million in 2013. Its important to note, though, that Twitters ad revenues are only a small slice of the $205 billion global television ad market. Yet Twitter should not be counted out of the mix either. The company is taking careful steps, situating itself as a television partner, not the mediums competitor. Twitter wants everyone to understand that its a tool designed to enhance the television experience rather than replace it.
44
Your next car purchase might be decided as much by apps and computing functionality as engine size, gas mileage, or leg room. The connected car is no longer just an idea, its a new reality. As The New York Times recently reported, venture capital and start-up money is flowing into Detroit, of all places, in the hopes of creating the next generation of applications for cars.
General Motors, newly flush with cash after emerging from bankruptcy, is on a hiring binge, quadrupling its information technology staff and recruiting software developers to create a spate of apps for its 2014 model-year vehicles.
Its not only GM, of course. The final frontier of app development the car is now attracting tremendous innovation and opportunity from all auto manufacturers. Ford has a futurist who studies ways to make their vehicles more useful and enjoyable through communications technologies. Ford is even spearheading the Open XC project designed to help build apps for cars using open-source software and low-cost, pluggable modules. Audi, Benz, Honda, and other car makers have also embraced this notion, along with a slew of IT start-ups.
Detroit Labs, founded two years ago to create smartphone apps, is shifting to work with automakers to build in-vehicle apps. The company has grown tenfold since 2011, to 40 people, and aims for 60 workers by the end of the year.
Talking Cars
While the long history of telematics has yielded significant improvements to the driving experience, we are now on the cusp of a new age, where cars, like people, are always connected to the web, to each other, and to the Internet of Things. Just last month, officials from the U.S. Department of Transportation demonstrated a variety of new technologies designed to allow vehicles to share information in real time with drivers and other vehicles. In part, this flurry of activity is due to the growing affordability and use cellular communications, WiFi hotspots which BMW is heavily promoting and newer offerings such as DSRC (dedicated short-range communications). DSRC is designed primarily for the auto industry and lets vehicles exchange data with other vehicles, traffic signals, and even bicycles, within a range of about 1,000 feet. It functions similar to WiFi. Once connected, vehicles can send out and receive all manner of data. Car apps allow drivers to track mileage, engine wear, and costs. Soon, apps from our smartphones (or key fob) will not only start the car, but log the time, locations, and other meta data for every trip. Cars will be equipped with sensors that not only determine the pace of traffic, but send out data to other cars, alerting drivers to possible alternative routes or texting them to leave the house earlier because of heavy traffic on their path.
Near-Term Opportunities
Some of the very likely near-term uses of telematics include:
Location-based coupons special deals sent directly to your dash based on your location and time.
maintenance trackers.
By including their position, direction and speed, traffic lights can be adjusted, toll booth fees optimized, and construction crews better dispatched. This should also help reduce car emissions. Given that 11-13% of commuting time in the U.S. is spent in urban traffic congestion thats 90 billion hours every year, the potential is massive. The hope is also that car-to-car sharing could also deliver safety benefits by alerting the vehicle, and possibly the driver, to nearby conditions in real time. For example, should multiple drivers 100 yards ahead brake suddenly, your car could react even before you do.
Payments services allowing you to pre-pay for drive-through meals, place an order while in your car, pay for bridge tolls, parking, and more. Car check-ins that could alert people nearby when your car is available, and thus can be temporarily rented, for example. Streaming media sent to the front dash or individual passengers. Roadside assistance.
bicycle coming fast on your left.
45
The Department of Transportation says that 80% of road accidents that do not involve impaired drivers could benefit from vehicle-tovehicle communications.
It is assumed that whereas Googles driverless cars cost hundreds of thousands of dollars, embedding todays cars with low-priced cellular communications technologies and sensors, as in todays smartphones, could prove a very affordable workaround to achieve equivalent goals.
Even Apple is getting into this market, recently promoting their Siri. Eyes Free offering to help make drivers more productive while in the car. Using Siri voice commands, drivers can set up appointments, reminders, make calls, ask for the weather, ask for directions to the movie theater, and request that Siri purchase tickets for them. Siri should also be able to play your favorite songs, compose and send email and texts, and read select information out loud, ensuring the driver keeps their eyes on the road. Of course, very few will cede this massive opportunity to Apple. Expect more money and more innovation as people, smartphones, apps, cars, and the web all become connected to one another. After all, there are already about a billion cars on the road, and more are made every day.
46
ANDRONIKI BOSSONIS
ets indulge in that oldest of American traditions: free trade. Free market trade where only the strongest survive. American history is littered with companies and corporations that rose and fell because of companies willing to work that much harder, design that much of a better product, and offer that product to the market at a lower cost. Sometimes, though, something funny happened. A company would get so big, corner so much of the market, that they would be labeled a monopoly.
Google Fiber network communities 1 Gbps network and download speeds. Yes, ou can see that the Google Fiber speed and the Google fiber network are heads beyond any of their competition.
As the regional monopoly in the area, Comcast, upon learning Google Fibers plans for Kansas City . . . took Google Fiber to court and began a public smear campaign . . .
47
The simple promise of Google Fiber: to deliver reliable, consistent, and reasonably priced, 100 times faster, Internet service.
That processthe process of a monopoly falling to a new competitoris happening right now. Its happening with Google Fiber.
It has to be noted, we put the word competition in quotes because with comparative speeds like the aforementioned, Verizon, Comcast, Time Warner, Cablevision, etc., should prove to be no match for Google Fiber. But here is the thing, due to old bonds, legal battles, and friends on Capitol Hill, competition is exactly what is happening.
As noted in this Philadelphia Inquirer editorial by David L. Cohen, Comcasts Executive Vice President, said: As consumer demand grows for faster speeds,
a competitive marketplace of wired and wireless broadband providers will be ready to serve it. Today there is a cottage industry of critics who always want to tell us that our broadband Internet is not fast enough or satisfactory for one reason or another. The reality is that the United States is leading the way in speed, reach, and accessand doing so in a vast, rural nation that poses logistical connectivity challenges unlike any other country. In other words, because consumer-quality routers arent equipped to deal with that much bandwidth, making speeds like that accessible to users isnt worth it. June 6, 2013
want to expand their services to provide for 10-gig connections of 1 Gbps network speeds/download speeds. It isnt a matter of whether the people are ready for it or not (clearly, as nearly 1,100 towns and cities nationwide applied for Google Fiber). Its simply a matter of a company not wanting to do the work it takes to survive in the free market. So, instead of doing the work, increasing the solution capabilities, and providing better, faster, and more consistent Internet, cable, and phone services, Comcast opted to take Google Fiber to court. With their friends in Washington, D.C., they figured the court case would be open and shut. But that didnt happen. Google Fiber won the court case and is winning additional court cases across the country where legacy regional providers choose to take a legal route as opposed to an increasing solution route.
Read between the lines here. What the Vice President of Comcast is really saying is Comcast, due to the demand and expense it would take on their part, simply doesnt
With Google Fiber slated to arrive in more than 14 American cities across the country in the coming years, legacy providers are going to
48
Google Fiber Speed: 1,000 Mbps or 1 Gbps Google Fiber Television: 162 channels with Showtime, and DVR capabilities that record up to eight channels simultaneously and more than 500 hours of HDTV. Oh yeah, a Nexus 7 tablet to serve as a remote control. A Nexus Seven tablet for a remote!
Verizon Fios (and other similar providers) charge around $320 a month. Meanwhile, Google Fiber charges $120 a month for Internet and television service. It goes without saying, but Google Fiber blows its competition out of the water. With Google Fiber slated to arrive in more than 14 American cities across the country in the coming years, legacy providers are going to be forced to up their game or lose out on the free market. As the Google Fiber story evolves, we will be following the events and posting them in this space. More coming soon.
The cost?
Verizon Fios Speed: 300 Mbps Verizon Fios TV: 380 channels with Showtime, and DVR capabilities that record two channels at once and 60 hours of HDTV.
AdBlend: a revolutionary ad platform that changes Internet advertising as we know it. AdBlend's responsive ad framework enables the most optimal display of ad units on your responsive site across a multitude of devices (smartphones, tablets, connected TV, web, etc), in portrait/landscape mode, across multiple Platforms (iOS, Android, GoogleTV and more). With one simple Javascript, publishers can easily select the size, format and creative for their campaign across different form factors from a Cloud-enabled Admin Panel. No more stretching of ad units to ruin the creatives or pinching of screens to view the contents of a campaign. Advertisers can now display the best possible creative for a campaign EVERY TIME on EVERY DEVICE. Visit www.adblend.com and find out how easy it is for your internet advertising to be truly effective.
www.adblend.com