It’s a start, a work of art
To revolutionize make a change nothing’s strange
People, people we are the same
No we’re not the same
Cause we don’t know the game
What we need is awareness, we can’t get careless
You say what is this?
—Public Enemy, Fight The Power
This is a guest post by Christian Gheorghe, founder and CEO of Tidemark.
In retrospect revolutions appear self-evident, yet at the time they seem unlikely. Today, the end of Communism in Eastern Europe seems so obvious, but in my home country of Romania, until the day Nicolae Ceausescu was shot dead, I thought he would rule forever. Technological revolutions follow a similar psychological dynamic. In 2012, most everyone takes the Internet for granted and believes its emergence to be a logical, evolutionary step. People point to Marc Andreessen’s Mosaic browser as the point at which everything changed, but that’s not what actually happened. Marc released Mosaic in 1993. A review of the technology press in 1993 and 1994 reveals that almost nobody believed the Internet would be important. In the late year of 1995, IBM acquired Lotus Development, makers of the Lotus 123 spreadsheet and a proprietary Internet predecessor, Lotus Notes, for $3.5B—more than the combined market capitalizations of Amazon.com, eBay, Yahoo, Netscape and the entire Internet sector.
Leading up to a revolution, each contributing variable seems unrelated until suddenly there is a convergence, which ignites radical change until the truth becomes self-evident. When change occurs, the great uncertainty transforms into tremendous creativity. This results in the utter destruction of the old and emergence of the new: new insights, new markets, new rules, new leaders and a wealth of new opportunities. But to have such a birth, we must first have a funeral.
Today we stand on the verge of a revolution in enterprise computing. In five years, the old guard will go away as the explosive new regime takes over. Which side of history will you be on?
The nature of the IT revolution
Unlike political regimes, technological rulers are comprised of products rather than people. These aging products, developed in earlier times now represent bankrupt ideologies, weak paradigms and byzantine complexity.
The people of IT—CIOs, network engineers, system administrators, IT developers and their brethren—get captured and held hostage by the technological dictators. This reminds me of one of the most unbelievable vestiges of communist Romania: the so-called “Department for the Betterment of the People”. It had of course nothing to do with “betterment”, but rather oppression, and it was one of the first places the revolution touched.
Today’s IT departments separate their efforts into two categories: development of new capabilities and maintenance of the current capabilities. In a clear expression of the current regime’s brutality, IT shops spend anywhere from a whopping 50 to 80 percent of their resources maintaining the status quo. Specifically, IT deploys huge workforces to:
Maintain virus-ridden, windows-registry-rotting desktops
Keep hand-rolled, brittle server, storage and network infrastructures working reliably
Install, upgrade and train people on hard to use slow, ancient-looking enterprise software
Theses efforts result from neither neglect nor incompetence, but are simply taxes imposed by vicious technology regimes that have outlived their usefulness.
The king is dead, long live the king
Three revolutionaries will replace the current IT dictators: Cloud, Mobile and Social.
While the cloud concepts first emerged in the late 1990s, the technology only recently matured to the point where it is poised to break the chains of handcrafted infrastructure and enterprise application software.
On the infrastructure front, modern programmers can completely separate the code they develop from the infrastructure that it runs on. This opens incredibly powerful, once unheard of capabilities such as elastic applications and economically efficient infrastructure outsourcing. More importantly, it frees the army previously assigned to maintaining the massive custom infrastructure to pursue higher purposes.
On the application side, cloud computing magically removes the largest organizational constraints to adopting new capabilities: the costs to deploy, maintain and train people on enterprise software. Freed from these horrors, modern IT organizations, which previously could only introduce 1 or 2 new capabilities per year, can now introduce two new applications in a week, unleashing massive efficiencies and competitive advantage for their companies.
Back in the mid-1990s, in order to escape the horrors of every employee having their own kind of computer complete with different hardware, operating systems and software, IT standardized on the Windows PC leading to a Wintel duopoly. The duopoly dictated the capabilities and constraints of end user computing for the next 15 years, rendering creativity in the ecosystem moot and increasingly slowing desktop innovation to a crawl.
Then Apple introduced the iPhone, leading to a revolution in full-blown computing devices that were completely mobile. In Q2 of 2012, 362 million mobile phones shipped and it is increasingly rare to see business users who don’t have smartphones or tablet devices. With the pending arrival of the iPhone 5 in September, as well as new tablets from Amazon, Microsoft and Apple expected in the fall, the world is progressively mobile first and the Windows duopoly has been completely cracked, resulting in more end user computing device application development in the last two years than in the previous 10.
In addition, a whole new world of usability and mobility has emerged, leading to technologies that can knowledge-enable much larger portions of the workforce, creating new opportunities for IT organizations to create advantage for their companies.
The rise of Facebook and Twitter made clear that communication in the enterprise—despite many attempts—had made little progress since email’s introduction in the early 1990s. This spawned a social enterprise market with companies like Jive, Salesforce.com’s Chatter, Yammer, 37 Signals, Do and Asana emerging to bring modern benefits to enterprises.
The revolution at the edge
The combination of these changes leads to a systemic change happening at the edge. Users are now in control. They can buy and deploy applications, choose what’s usable and useful, and collaborate fully with zero IT support. Users are now buyers—as the always-excellent Vinnie Mirchandani points out. In fact, many new companies employ no IT people at all. In the Andreessen Horowitz portfolio, no companies deploy applications on premise, every employee has a mobile device and all deploy modern social software. So what will become of IT?
Power to the people, the new role of IT
With the largest functions of the old IT regime—desktop support, system administration, network engineering and training—becoming obsolete, what is the future of IT?
Let’s begin to answer by contrasting the old world with the new:
Old World New World
IT Driven User Driven
Email In-context collaboration
Static tools Actionable apps
Laptop Mobile first
Limited few Everyone
Clearly the old paradigms will not work in such a different reality. As a result, we propose a new IT paradigm. In modern IT, the CIO will become the CCAO or the Chief Competitive Advantage Officer, unlocking data, devices and processes to unleash new levels of productivity and business value. How will the CIO do this?
By redeploying her efforts around a new motion focusing on new activities:
Analyze – Advances in cloud computing have lead to a great breakthrough in a company’s ability to gain transformational insights by analyzing huge amounts of relevant internal and external data in smart ways. Great CIOs will take full advantage of this change enabling business users to deliver key advantages to their businesses as they figure out where their markets are headed well before the competition.
Develop – Freed from the never-ending quest to keep the lights on, winning CIOs will aggressively develop and acquire new capabilities to boost their teams. If the new applications prove unproductive, these CIOs will simply discard them and move to the next capability. In a world with little maintenance friction and pay-as-you-go business models, we enter the age of the disposable application.
Enable – In the new world rather than controlling technology and application choices, CIOs will enable dimensions that add real value:
The flow of proprietary, mission critical data – e.g. did material, non-public information make its way into an unsecured dropbox?
Access to data and applications based on – e.g. when an employee is fired, do they get removed from all applications, including ones purchased from cloud providers without IT’s consent?
Costs – e.g. how many of the licenses that were purchased for the various cloud applications are being used as anticipated? What’s the ROI?
Experience – e.g. are the cloud vendors performing as advertised? Do users get the information that they need, when they need it, where they need it, in the most consumable way possible?
Communicate – The most important challenge in managing any large organization is communication. In the new world, winning CIOs will partner with CEOs to design state-of-the-art communication infrastructures designed to optimize any company’s most important resource—its people.
Napoleon Bonaparte said, “Revolution is an idea, taken up by bayonets.” In today’s world, the intersection of cloud computing, mobile devices and social networking replace the bayonet. The question for everyone is, “Which side of the bayonet will you be on?”
To have a birth requires a funeral.
The views expressed here are those of the individual AH Capital Management, L.L.C. (“a16z”) personnel quoted and are not the views of a16z or its affiliates. Certain information contained in here has been obtained from third-party sources, including from portfolio companies of funds managed by a16z. While taken from sources believed to be reliable, a16z has not independently verified such information and makes no representations about the enduring accuracy of the information or its appropriateness for a given situation.
This content is provided for informational purposes only, and should not be relied upon as legal, business, investment, or tax advice. You should consult your own advisers as to those matters. References to any securities or digital assets are for illustrative purposes only, and do not constitute an investment recommendation or offer to provide investment advisory services. Furthermore, this content is not directed at nor intended for use by any investors or prospective investors, and may not under any circumstances be relied upon when making a decision to invest in any fund managed by a16z. (An offering to invest in an a16z fund will be made only by the private placement memorandum, subscription agreement, and other relevant documentation of any such fund and should be read in their entirety.) Any investments or portfolio companies mentioned, referred to, or described are not representative of all investments in vehicles managed by a16z, and there can be no assurance that the investments will be profitable or that other investments made in the future will have similar characteristics or results. A list of investments made by funds managed by Andreessen Horowitz (excluding investments and certain publicly traded cryptocurrencies/ digital assets for which the issuer has not provided permission for a16z to disclose publicly) is available at https://a16z.com/investments/.
Charts and graphs provided within are for informational purposes solely and should not be relied upon when making any investment decision. Past performance is not indicative of future results. The content speaks only as of the date indicated. Any projections, estimates, forecasts, targets, prospects, and/or opinions expressed in these materials are subject to change without notice and may differ or be contrary to opinions expressed by others. Please see https://a16z.com/disclosures for additional important information.