Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Pat Romanski

Related Topics: Cloud Security, Java IoT, Microservices Expo, Linux Containers, Agile Computing

Cloud Security: Blog Post

Who Needs a Strategic Roadmap Anyway?

A large proportion of companies will not have laid down formal roadmaps in any truly extended sense

This post is written in association with Dimension Data, an ICT services and solutions provider that uses its technology expertise, global service delivery capability and entrepreneurial spirit to accelerate the business ambitions of its clients. Dimension Data is a member of the NTT Group.

It used to be called a business plan. But management-speak and a few decades of PC-fueled innovation changed that simplistic approach.

Bill Gates famously entitled his first book The Road Ahead and although this didn't officially help coin or endorse the phrase "roadmap," it didn't do it any harm either.

How Does a Roadmap Sound?
Today we define a strategic technology roadmap as:

... a plan and schedule designed to describe, project and plot an organization's identifiable (and anticipated) business needs in relation to technology available today and those emerging technology platforms, devices and use cases that are still-nascent but emerging enough to be considered worthy of inclusion in the current planning phase.

Actually that's not an official definition from any particular source, but it reads credibly enough that you might consider it to be doesn't it?

What's the issue with strategic roadmaps and who needs them anyway?

A More Extended Consideration
The problem is that a large proportion of companies will not have laid down formal roadmaps in any truly extended sense. Yes they will have budgetary planning sheets, forecasts and roughshod business plans - but the strategic technology roadmap is a more extended consideration that demands greater time and energy.

But here's more of the problem: which type of roadmap are we talking about? There's a sales roadmap, a product development roadmap, a management roadmap, a technology roadmap, a mobile device roadmap and a security roadmap (just to name six primary roadmap locators) and we need to a) create and manage all of these plans and b) coalesce them.

In reality, if a firm does succeed in getting a selection of roadmaps (plural) off the ground there is typically one glaring hole or omission in the plans laid down. The security roadmap is, for some reason, often the least loved of the roadmap family.

A Key Roadmap? Mobile Device BYOD Security
More specifically, the "mobile device BYOD security roadmap" appears to get left out in the cold, even by those firms that do operate a distinct a) mobile policy and b) a security policy. Somehow or other, the coming together of the mobile device BYOD security factor fails to fuse in the nuclear reactor of roadmap fusion and creation.

The Dimension Data Enterprise Mobility Survey Report found that while 79% of IT leaders who classify mobility as a top priority, 69% already have a roadmap in place.

But... and it's a big but...

What is surprising is that two critical issues are not being addressed by a vast majority of those who are implementing a strategic mobility roadmap.

Only 29% of those who are implementing their roadmap have tested how well their core applications work on mobile devices and have conducted a security audit of applications touched by mobile devices - even though 67% of them named data security as their greatest mobility-related concern.

"Much of the focus on mobility strategy and implementation seems to relate to internal communication: individuals are better able to take meetings using their mobile devices, but the ability to have access to the applications needed for decision-making and to collaborate effectively are not enough of a priority to have a substantial impact on employee productivity or business agility," said the report.

Where Do We Go Now?
We may be able to get some clarity if we give the market another 18 months, i.e., BYOD could still be argued to be a comparatively new trend. The problem is, security is an issue now. Management-speak might circle around the subject of strategic roadmaps and put some practitioners off, but this is the stuff of now and it needs action.

For more information on this discussion topic Dimension Data has published an Enterprise Mobility Survey Report to examine the critical gap that exists between the enterprise mobility vision and real-world implementations.

More Stories By Adrian Bridgwater

Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...