Investing for transformation in 2013
How to maximize the return on your investments in disruptive trends like big data, cloud computing and mobility
Computerworld - For many organizations, now is the time for annual strategic planning and for identifying where to invest in IT initiatives in 2013 and beyond. One of the key questions faced every year is deciding, given a limited budget, on the most attractive investment choices to make and on the percentage of the investment that should go toward core, adjacent and transformational projects.
A recent Harvard Business Review article points out that a typical allocation is something like 70/20/10, with 70% of the investment going into the core business, 20% into adjacencies and 10% into new, transformational initiatives. Interestingly, HBR points out that the financial returns are typically the inverse of the spend allocations -- that is to say, 70% of the returns come from the transformational initiatives and only 10% from the core.
When we apply this thinking specifically to IT investments, another question is how to maximize the return from investments in disruptive technologies such as cloud, mobility and social networks. Of course, the return will depend on how big a bet you are placing on these initiatives -- sticking with smaller-scale departmental projects or going all out with implementations aimed squarely at the core of your business.
It's worth noting that disruptive technologies aren't necessarily adopted as transformational initiatives. Yes, that would be the case if you were taking a new product or service to a new market, but if you were incorporating the disruptive technology into your mission-critical, "run the business" applications (perhaps via application modernization), that would be a core-business initiative. And as these technologies have become more mature and proven, implementing them within your core business in 2013 can be a great way to harness their value.
Here are five recommendations for maximizing your returns with disruptive trends:
1. Look for areas where the trend can enhance your mission-critical applications. Many mission-critical applications are in need of modernization, and techniques such as cloud-, social- and mobile-enablement can raise them to leading-edge functionality and enhance their value for both internal and external end users. In addition, modernization can be a lower-cost and lower-risk approach than typical "rip and replace" initiatives, where new software development or new implementations are required.
2. Look for transformational ideas that can help innovate new processes and business models. Disruptive trends and their associated technologies are simply the means to an end, but they can open new possibilities. As an example, NFC (near field communications) technology in some of today's smartphones can offer a way to rethink physical access control and payment methods for employees.
3. Look for internal efficiency gains where you can generate significant cost savings or productivity gains. You might be able to optimize IT spending by moving application development and testing to the cloud or leveraging social collaboration more extensively across the organization. For example, the city of San Francisco is using Yammer for real-time employee communications during day-to-day operations, which has helped it reduce costs by forgoing an unwieldy infrastructure.
- Mobile Next.0: Five business scenarios for the wearable, augmented-reality era
- The power of social automation
- The cybersecurity needs of the borderless enterprise
- Mining your organization for ideas
- Timing your move into disruptive technologies
- Investing for transformation in 2013
- Moving the new wave of technology from disruptive to productive
- Next up: The consumerization of business processes
- The IT paradox: A diminished role in technology, but greater clout in the business
- Innovation in the enterprise via social computing
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Maximize Strategic Flexibility by Building an Open Hybrid Cloud Choosing how to build a cloud is the biggest strategic decision IT leaders will make this decade. It determines their organizational competitiveness, flexibility,...
- ESG: The IBM FlashSystem 840: Technical Evolution to Deliver Business Value In this whitepaper, you will learn how this high-speed storage technology has tremendous potential to support I/O-intensive and/or latency-sensitive applications.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cloud Computing White Papers | Webcasts