Thought Leadership Archive

LeaderSpeak @ NILF

Originally posted on NASSCOM Peter Bendor-Samuel, Founder and CEO of Everest Group, talks about the future of outsourcing and global services. Peter will be speaking at the NASSCOM India Leadership Forum 2013. Q: What are the key trends and drivers of the outsourcing industry today? I see three key trends emerging. The first trend

Grief Counseling for the CIO

The accommodation and integration of disruptive technologies into the enterprise IT ecosystem is a significant issue for IT executives. And just as distributed computing did 20 years ago, successful adoption of cloud computing in its many forms requires substantial change across the IT enterprise. The rapid pace of innovation and ability of business users

Talking the Talk, but not Walking the Walk, in the Cloud

Over the last two months, we have visited with more than 50 Fortune 500 firms to discuss their thoughts about adopting and harnessing the disruptive technologies and services that are driving the next generation of IT. Inevitably, our conversations focused on the cloud and its potential impact on the price point and flexibility of

As Infosys Considers Purchasing Thomson Reuters’ Healthcare Business, it’s Time for a Thought Experiment

The Business Standard a couple of weeks ago reported that Infosys is close to acquiring Thomson Reuters’ healthcare division in a US$700-750 million transaction. To be clear, I have no concrete evidence that Infosys will make this acquisition or is in fact seriously considering it. However, the industry rumors and news articles pose a

My Service Provider is Verticalizing…Why Should I Care?

At every NASSCOM event this year, there has been a buzz about verticalization and how every ITO and BPO provider, both large and small, is rushing to adopt it. To many industry observers, this has the feel of retail stores seeking to run out their own version of the latest hot fashion from Paris.

The Consumerization of IT may be a Bigger Problem for Business than IT

King Cnut (Cnut the Great) of England, Denmark, Norway, and parts of Sweden once famously instructed the tide to refrain from rising, only to hours later find its disdain for his royal decree. Today’s CIOs find themselves faced with similar limits on their power and influence as Androids, iPhones, and iPads flood the workplace.

The Consumerization of IT and Business Processes: Why the Shift to End-to-End Processing Puts Power in the Hands of the User

Consumerization is widely credited as one of the seminal factors transforming the world of IT and forcing structural change on corporate IT departments. At the core of this consumerization is a fundamental change in expectations by the user community. Along with the average Joe becoming increasingly accustomed to downloading an app to a smart

Does Accenture’s Acquisition of Zenta and Duck Creek Signal Industry Maturation?

In the last several days, Accenture – a firm that has largely focused on organic growth strategies and avoided significant inorganic expansion activities – announced two acquisitions: Zenta, a U.S. mortgage processing firm, and Duck Creek, a provider of software solutions for the property and casualty insurance industry. When Accenture does occasionally make acquisitions,

HP’s Strategic Decisions – What’s the Next Shoe to Drop?

In 1729, Anglo-Irish satirist, essayist, and political pamphleteer Jonathan Swift penned a satirical paper suggesting that to prevent the children of poor people in Ireland from being a burden to their parents or country, and to make them beneficial to the public, the Irish should eat their own children. Driving toward services leadership may

What If the Hackers Had Attacked Sony Through Microsoft Azure Instead of Amazon’s EC2?

There is widespread speculation that the recent attack on Sony was accomplished by utilizing credit card information stolen via compute resources purchased from Amazon’s EC2 cloud offering. This high profile incident has attracted attention in the mainstream press and in the blogosphere, underscoring the interconnected and anonymous nature of cloud computing, as well as