You are on page 1of 19

BUSINESS TECHNOLOGY LEADERSHIP | cio.

com FA L L 2 0 1 7

TENhot
DATA
ANALYTICS
FROM IDG

TRENDS
HOW TO MINE
SOCIAL MEDIA FOR
BUSINESS GOLD 3

CONNECTING WITH
+FIVE
GOINGcold
CUSTOMERS ON
THEIR TERMS 6

THE PROS AND CONS


OF 4 CIO TRANSITION
SCENARIOS 16

ANALYTICS SUCCESS
Big data, machine learning,
STORIES: AN INSIDE data science — the data analytics
LOOK 18
revolution is evolving rapidly.
BY MARTIN HELLER
contents FA L L | 2017

EDITORIAL IDG COMMUNICATIONS, INC.


EXECUTIVE EDITOR  PRESIDENT 
Amy Bennett Kumaran Ramanathan
ART DIRECTOR IDG ENTERPRISE
Terri Haas PUBLISHER
SENIOR EDITOR Adam Dennison
Jason Snyder CHIEF REVENUE OFFICER
SENIOR WRITERS  Brian Glynn
Clint Boulton FOUNDER
emerging TECH
Sharon Florentine Patrick J. McGovern
3 How to mine Thor Olavsrud (1937-2014)
social media for Sarah White
business gold
CIO EVENTS
transformation NATION EDITOR IN CHIEF
6 Connecting with Maryfran Johnson
customers on their
terms
leading TECH
16 The pros and cons Copyright ©
of 4 CIO transition 2017 CIO.com. All
cover story rights reserved. CONTACT US
scenarios Reproduction in whole

applying TECH Ten hot data analytics or in part in any form


or medium without
WHO COVERS WHAT
www.cio.com/about/contactus.html

trends and five going cold


express written
18 Analytics success permission of CIO. EMAIL PHONE
com is prohibited.
stories: An inside look letters@cio.com  508-872-0080
CIO and CIO.com and
Big data, machine learning, data science — the the respective logos FOLLOW US ON . . .
data analytics revolution is evolving rapidly.   9 are trademarks of
International Data Twitter, Facebook and LinkedIn
Group Inc.
BY M A RT I N H E L L E R

COV E R A RT T H I N K S TO C K FA L L 2 017   |   C I O . C O M 2
emerging TECH

How to mine
social media for
business gold
A strong social intelligence strategy can transform
social media data into actionable insights
— and help shape your company’s products,
advertising and customer experience.
BY SANDR A GIT TLEN

In an age when most companies have a social


media presence, it’s somewhat surprising that
many still haven’t figured out how to turn
data gathered from company-owned proper-
ties and social media listening tools into auto-
mated and actionable intelligence.
“Social intelligence is just making use of
the analysis social analytics tools give you. It
could be basic or it could be complex, but it
needs to be applied to become intelligence.

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 3
emerging TECH

I thought we would be there by


now but it’s just not happening,” “Social intelligence is just making use of the analysis social
says Jenny Sussin, research vice
analytics tools give you. It could be basic or it could be complex,
president at Gartner.
What’s largely missing is being but it needs to be applied to become intelligence.
able to funnel social analytics —JENNY SUSSIN, RESEARCH VICE PRESIDENT AT GARTNER
automatically into traditional
CRM, ERP and other back-end
systems, enabling organizations to are and how the brand should job to champion social intelligence points for their customers,” she
marry social findings with existing react,” he says. Nissan North throughout the company, a maker says, adding the tool’s seman-
internal data. America has six to eight analysts of mobile computers, scanners, tic filtering helps automatically
that review data aggregated in RFID and barcode printers. keep results aligned with intent.
The human touch queues by the social media man- When the sales enablement team Lengthy sales cycles keep her from
Bryan Long, senior manager of agement tool Sprinklr. The ana- approaches her about prospective learning if the presentations she
Nissan North America’s social lysts, Long says, decide when to clients, Kaminski taps Oracle’s delivers to the sales enablement
media customer strategy team, respond. “An individual instance Social Cloud, a social relationship team lead to closed deals, but the
says technology will continue to of concern might not be enough management tool, to build a com- repeat asks for assistance indicate
assist Nissan’s social media efforts to warrant a look, but when you prehensive dashboard to help the to her they have been effective.
but there is only so much automa- get into a top 10 or top 20 ranked sales representative nail the sale.
tion that can be applied to social concern, you have to start paying Kaminski loads Social Cloud’s Integrating social
analytics. Parsing the brand’s attention,” he says. Boolean search with keywords, intelligence
posts, tweets, and mentions, which phrases and topics to discover in Gartner’s Sussin finds herself
total millions per year, into action- Targeting pain points conversations across Facebook, frustrated that more hasn’t come
able intelligence requires human As the only employee 100 per- Twitter and LinkedIn, as well as of social intelligence. She acknowl-
analysis. cent dedicated to social media at message boards and blogs. edges that technology equipped to
“There will always be a need Zebra Technologies, Global Social “We find insights into [the pro- leverage social input wasn’t avail-
for people to read, interpret and Media Strategy Manager Sally- spective client’s] products or solu- able when businesses initially
understand what customer needs Anne Kaminski considers it her tions that might be causing pain started listening to social plat-

FA L L 2 017   |   C I O . C O M 4
emerging TECH

Smart
SECURITY
TM

forms but says it is primed to pro- “We need the


vide business value now, pointing social people and
to the ability to blend unstructured the data man-
data from social platforms and agement people
structured data from traditional
to talk to each
systems to extract intelligence. NEWSLETTER
other and under-
Sussin says lack of integration
stand that this SAFEGUARDING YOUR SECURITY AND PRIVACY AT WORK AND AT HOME
often is a product of silos within an
organization, where social media
information can
has either been buried in market-
and needs to be From the editors of CSO magazine, Security Smart is

ing or kept as a separate entity. “In exchanged for a quarterly newsletter ready for distribution to your

the early days, companies set up better decision employees—saving you precious time on employee

social media as a feed for listening, making.” education! The compelling content combines
personal and organization safety tips, making it
figuring they would find some- —JENNY SUSSIN applicable to many facets of employees’ lives.
thing that would lead to a million-
Security Smart has an easy-to-read design and clear,
dollar idea and make it all worth
engaging and entertaining articles so you are assured
it,” she says, adding, “That’s how with the governance applied to other
that your intended audience of employees—your
they got in trouble.” data management efforts such as
organization’s most valuable assets—will read and
For social intelligence to truly take CRM and ERP systems, according retain the information. Sign up today to start having
hold, it must be incorporated with to Sussin. “We need the social people this newsletter distributed as a key tool in raising
the organization’s business analyt- and the data management people to security awareness within your organization.
ics and intelligence infrastructure in talk to each other and understand
■ Most security breaches happen due to human error
Subscribe today!
IT. “Data leaders will say they have that this information can and needs To view a sample issue of
■ 4 out of every 5 data breaches caused by human
enough on their plate with bigger to be exchanged for better decision the newsletter, learn about
error are unintentional
data management problems and making,” she says. ♦ the delivery options and
■ 4 out of every 5 security events caused by insiders to subscribe visit:
don’t see social intelligence as their have a negative impact on their enterprise organi-
WWW.SECURITYSMART.COM
issue, but it is,” she says. Sandra Gittlen is a freelance writer and zation (including loss of confidential information,
critical system disruptions, reputational harm,
Social intelligence would do well editor in the greater Boston area.
lost customers and more)

Security Smart is published by CSO, A business unit of IDG Enterprise. | ©2015 CSO
FA L L 2 017   |   C I O . C O M 5
transformation NATION

Connecting with
customers on
their terms
Food-service company HMSHost harnesses
cross-channel data to optimize dining
experiences for hungry travelers.
BRENDAN MCGOWAN

T
here are, perhaps, no
more vocal or assertive
customers than airline pas-
sengers between connect-
ing flights. Sometimes these
hungry and harried travelers just need a
hot coffee and croissant.
HMSHost, a leading firm in the food and
beverage space for travelers, is focused

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 6
transformation NATION

intently on that need. Sarah Naqvi,


executive vice president and CIO
“I started on the journey of innovation, trying to look at a
at the company, describes an IT strategy in which IT could play a different role than histori-
organization that has “been able to
move mountains” on a digital level,
cally it was known to play — as a support center.”
accomplishing more in the past – SARAH NAQVI, EXECUTIVE VICE PRESIDENT AND CIO, HMSHOST
“six or seven months than we have
been able to do in the past three
years.”
Specifically, Naqvi says several in which IT could play a different lation at one of the company’s
key factors have jointly accelerated role than historically it was known Burger King franchises.
HMSHost’s agility and relevance to play — as a support center,” she Significantly, customer experi-
to consumers, including a shift in says. “I felt that technology was ence falls under the banner of
digital governance strategy, key evolving and maturing at such a digital transformation. The com-
investments in technology infra- fast pace that the IT organization pany’s director of experience,
structure and a renewed focus on had to play a more significant role Naqvi explains, resides in the
customer experience. in enabling transformation and digital transformation group and
growth.” documents how customers spend,
Organizing for success The most critical factor was what frustrates or delights them,
Naqvi began her career at forming a digital transformation and even “customer flow” — the
HMSHost as a programmer ana- group. The company hired a vice footprint, defined in minutes spent
lyst in 2000. Her years of progres- president overseeing digital trans- and footsteps, that every customer
sive experience at the organization formation, reporting directly to leaves behind.
provided her with a distinct per- Naqvi. Underneath this vice presi- With the digital transformation
spective on IT’s potential when she dent are all of HMSHost’s project group in place, Naqvi and her col-
stepped into the CIO role in 2013. managers, working on anything leagues strategized on how digital
“I started on the journey of inno- from the next version of the com- could directly impact customer
vation, trying to look at a strategy pany’s mobile app to a kiosk instal- loyalty. She believes customers are

FA L L 2 017   |   C I O . C O M 7
transformation NATION

very much in a transition phase in


terms of how they transact, split
“The positioning of your digital assets and their design, the
between face-to-face interactions customer journey, and the flow of your information — these
with employees and digital inputs.
As a result, allowing customers
are all the factors that can mean the difference between
to interact with HMSHost on their a successful digital deployment and a failure. – SARAH NAQVI
own terms remains a strategic
imperative. Customers can trans-
act with the cashiers who work
at the company’s airport or travel
plaza locations, and they can order food purchases, the average check signage. The second store, compa-
food and beverages from self-ser- was 30 to 40 percent more than rable in terms of physical footprint
vice kiosks, tabletop devices and it would be if they interacted with and traffic, was far more success-
the company’s mobile app. an employee. The most popular ful with “Order Here.”
The data that Naqvi and her add-on items? Cheese and bacon. “With all of these digital jour-
team collect from each of these Naqvi and her team concluded that neys, marketing is the key to suc-
channels varies. The speedy kiosk customers feel more comfortable cess,” Naqvi says. “The positioning
experience, she explains, would ordering these add-on items from of your digital assets and their
be impeded if kiosks forced cus- machines than from people. design, the customer journey, and
tomers to provide even an email Multichannel digital strategy is the flow of your information —
address, while the mobile app is ineffective without simple, clear these are all the factors that can
tied to mobile user profiles and communication, Naqvi adds. To mean the difference between a suc-
provides more detailed data. accentuate the point, she shares cessful digital deployment and a
This data on customer flow helps how she saw another 30-point failure.” ♦
HMSHost adjust its multichan- revenue difference at kiosks in
nel strategy. The group found, for two separate company-run Burger Brendan McGowan is global media
example, that when customers King stores. The first Burger King bureau and client research manager at
interacted with a kiosk to make had “Express Meal” as its kiosk the CIO Executive Council.

FA L L 2 017   |   C I O . C O M 8
cover story | ANALYTICS

hot
D
ata analytics
are fast becom-
ing the lifeblood
Big data,
machine data of IT. Big data,
machine learn-

analytics
ing, data science — the range of
learning, data technologies and techniques for
science — the analyzing vast volumes of data
data analytics

trends
is expanding at a rapid pace. To
revolution is gain deep insights into customer
behavior, systems performance,
evolving

going
and new revenue opportunities,
rapidly. your data analytics strategy will
BY MARTIN HELLER benefit greatly from being on

cold
top of the latest trends.
Here is a look at the data ana-
lytics technologies, techniques
and strategies that are heating
up and the once-hot trends that
are beginning to cool. From busi-
ness analysts to data scientists,
everyone who works with data is
being impacted by the analytics
revolution. If your organization
is looking to leverage data ana-
lytics for actionable intelligence,
the following heat index should
be your guide. >>

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 9
cover story | ANALYTICS

To gain deep insights into customer


H E AT I N G U P:

Self-service BI
Who: BI/BA pros, managers
behavior, systems performance, and new

W
ith self-service BI tools,
such as Tableau, Qlik
Sense, Power BI and Domo,
revenue opportunities, your data analytics
managers can obtain cur-
rent business information
strategy will benefit greatly from being
in graphical form on demand. While a certain
amount of setup by IT may be needed at the out-
on top of the latest trends.
set and when adding a data source, most of the
work in cleaning data and creating analyses can
be done by business analysts, and the analyses tions, and even the building of additional stores erance within minutes of the event; that’s easily
can update automatically from the latest data in under-served areas. done with an app that queries the QA database
any time they are opened. every minute, updates and displays a Shewhart
Managers can then interact with the analy- H E AT I N G U P: control chart, and optionally sounds an alarm
ses graphically to identify issues that need to Mobile dashboards when a line goes out of spec.
Who: BI/BA pros, managers, developers

I
be addressed. In a BI-generated dashboard or
“story” about sales numbers, that might mean n a world where managers are rarely at CO O L I N G D OW N:

drilling down to find underperforming stores, their desks, management tools need to Hadoop
Who: Data scientists

H
salespeople and products, present mobile-friendly dashboards to
or discovering trends in be useful and timely. Most self-service adoop once seemed like the
year-over-year same-store BI tools already have this feature, but not answer to the question “How
comparisons. These dis- every key business metric goes through a BI tool. should I store and process really
coveries might in turn For example, a manufacturing plant is likely to big data?” Now it seems more like
guide decisions about have a dedicated QA system monitoring all pro- the answer to the question “How
future stocking levels, duction lines. All plant managers need to know many moving parts can you cram into a system
product sales and promo- whether any of the lines have drifted out of tol- before it becomes impossible to maintain?”

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 10
cover story | ANALYTICS

From business analysts to data scientists, R is available as free open source, and is
embedded into dozens of commercial products,
everyone who works with data is being including Microsoft Azure Machine Learning
Studio and SQL Server 2016.
impacted by the data analytics revolution.
H E AT I N G U P:

The Apache Hadoop project includes four H E AT I N G U P: Deep neural networks


R language Who: Data scientists

S
modules: Hadoop Common (utilities), Hadoop
Who: Data scientists with strong statistics

D
Distributed File System (HDFS), Hadoop YARN ome of the most powerful deep
(scheduler) and Hadoop MapReduce (parallel ata scientists have a number of learning algorithms are deep neu-
processing). On top of or instead of these, people options to analyze data using ral networks (DNNs), which are
often use one or more of the related projects: statistical methods. One of the neural networks constructed from
Ambari (cluster management), Avro (data seri- most convenient and powerful many layers (hence the term “deep”)
alization), Cassandra (multi-master database), methods is to use the free R pro- of alternating linear and nonlinear processing
Chukwa (data collection), HBase (distributed gramming language. R is one of the best ways units, and are trained using large-scale algo-
database), Hive (data warehouse), Mahout (ML to create reproducible, high-quality analysis, rithms and massive amounts of training data. A
and data mining), Pig (execution framework), since unlike a spreadsheet, R scripts can be deep neural network might have 10 to 20 hidden
Spark (compute engine), Tez (data-flow program- audited and re-run easily. The R language and layers, whereas a typical neural network may
ming framework intended to replace MapRe- its package repositories provide a wide range of have only a few.
duce), and ZooKeeper (coordination service). statistical techniques, data manipulation and The more layers in the network, the more
If that isn’t complicated enough, factor in plotting, to the point that if a technique exists, characteristics it can recognize. Unfortunately,
Apache Storm (stream processing) and Kafka it is probably implemented in an R package. R the more layers in the network, the longer it
(message transfer). Now consider the value is almost as strong in its support for machine will take to calculate, and the harder it will be
added by vendors: Amazon (Elastic Map learning, although it may not be the first choice to train. Packages for creating deep neural net-
Reduce), Cloudera, Hortonworks, Microsoft for deep neural networks, which require works include Caffe, Microsoft Cognitive Tool-
(HDInsight), MapR and SAP Altiscale. Con- higher-performance computing than R cur- kit, MXNet, Neon, TensorFlow, Theano, and
fused yet? rently delivers. Torch.

FA L L 2 017   |   C I O . C O M 11
cover story | ANALYTICS

by hackers. Automobiles have been taken over


remotely, home routers have been enlisted into
a botnet for carrying out DDoS attacks, the pub-
lic power grid has been brought down in some
areas…
What will it take to make IoT devices
secure? Why aren’t the manufacturers pay-
ing attention? Until security is addressed, the
data analytics promise of IoT will be more
risk than reward.

H E AT I N G U P:

CO O L I N G D OW N: In fact, the manufacturers have often made TensorFlow


IoT Who: Data scientists

T
fundamental design errors. In some cases, the
Who: BI/BA pros, data scientists

T
smart devices only work if they are connected ensorFlow is Google’s open
he internet of things (IoT) may be to the internet and can reach the manufac- source machine learning and
the most-hyped set of technolo- turers’ servers. That becomes a significant neural network library, and it
gies, ever. It may also be the worst point of failure when the manufacturer ends underpins most, if not all, of
thing that happened to internet product support, as happened with the Sony Google’s applied machine learn-
security, ever. Dash and the early Nest thermometer. Includ- ing services. The Translate, Maps, and Google
IoT has been touted for smart homes, wear- ing a remote internet-connected server into a apps all use TensorFlow-based neural net-
ables, smart cities, smart grids, industrial inter- control loop also introduces a significant and works running on our smartphones. Tensor-
net, connected vehicles, connected health, smart variable lag into the control loop which can Flow models are behind the applied machine
retail, agriculture and a host of other scenarios. introduce instability. learning APIs for Google Cloud Natural Lan-
Many of these applications would make sense Even worse, in their rush to connect their guage, Speech, Translate and Vision.
if the implementation were secure, but by and “things” to the internet, manufacturers have Data scientists can use TensorFlow, once they
large that hasn’t happened. exposed vulnerabilities that have been exploited can get over the considerable barriers to learn-

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 12
cover story | ANALYTICS

Running batch jobs


ing the framework. TensorFlow boasts deep CO O L I N G D OW N:

flexibility, true portability, the ability to connect Batch analysis


Who: BI/BA pros, data scientists
overnight to ana-

R
research and production, auto-differentiation
of variables, and the ability to maximize perfor- unning batch jobs overnight to
mance by prioritizing GPUs over CPUs. analyze data is what we did in
the 1970s, when the data lived
lyze data is what
H E AT I N G U P:
on 9-track tapes and “the main-
frame” switched to batch mode
we did in the 1970s,
MXNet
Who: Data scientists
for third shift. In 2017, there is no good reason to when the data lived

M
XNet (pronounced “mix-net”)
settle for day-old data.
In some cases, one or more legacy systems on 9-track tapes and
is a deep learning framework
similar to TensorFlow. It lacks
(which may date back to the 1960s in some
cases) can only run analyses or back up their “the mainframe”
the visual debugging available
for TensorFlow but offers an
data at night when not otherwise in use. In other
cases, there is no technical reason to run batch
switched to batch
imperative language for tensor calculations that
TensorFlow lacks. The MXNet platform auto-
analysis, but “that’s how we’ve always done it.”
You’re better than that, and your management
mode for third shift.
matically parallelizes symbolic and imperative deserves up-to-the-minute data analysis. In 2017, there is no
operations on the fly, and a graph optimization
layer on top of its scheduler makes symbolic H E AT I N G U P: good reason to settle
Microsoft Cognitive
execution fast and memory efficient.
MXNet currently supports building and Toolkit 2.0 for day-old data.
Who: Data scientists

T
training models in Python, R, Scala, Julia, and
C++; trained MXNet models can also be used he Microsoft Cognitive Toolkit, directed graph. It has many similarities to Ten-
for prediction in Matlab and JavaScript. No also known as CNTK 2.0, is a uni- sorFlow and MXNet, although Microsoft claims
matter what language you use for building fied deep-learning toolkit that that CNTK is faster than TensorFlow especially
your model, MXNet calls an optimized C++ describes neural networks as a for recurrent networks, has inference support
back-end engine. series of computational steps via a that is easier to integrate in applications, and

FA L L 2 017   |   C I O . C O M 13
cover story | ANALYTICS

has efficient built-in data readers that have APIs for other languages. Scikit- April 2017 after more than a year of struggling
also support distributed learning. learn doesn’t support PyPy, the fast through buggy release candidates. And yet,
There are currently about 60 sam- just-in-time compiling Python imple- as of July 2017, it has over 500 open issues.
ples in the Model Gallery, including mentation, nor does it support GPU An outsider might get the impression that the
most of the contest-winning models acceleration, which aside from neural project stalled while the deep learning com-
of the last decade. The Cognitive Tool- networks, Scikit-learn has little need for. munity moved on to TensorFlow, CNTK and
kit is the underlying technology for Scikit-learn earns high marks for ease MXNet.
Microsoft Cortana, Skype live transla- of development. The algorithms work as
tion, Bing and some Xbox features. advertised and documented, the APIs are H E AT I N G U P:

consistent and well-designed, and there are few Jupyter Notebooks


Who: Data scientists

T
H E AT I N G U P: “impedance mismatches” between data struc-
Scikit-learn tures. he Jupyter Notebook, originally
Who: Data scientists

S
called IPython Notebook, is an
cikits are Python-based scientific CO O L I N G D OW N: open-source web application that
toolboxes built around SciPy, the Caffe allows data scientists to create and
Who: Data scientists

T
Python library for scientific comput- share documents that contain live
ing. Scikit-learn is an open source he once-promising Caffe deep code, equations, visualizations and explanatory
project focused on machine learn- learning project, originally a text. Uses include data cleaning and transforma-
ing that is careful about avoiding scope creep strong framework for image clas- tion, numerical simulation, statistical modeling,
and jumping on unproven algorithms. On the sification, seems to be stalling. machine learning and much more.
other hand, it has quite a nice selection of solid While the framework has strong Jupyter Notebooks have become the preferred
algorithms, and it uses Cython (the Python to C convolutional networks for image recognition, development environment of many data scien-
compiler) for functions that need to be fast, such good support for CUDA GPUs, and decent por- tists and ML researchers. They are standard
as inner loops. tability, its models often need excessively large components on Azure, Databricks and other
Among the areas Scikit-learn does not cover amounts of GPU memory, the software has online services that include machine learning
are deep learning, reinforcement learning, year-old bugs that haven’t been fixed, and its and big data, and you can also run them locally.
graphical models, and sequence prediction. It is documentation is problematic at best. “Jupyter” is a loose acronym meaning Julia,
defined as being in and for Python, so it doesn’t Caffe finally reached its 1.0 release mark in Python, and R, three of the popular languages

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 14
cover story | ANALYTICS

Alas, businesses that want to be agile can’t respond to environ-


mental and market changes in months: the time between asking
a question and getting an answer should be measured in seconds
or minutes, not weeks or months.
for data analysis and the first targets for Note- data centers may not suffice, and you will have given their backlog. Once a report was defined, it
book kernels, but these days there are Jupyter to add cloud storage. Once your data is in the was run on a monthly basis essentially forever,
kernels for about 80 languages. cloud, your analysis should be, too. Eventually and printouts of all possible reports went into
most new projects will be implemented in the management’s inboxes on the first of the month,
H E AT I N G U P: cloud, and existing projects will be migrated to be glanced at, discussed at meetings, and ulti-
Cloud storage and analysis to the cloud, moving your company from the mately either acted on or ignored.
Who: BI/BA pros, data scientists

O
CapEx to the OpEx world. Sometimes the action would be to define a
ne of the mantras of efficient anal- new report to answer a question brought up by
ysis is “do the computing where CO O L I N G D OW N: an existing report. The whole cycle would start
the data resides.” If you don’t or Monthly BI reports over, and a month or two later the new report
Who: BI/BA pros, data scientists

B
can’t follow this rule, your analy- would be added to the monthly printout.
sis is likely to have large delays efore self-service business intel- Alas, businesses that want to be agile can’t
if the data moves across the local network, and ligence became popular, BI was the respond to environmental and market changes
even larger delays if it moves over the internet. province of IT. Managers described in months: the time between asking a question
That’s why, for example, Microsoft recently what they thought they wanted and getting an answer should be measured in
added R support to SQL Server. to see, business analysts turned seconds or minutes, not weeks or months. ♦
As the amount of data generated by your com- that into specifications, and BI specialists created
pany grows exponentially, the capacity of your reports to meet the specifications — eventually, Martin Heller is a regular contributor to CIO.com.

FA L L 2 017   |   C I O . C O M 15
leading TECH

The pros and cons


of 4 CIO transition
scenarios
While every CIO transition is unique, with no single
formula for success, there are common patterns
for navigating a change in leadership. 
BY KHALID K ARK

Incoming CIOs are often ener- CIO transitions can be broken key themes presented here are in vide continuity and minimize dis-
gized by the prospect of putting down into four typical scenarios: the report “Taking charge: The ruption. Such CIOs usually have
their stamp on an IT organization. internal hire, hybrid insider, external essential guide to CIO transitions.” a successful track record and have

1
Each brings his or her unique hire, and mergers and acquisitions already built credibility through-
vision for overhauling technical (M&A) or divestitures. Each presents Internal hire out the company, having forged
operations to provide a broader unique opportunities, challenges and The most common transi- strong relationships with a num-
impact on businesses. But leader- business contexts that dictate how tion scenario is the CIO who ber of key stakeholders and peers.
ship transitions for new CIOs can the transition should be approached. has been promoted from within Internal promotes tend to not
be fraught with challenges. Data and insights around the IT. Hiring from within can pro- want to be viewed as disruptive,

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 16
leading TECH

and many are slow to make tal- Hybrid insiders can bring often impress with a success- financial and talent targets, and
ent decisions. Some are first-time instant credibility and existing ful track record in a particular the complex task of either inte-
CIOs; they may find it difficult to relationships. They can be quick domain. For example, CIOs from grating or separating multiple
delegate work and manage reports to identify opportunities for IT to financial services or retail can be business-critical applications and
who were formerly colleagues. contribute to business outcomes. appealing to industries seeking platforms. Often, the CIO may be
Many say they underestimated the They are unlikely to be limited by expertise in building digital plat- working with unfamiliar IT staff.
importance of relationships in get- existing IT culture and can rapidly forms. When massive change needs
ting their work done. make significant cultural and tal- External hires often find it easier to occur in a short timeframe,
Unless they fill their former roles ent shifts. to make key talent changes and constant communication with
quickly, internal hires may end up Coming into this role, the hybrid are able to do so at a faster pace stakeholders and IT staff is likely
straddling both roles for months, insider may need to learn about than many internally promoted essential. CIOs must often main-
impacting performance and focus. relevant technologies, and must CIOs. Because they often inherit IT tain morale as their teams struggle

2
work hard to gain the respect of IT teams with significant challenges, with long workdays and frus-
Hybrid insider staff who may be skeptical of the any achievement is celebrated. trating migrations. Transition-
Sometimes, companies hire hybrid insider’s authority. A com- But outside hires often are given ing CIOs in M&A or divestitures
CIOs with little or no IT mon mistake can be to overcommit a short timeline to end or redirect typically do not have to develop a
experience from within their enter- to business partners, focusing on bad initiatives. They also typically strategic plan; deadlines and road
prise leadership ranks. This hybrid short-term wins at the expense of must simultaneously gain under- maps are usually driven by the
insider is often hired when there is long-term total cost of ownership standing of a new industry, culture business, typically with little input
a need for greater business align- or broader strategy. Many hybrid and company, and they may take from IT. ♦
ment or stakeholder trust. Since insiders report being surprised by longer to establish key stakeholder
they typically don’t have a strong the complexity of the IT environment. relationships than internal hires or Khalid Kark is a managing director with

3
technology background, hybrid hybrid insiders. US CIO Program at Deloitte LLP.
External hire

4
insiders often focus on untangling This publication contains general information
alignment and relationship issues CIOs are typically brought M&A or divestitures only and Deloitte is not, by means of this publica-
while relying on technologists and in from outside the com- In general, M&A and tion, rendering accounting, business, financial,
operational lieutenants to keep the pany when significant change is divestitures can present investment, legal, tax, or other professional
lights on. needed within IT. External hires CIOs with tight deadlines, strict advice or services.

FA L L 2 017  |   C I O . C O M 17
appyling TECH

Analytics
success stories:
An inside look
CIOs are embracing data analytics to
fuel efficiency and growth, but not
every effort produces results. Here
are some secrets of success.
BY CLINT BOULTON

CIOs are playing with predictive for big data and business analyt- won advice for peers undertaking and hit the road to woo retail cli-
analytics tools, crafting machine ics expected to reach $150.8 billion similar efforts. ents. Today, sales staff are armed
learning algorithms and battle- this year, according to IDC. with iPads that tell them what
testing other solutions in pursuit But there’s a dark side to this Providing contex- stores to visit, what offers to make,
of business efficiencies and new delirious spending: Most data ana- tual relevance and other crucial metrics. “They
ways to serve customers. And lytics projects fail to yield measur- For years, Dr. Pepper Snapple were glorified order takers,” said
they are spending more than ever able value. Group’s sales route staff grabbed Tom Farrah, CIO of Dr. Pepper
on technologies that support data Here, IT leaders share data ana- a binder with customer data and Snapple Group. “Now they are
science, with worldwide revenues lytics success stories and hard- notes on sales and promotions, becoming intelligent sales people

T H I N K S TO C K FA L L 2 017   |   C I O . C O M 18
applying TECH

equipped with information to help


achieve their goal.”
“There’s a lot of data within your four walls — be innovative
The platform, MyDPS, is and look for challenging ways to use it.” —SCOTT SULLIVAN, CIO OF PITT OHIO
equipped with machine learning
and other analytics tools that fun-
nel recommendations and a daily plot out the best planting times expertise of mathematics and sta- in real time, Pitt Ohio can estimate
operational scorecard to workers. and locations to maximize yield tistics created the value that we the time the driver will arrive at
Algorithms show staffers how they and reduce land utilization. Its were able to deliver,” Cartier said. a 99 percent accuracy rate. The
are executing against projections, machine learning algorithm company estimates that it has
along with insights as to how they churns through more than 90 bil- Powerful predic- increased revenue through repeat
can course correct. “If I am going to lion data points in days, rather tive analytics orders (estimated at $50,000 per
make someone successful I have to than weeks or months, said Adrian Pitt Ohio, a $700 million freight year) and reduced the risk of lost
ensure what info they have is con- Cartier, director of global IT ana- company, had gotten used to pick- customers (estimated at $60,000
textually relevant,” Farrah said. lytics at Monsanto. The business ing up freight and delivering it to per year).
Secrets of success: To test the benefits? In 2016, Monsanto saved customers the next day. But thanks Secrets of success: Sullivan says
proof of concept, Farrah gave $6 million and reduced its supply to Amazon, customers are increas- it was a cross-departmental affair
the software to four people in a chain footprint by 4 percent. “In ingly expecting same-day delivery involving market research, sales
branch and had the president of North America, a 4 percent land and more information about their operations and IT, all of whom
the business go visit them. They utilization reduction equates to a packages. checked and re-checked results to
revealed that execution sell-in lot of land not being used and a lot “Customers now want to know make sure they were accomplish-
had improved by 50 percent since money saved,” Cartier said. not only when it will be picked ing their objectives. “There’s a
the previous month after using Secrets of success: The key for up but how it will be delivered so lot of data within your four walls
MyDPS, convincing him to green- Monsanto was instilling a “cradle they can plan their workload,” said — be innovative and look for chal-
light the project. to grave” collaboration between Scott Sullivan, CIO of Pitt Ohio. lenging ways to use it,” Sullivan
IT and the supply chain business. Using historical data, predictive said. ♦
Perfecting planting plans “Their domain expertise from an analytics and algorithms that cal-
Seed giant Monsanto uses math- agricultural and supply chain per- culate a variety of freight weight, Clint Boulton is a senior writer at
ematical and statistical models to spective, married with our domain driving distance and other factors CIO.com

FA L L 2 017   |   C I O . C O M 19

You might also like