SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
THE CLOUD
in 2014
Predictions from Greylock Partners
and its Portfolio Companies
1.  Cloud and mobile security risks will
frustrate CIOs in 2014
As enterprises continue their march towards mobile
cloud computing, data security will become a top CIO
issue in 2014. Many organizations will attempt to solve
these problems with poorly suited tools, such as legacy
security appliances with bolt-on cloud and mobile
updates. Many of those same organizations will
suffer through major penetrations and data
breaches as a result. !
"
Organizations everywhere are migrating their front-ends
to mobile (smart phones, tablets, laptops), and their
back-ends to cloud infrastructures. As these trends
accelerate, organizations will continue to lose control
over data. Confidential data, intellectual property, and
customer information will all be more exposed to risk.
These types of data were previously classified and
tracked, but are rapidly becoming unmanageable. IT is
losing control. Because of that, data security will be a
Asheem Chandna
headline-grabbing topic throughout 2014, but those
Partner
headlines will be negative more often than not."
2.  IT stops blocking cloud services for
no good reason

Rajiv Gupta
Founder and CEO

There will be big change in 2014 on how IT copes with cloud
risks. The status quo is based on outdated arguments and
limited visibility. Today, IT generally blocks what it knows
(Facebook, YouTube, ESPN.com). Many of these sites are
blocked in order to prioritize productivity (and often to
conserve bandwidth). And what IT does not know today
generally gets through, which is often risky."
"
This approach is pointless at best, since it’s so easy to find
workarounds, and counterproductive at worst, since IT often
blocks services that will boost productivity. According to our
2013 Cloud Adoption & Risk Report, which compiled data
from more than 3 million users across more than 100
companies in various industries, IT still blocks what it
knows, not necessarily what puts organizations at risk.!
 "
In 2014, IT will get the visibility needed to feel comfortable
loosening the reigns, helping employees evaluate and
understand the risk of these services, rather than simply
blocking them. "
3.  Incumbents go on cloud buying sprees
to reclaim lost market share
Those who doubt that cloud computing is the future are
on the lunatic fringe, yet there are plenty of lunatics out
there. The cloud continues its march throughout
enterprises in nearly every industry -- a reality that
incumbents can no longer ignore or deny. Microsoft
continues to push Office 365, even if that strategy risks
eroding Office revenues, and even long-time cloud
skeptic Larry Ellison is on board, with the cloud
featured prominently at Oracle OpenWorld 2013.

"
Industry incumbents such as Oracle and SAP will
accelerate acquisitions of innovative cloud
software companies to buy their way into the
future. In 2014, IT decision makers must be more
vigilant than ever about choosing vendors that have
long-term viability — or risk getting locked into an
incumbent’s stack all over again. "
Frederic Kerrest
Co-Founder and COO
4.  Enterprise cloud apps will become
mainstream, sparking the rise of niche apps

In 2014, expect to see increased cloud adoption
in nearly every industry. Combined with the
economics of the cloud model that make it
cheaper to develop and spread applications on a
massive scale, this trend will ultimately result in
an exponential increase in the number of
enterprise cloud applications and services. "
!
What’s more, 2014 will be the year that niche,
industry-specific cloud applications and
services will take off. These applications simply
weren’t economical in the past, but 2013 proved
that’s no longer true. Veeva Systems experienced
one of the most successful IPOs of 2013, with a
reported $4.4 billion valuation. 2014 will be the
year that successful (and profitable) niche cloud
companies become the norm. "
Frederic Kerrest
Co-Founder and COO
5.  IaaS and PaaS are the final two nails
in the coffin of the traditional firewall
The traditional firewall isn’t dead, and probably won’t be for a
while, but it’s on life support. In 2014, IT will more actively
phase out legacy perimeter security tools. Two new cloud
technologies, IaaS and PaaS, will be the final nails in the
traditional firewall’s coffin. "
"
IaaS and PaaS are both mainly being used by small startups,
while large enterprises have only tested them for new
projects and front-end applications without a significant data
footprint. In 2014 we will see the beginning of heavy
backend data systems/applications moving into the
cloud. This will be a significant shift, showing that enterprises
are now comfortable enough to have their core (their blood)
move outside the walls of their corporation. Not all industries
will do that, e.g. finance and health will probably not make the
switch in 2014, but other industries will in 2014, such as
retail, telecommunications, CPG, and automotive. "
"
However, as companies make this shift, they will need to
rethink their security in order to protect data rather than
borders. !

Amr Awadallah
CTO
6.  Revenge of the CIO - CIO’s will
transition from CI-No’s to tech enablers

Rajiv Gupta
Founder and CEO

As IT departments become more strategic, the CIO’s
role will change drastically too. CIOs are tired of being
“CI-No’s.” It’s not a fun job. Fortunately, they no longer
have to fill that role. As IT pros evolve into internal tech
consultants who identify, evaluate, and oversee
technologies (and not necessarily the ones who have
to develop, deliver, or operate these technologies),
CIOs will be tasked with figuring out how new
technologies deliver competitive advantages."
"
CIOs will look at cloud, mobile, social media, and
whatever other new technology comes along to
discern how these cloud services will benefit the
business, operationally and strategically. This
means the background of CIOs will change as well.
Organizations will value pure IT backgrounds less and
less, instead prioritizing business and operational
experience. "
6.  CIOs who aren’t comfortable with cloud,
mobile, and social will be on the hot seat
By the end of 2014, CIOs who don’t understand the
strategic importance of social, mobile, analytics and
cloud will be considered old school and less relevant
to the organization. CIOs who “just say no” and
fail to adapt will face criticism from everyone
from board members who can’t live without
access to corporate data on their personal
tablets to developers who demand access to
services like AWS.!
"
Moreover, in 2014 CMOs will continue to infringe
on areas of responsibility that used to belong
solely to the CIO. Those CIOs who continue to
block cloud services that deliver business value will
place their organizations at a competitive
disadvantage, and once the rest of the C-suite
wakes up to that fact, it will be the CMO, not the CIO,
driving the future of technology within those slow-toadapt organizations. "

Rajiv Gupta
Founder and CEO
More Slideshares You May Like

Brought to you by "

Weitere ähnliche Inhalte

Andere mochten auch

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaSkyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Manufacturing Saas
Manufacturing SaasManufacturing Saas
Manufacturing SaasAllen Miller
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 

Andere mochten auch (10)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Manufacturing Saas
Manufacturing SaasManufacturing Saas
Manufacturing Saas
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

The Cloud in 2014 - Predictions from Greylock Partners

  • 1. THE CLOUD in 2014 Predictions from Greylock Partners and its Portfolio Companies
  • 2. 1.  Cloud and mobile security risks will frustrate CIOs in 2014 As enterprises continue their march towards mobile cloud computing, data security will become a top CIO issue in 2014. Many organizations will attempt to solve these problems with poorly suited tools, such as legacy security appliances with bolt-on cloud and mobile updates. Many of those same organizations will suffer through major penetrations and data breaches as a result. ! " Organizations everywhere are migrating their front-ends to mobile (smart phones, tablets, laptops), and their back-ends to cloud infrastructures. As these trends accelerate, organizations will continue to lose control over data. Confidential data, intellectual property, and customer information will all be more exposed to risk. These types of data were previously classified and tracked, but are rapidly becoming unmanageable. IT is losing control. Because of that, data security will be a Asheem Chandna headline-grabbing topic throughout 2014, but those Partner headlines will be negative more often than not."
  • 3. 2.  IT stops blocking cloud services for no good reason Rajiv Gupta Founder and CEO There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky." " This approach is pointless at best, since it’s so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.!  " In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them. "
  • 4. 3.  Incumbents go on cloud buying sprees to reclaim lost market share Those who doubt that cloud computing is the future are on the lunatic fringe, yet there are plenty of lunatics out there. The cloud continues its march throughout enterprises in nearly every industry -- a reality that incumbents can no longer ignore or deny. Microsoft continues to push Office 365, even if that strategy risks eroding Office revenues, and even long-time cloud skeptic Larry Ellison is on board, with the cloud featured prominently at Oracle OpenWorld 2013.
 " Industry incumbents such as Oracle and SAP will accelerate acquisitions of innovative cloud software companies to buy their way into the future. In 2014, IT decision makers must be more vigilant than ever about choosing vendors that have long-term viability — or risk getting locked into an incumbent’s stack all over again. " Frederic Kerrest Co-Founder and COO
  • 5. 4.  Enterprise cloud apps will become mainstream, sparking the rise of niche apps In 2014, expect to see increased cloud adoption in nearly every industry. Combined with the economics of the cloud model that make it cheaper to develop and spread applications on a massive scale, this trend will ultimately result in an exponential increase in the number of enterprise cloud applications and services. " ! What’s more, 2014 will be the year that niche, industry-specific cloud applications and services will take off. These applications simply weren’t economical in the past, but 2013 proved that’s no longer true. Veeva Systems experienced one of the most successful IPOs of 2013, with a reported $4.4 billion valuation. 2014 will be the year that successful (and profitable) niche cloud companies become the norm. " Frederic Kerrest Co-Founder and COO
  • 6. 5.  IaaS and PaaS are the final two nails in the coffin of the traditional firewall The traditional firewall isn’t dead, and probably won’t be for a while, but it’s on life support. In 2014, IT will more actively phase out legacy perimeter security tools. Two new cloud technologies, IaaS and PaaS, will be the final nails in the traditional firewall’s coffin. " " IaaS and PaaS are both mainly being used by small startups, while large enterprises have only tested them for new projects and front-end applications without a significant data footprint. In 2014 we will see the beginning of heavy backend data systems/applications moving into the cloud. This will be a significant shift, showing that enterprises are now comfortable enough to have their core (their blood) move outside the walls of their corporation. Not all industries will do that, e.g. finance and health will probably not make the switch in 2014, but other industries will in 2014, such as retail, telecommunications, CPG, and automotive. " " However, as companies make this shift, they will need to rethink their security in order to protect data rather than borders. ! Amr Awadallah CTO
  • 7. 6.  Revenge of the CIO - CIO’s will transition from CI-No’s to tech enablers Rajiv Gupta Founder and CEO As IT departments become more strategic, the CIO’s role will change drastically too. CIOs are tired of being “CI-No’s.” It’s not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages." " CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience. "
  • 8. 6.  CIOs who aren’t comfortable with cloud, mobile, and social will be on the hot seat By the end of 2014, CIOs who don’t understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who “just say no” and fail to adapt will face criticism from everyone from board members who can’t live without access to corporate data on their personal tablets to developers who demand access to services like AWS.! " Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-toadapt organizations. " Rajiv Gupta Founder and CEO
  • 9. More Slideshares You May Like Brought to you by "