Tuesday, February 19, 2013

A Better Way To Create Software | Avoid Cloud Vendor Lock-in

If you have trouble viewing this email, read the online version.

This Week At InformationWeek
Join the community
Facebook Twitter LinkedIn
  Tuesday, February 19, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Chris Murphy
Chris Murphy
 
P&G CIO: There's A Better Way To Create Software

Procter & Gamble CIO Filippo Passerini is charming, polite, gracious -- and incurably impatient with the status quo. The current target of Passerini's dissatisfaction is the way in which software gets developed to meet the needs of businesses such as P&G.

Passerini describes business software development today as a "hub and spoke." The software vendor pitches what it's selling and what's possible with technology, then a would-be customer tells the vendor what they really need. FedEx, Boeing, BP, Disney, Goldman Sachs, GE -- they all go through the same exercise as P&G, one-on-one with the vendor.

Today, companies such as P&G have a screaming need for better analytics software to help them make sense of their growing mountains of data about sales, supply chains and customers. The conventional hub-and-spoke development model is still driving software innovation, but Passerini isn't confident it will produce the analytical software to meet future needs.

"With the inflection point we are at, in a couple of years it will run out of steam," Passerini said at a P&G event at its Cincinnati headquarters that included those other big technology buyers as well as technology vendors. "The opportunity is now to do something dramatically different."

Passerini stopped short of proposing what replaces today's hub and spoke. "We don't have a solution," he said. "We don't have an answer. That's why we're here."

READ MORE

 
NEW THIS WEEK

10 Tools To Prevent Cloud Vendor Lock-in
Nobody wants to be caught in proprietary traps in the cloud. These tools can help you avoid being hemmed in by one vendor.

Is Healthcare Big Data Ready For Prime Time?
As large healthcare providers test the limits of big data analytics, many smaller groups question the value.

6 Questions To Guide Natural Language Processing Strategy
Healthcare can make good use of NLP, but only if the right technology is applied to appropriate uses.

How To Beat 3 Disaster Recovery Roadblocks
Don't let data, WAN and integration challenges knock automated failover off course.

Amazon Unlikely To Spin Off AWS Cloud Unit
Oppenheimer analyst says it's "inevitable" Amazon Web Services will untether from its parent company, but Amazon disagrees.

Automation Is Good For The Business And IT's Career Prospects
Rather than dismissing the idea of automating processes like failover, embrace it. The alternative is more interest in IaaS.

MORE FROM THIS ISSUE


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: 5 Top BYOD Threats for 2013
Mobility is here to stay, and smart IT departments aren't ignoring it -- they're taking proactive steps to address the security issues of the bring-your-own-device movement. Here are the biggest problem areas to watch for, and three smart steps you can take to protect your company's data.
Download Now (Registration Required)

Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Using the Cloud to Avoid Mobile App Data Leakage
Download this white paper to learn how you can use cloud computing to improve your mobile data security. The paper features in-depth details about cloud computing as a surprisingly effective technique to solve the security, performance, user experience, and cost issues plaguing enterprises looking to provide mobile access to enterprise applications today.
Download Now (Registration Required)



MORE WHITEPAPERS
 
MOST POPULAR NEWS
Apple iWatch Vs. Smartwatches Past And Present
iWatch could change the mobile landscape, or it could end up as a redundant peripheral. Can Apple avoid the smartwatch flops of the past?

Apple Beware, Samsung Plans Smartwatch Too
Mere days after reports surface about an Apple-made smartwatch, leaked screenshots purport to reveal what Samsung's smartwatch will look like.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Microsoft's Big Data Strategy: An Insider's View
Microsoft executive Dave Campbell outlines plans for Hadoop, machine learning, high-performance computing and data and analytic offerings on Azure.

What Would an Apple Watch Do?
The iWatch, or whatever Apple would call its "watch-like device," had better do something really clever and useful. The Dick Tracy watch has been attempted and laughed off the market before. Surely Apple is thinking of what to do beyond the phone and tablet, but it has to be better than this.





MORE NEWS  
 
WEBCASTS
Secure Access: Next Steps In Identity Management
Identity management and credential technologies in government environments aim to provide fast and secure access to information, systems, and physical locations. In this interactive editorial webcast on Thursday, February 21, 2013, we will provide an update on the Federal Identity, Credential, and Access Management initiative, the National Strategy for Trusted Identities in Cyberspace, and other programs, and on agency efforts to meet those objectives. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek 500: Nominations Now Accepted
It's that time of the year again: Nominate your company for the 2013 InformationWeek 500 -- It's our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12



This e-mail was sent to sojo.blo@gmail.com

This Week At InformationWeek
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of This Week At InformationWeek go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment