Feeds

Business application suppliers: What do we want?

Looking ahead to the next decade

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

In terms of scope, feedback from Reg readers points to a growing expectation around packaged application suppliers being able to provide integrated capability either out of the box or as standard options in areas such as business intelligence, collaboration and mobile access (Figure 1).

Figure 1

As we look forward, we would expect medium and smaller-sized organisations to be particularly interested in this as they are more likely to take advantage of capability in these areas if it can be either ‘switched on’ or ‘plugged in’ to one of their core packages. Investment in dedicated infrastructure and solutions outside of the core system can sometimes be difficult to justify and manage, especially when IT resources are limited and over-stretched as they often are.

Speaking of resources brings us onto the role of outsourcing, and the role of alternative delivery models such as software as a service (SaaS). While the response to SaaS in the mainstream business sector has been very lukewarm to date, with many being suspicious in areas such as security, compliance, integration and lock-in, the emergence of relevant standards and a general maturing of behaviour among the service provider community is likely to open things up in the coming decade.

Whether core applications such as ERP are the most sensible place to start looking at where ‘the cloud’ fits into your strategy is still very questionable, but elements of CRM (eg sales force automation) and some of the abovementioned options around collaboration and mobile access are arguably better delivered as a hosted service due to their network centricity.

However, we need to remember that once you move into the cloud the need for systems integration doesn’t go away; there may be several suppliers involved in the chain, so it is important that they play nicely together to provide the level of support expected in a proactive ‘non-finger-pointing’ manner. This will put even more emphasis on ecosystems and communities, and perhaps lead to a greater role for social media to allow customers to help each other, providing mutual support and exchanging ideas and best practice.

Overriding all of this, the most sought-after attribute from business application providers over the coming decade will be value-oriented customer centricity. Too often in the past, suppliers have got away with restrictive commercial practices and imposition of constraints for selfish reasons. From licensing terms, through who you are allowed to buy maintenance and support from, to whether or not you are supported in a virtualised environment, there are many examples of suppliers maximising their profits, minimising their overheads and exerting market control through defensive business practices at the expense of customer value, choice and flexibility. This has to change.

But that’s just our view. What do you think is important in the packaged application arena as we look forward to the next decade? We would appreciate your comments in the discussion area below.

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.