Feeds

NetSuite CEO Zach Nelson expects toothbrush commerce

Also says Big Data is really about Little Data

High performance access to file storage

Toothbrushes will go online and encourage you to buy new ones once their bristles wear out, according to Zach Nelson, CEO of software-as-a-service outfit NetSuite.

Speaking at an event in Sydney today, Nelson occasionally suggested he and NetSuite's founders may be a candidate for consideration as a “genius visionary.” He wasn't entirely serious with that assertion or the toothbrush prediction, but both had kernels of truth in them.

The genius side of things Nelson attributes to NetSuite's 1999 as a Larry Ellison side project that championed software-as-a-service before the term became fashionable or the concept seemed feasible. Nelson clambered aboard in 2002 and at the event explained how his decisions had steered the company towards success.

The context for the bristly analogy is Nelson's belief that e-commerce will soon be everywhere, including computer-equipped cars in which sensors become aware consumables like wiper blades need replacement and prod drivers to stump up for a new set.

NetSuite calls that kind of scenario “omni-channel” commerce, and has geared up to deliver it by divorcing its back end from the user interface. The company pitches that split as good news for developers, who can be freed from the drudgery of coding different user interfaces for the myriad devices users insist on using.

Those capricious consumers also insist, Nelson said, on having tremendous fun and a consistent experience even when they hop from device to device across the day. Even business buyers demand such treatment, he believes, and want B2B services to look and feel as lush as those offered by the very best online retailers.

Those demands mean that Big Data is a means to an end, Nelson said, with the end being production of “Little Data” that allows the creation of tailored, just-in-time offers when customers land on a site.

NetSuite says it can do that kind of thing. You don't need to be a visionary genius to predict that claim. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.