Core renaissance has been saved
Limited functionality available
As focus shifts from performing business processes to enabling innovation, reinvented core systems can form the foundation for growth and new service development.
Organizations have significant investments in their core systems, both built and bought. Beyond running the heart of the business, these assets can form the foundation for growth and new service development—building upon standardized data and automated business processes. To this end, many organizations are modernizing systems to pay down technical debt, replatforming solutions to remove barriers to scale and performance, and extending their legacy infrastructures to fuel innovative new services and offerings.
Investing in technologies that support the heart of the business has been IT’s emphasis since its earliest days—policy administration, claims management, and billing in insurance; order management, resource planning, and manufacturing for consumer and industrial products; inventory management, pricing, and distribution for retail; and universal needs such as finance and human resources. Core systems drive process and data automation, standardization, and intelligence—and represent decades of investment in buying packages, building custom solutions, and integrating an increasingly hybrid environment.
View all 2015 technology trends
Create and download a custom PDF of the Business Trends 2015 report.
It’s not surprising that on average, 80 percent of time, energy, and budgets are consumed by the care and feeding of the existing IT stack.1 Within the core, unwanted technical debt2 and complexity likely exist, with systems at various stages of health, maturity, and architectural sophistication. But the core can also be a strategic foundation that enables experimentation and growth. Leading organizations are building a roadmap for a renaissance of their core—focused not on painting their legacy as the “dark ages,” but on revitalizing the heart of their IT and business footprint.
Amid continuously evolving business pressures and technology trends, several questions arise: How will the core hold up? (Consider, first, the business angle.) How well do existing solutions meet today’s needs? (Consider not just functional completeness, but increasingly relevant dimensions like usability, analytics insights, and flexibility to respond to changing business dynamics.) Does the core IT stack help or hinder the achievement of day-to-day goals across users, departments, processes, and workloads?
Of course, underlying technical concerns are also important. But their impact should be quantified in business terms. Translate the abstract specter of technical debt into business risks. Technical scalability can be measured in terms of limitations on growth—thresholds on the number of customers, orders, or payments that can be transacted. Reliability concerns translate into lost revenue or penalties for missing service level agreements due to outages or service disruptions. A lack of integration or data management discipline can not only delay the backlog of projects aimed at improving existing services, but also result in opportunity costs by constraining efforts to build upon the core for new mobile, analytics, social, or cloud initiatives.
Most IT leaders understand the looming importance of addressing issues in the core. In a Forrester survey of software decision makers, 74 percent listed updating/modernizing key legacy applications as critical or high priority.3 But the challenge is shifting from acknowledging a potential issue to making an actionable recommendation with a supporting business case and roadmap.
More broadly, consider the organization’s evolving business strategy, be it organic growth, new product innovation, mergers and acquisitions, or efficiency plays. What role does the core play in seeing that strategy unfold? Also consider how to revitalize and extend current investments by using existing assets as foundational elements in the future.
Core renaissance efforts are born from this combined view of business imperatives and technical realities—balancing business priorities and opportunities with implementation complexity. Approaches will vary from wholesale transformational efforts to incremental improvements tacked on to traditional budgets and projects. But regardless of how systematic or tactical they are, core renaissance responses typically include a combination of the following five approaches:
For any of the techniques described above, the technology implications are only part of the renaissance of the core. Business processes need to evolve in line with modernized solution stacks, potentially requiring new talent with new skills as well as the development of existing staff. Likewise, IT organization structures and delivery models may need to change to put in place mechanisms to support new technologies and maintain commitments to modernized solutions. Every new system or bit of code can either be on-strategy or create the next generation of technical debt. IT should invoke a mantra of institutionally “doing no harm” while also raising its game to help drive innovation and growth. Adoption of DevOps,4 agile, and industrialized approaches to fostering innovation can help. But just as essential is the alignment to broader business objectives—for even nuts-and-bolts technology investments to have some grounding in business priorities and outcomes. CIOs operating as chief integration officers5 should have that grounding. They can use core renaissance as a platform to manage the IT portfolio with eyes wide open, revitalizing and extending their existing assets to not just better meet the needs of today, but lay the groundwork for tomorrow’s breakthrough ideas.
Sysco, a leading food marketing and distribution company, delivers more than a billion cases of food, equipment, and supplies each year to restaurants, hospitals, schools, and other customers. Like many businesses today, Sysco aims to execute its mission of providing fast, consistent, and reliable deliveries while simultaneously pursuing new growth opportunities made possible by emerging technologies.
“Building upon the company’s existing IT foundation in ways that support growth while maintaining critical services requires planning and balance,” says Wayne Shurts, Sysco’s chief technology officer. Shurts describes Sysco’s approach to core revitalization as resembling a triangle, with core systems forming the base. Sysco has dozens of systems that support everything from warehouse operations and delivery truck logistics to ERP and CRM. The company’s IT organization focuses on maintaining the reliability of core operations by minimizing the technical debt within these core systems through regular upgrades and routine “care and feeding.” Reliability and performance are IT’s mantra, given Sysco’s mission-critical, high-velocity operations. Moreover, these core systems yield a plethora of transactional data that can fuel new, strategic initiatives.
The second side of the triangle provides agility—the ability to react quickly to business and customer needs. Using a variety of cloud-based services, Sysco applies iterative development techniques to rapidly develop and deliver mobile and social apps to warehouses or restaurant floors. These apps are created specifically to add value where the work gets done. Because of this, speed is important: IT needs to test concepts quickly, discard those that don’t pan out, and rapidly scale those that do.
The third side of Shurts’s triangle provides analytics that help generate the insights needed to improve operations—spanning the company’s warehouses to its customers’ kitchens. By combining and analyzing data sourced from its own systems as well as from partners, customers, and third parties, Sysco is able to generate new insights across customers and markets, sales and marketing, and business operations. For example, the company helps restaurant owners better organize their menus, manage inventories, and run their operations. A company’s ability to deliver value-added services increases when its core systems are modernized and revitalized.
To help Sysco employees keep their skills current amid technological and operational changes, the company has developed a formal program that maps out competencies for current and future positions and helps workers create personalized development plans. It also provides training to help them better execute their current jobs and to prepare for future roles. Finally, the company emphasizes college recruiting to introduce new talent with different approaches into the workforce.
Shurts’s triangle strategy for core revitalization is delivering results. For example, using the agility side of the triangle, IT has built solutions used by the shared services organization to improve credit and dispute processing across multiple operating entities. And analytics is helping Sysco improve transportation logistics by improving fuel use and the selection of routes its trucks travel.
The Bureau of Engraving and Printing (BEP) is the largest producer of security documents in the United States, printing billions of Federal Reserve notes, portions of US passports, materials for the Department of Homeland Security, and naturalization certificates. The legacy technology at BEP resulted in operational inefficiency—a challenge made more difficult by non-unified systems that provided limited visibility into end-to-end operations. The bureau also used manual processes to reduce spoilage and improve accountability.
In 2009, BEP launched a multi-year, enterprise-wide transformation initiative, referred to as the BEP Enterprise Network (BEN) program, to retire and modernize its older mainframe technology. Leadership saw this project as an opportunity to team with IT to introduce the latest capabilities in diagnostics, intelligence, and automation across the manufacturing spectrum at BEP.
The BEN project team took a mixed approach to modernizing its core systems. Team members replaced the mainframe manufacturing and financial systems with a set of open, tightly integrated, and scalable commercial off-the-shelf business applications. They also enhanced printing presses with embedded intelligence and instrumentation capabilities. These enhancements provide a custom front-end application to the production floor employees that includes automated dashboards with alarms and notifications for printing press status. Additionally, the centralized data warehouse reduces the time required to collect data across production areas, and has brought historically unavailable data online. With better data coming from these applications, the team was also able to introduce predictive analytics and near real-time data analysis.
The BEN project has enabled stronger collaboration among working teams and streamlined operations in a number of ways. For example, BEP has retired 23 disparate legacy applications while introducing industry-standard business processes and tools. The time required to report monthly financial results has been significantly reduced. Automated data entry processes and preventative maintenance schedules have boosted the productivity and reliability of bureau resources. Finally, new security measures have improved the overall accountability and transparency of reports and production status.
Through what has been a truly transformative program, BEP has realized its goal of modernizing its systems while advancing the vision of becoming a more information-driven, 21st-century organization. Moreover, BEP plans to maintain its current momentum with BEN by introducing more features that can help uncover hidden data trends and produce graphically rich analyses.
A leading semiconductor company realized recently that its core systems needed to be modernized in order to meet changing needs. The company’s business had evolved considerably over the past several years, but many of its systems and processes relied on ad-hoc operational environment and suboptimal solutions.
To create greater consistency and efficiency across systems and processes, leadership set a goal of achieving 15 percent more efficiency and 15 percent less overhead. The company approached this and other strategic goals by adopting technologies like cloud, analytics, and mobile; by streamlining reporting processes; and, importantly, by revitalizing infrastructure to create a platform for adopting future technologies that could drive further optimization over the next decade.
As the company began drawing up plans for meeting leadership’s targets, it identified four major areas that could, if upgraded with new technologies, potentially provide significant value: operations planning, supply chain, B2B customer service, and warehouse operations. Yet planners realized that a single enterprise solution likely would not meet all requirements in these and other critical areas. Project leaders decided that, rather than be tied to one vendor, they should deploy several best-of-breed cloud-based solutions from boutique vendors to fill ERP functionality gaps in CRM, distributions, and demand planning, among others.
To revitalize its existing infrastructure, the company could easily have spent tens of millions on servers, databases, and other infrastructure components. Instead, project leaders opted to create a private cloud and to virtualize much of the needed infrastructure capabilities, which cut the price tag roughly in half.
When the newly revitalized core and the other systems become fully operational later this year, the company expects they will provide the consistency, optimization, and efficiency it set out to achieve. Moreover, these components, working in tandem with an infrastructure that has been transformed by virtualization, can serve as a platform for future innovation efforts.
2014 saw one of the smoothest filing seasons ever for the IRS. It’s an encouraging sign that our efforts to turn the agency’s IT department into a world-class organization are paying off. Beyond supporting the IRS’s customer-centric transformation, we wanted to evolve IT to deal with the complexity of our operations. Budgeting processes are complicated and unpredictable. Tax implications of legislation like the Affordable Care Act need to be codified for the hard deadlines of the tax season. Decades-old technologies require modernization. But our team has risen to the challenge, and we’re seeing tremendous results.
We’ve created a vision for IT to be on a par with Fortune 100 organizations, and that affects our people, process, and technology. At the center of the technical vision are data and services—allowing our core systems to interact with each other and keeping teams from repeating their efforts. We now have a logical and physical data model for the full submission process—more than 30,000 attributes manifested across our core. Coupled with a service-oriented architecture, we’re creating a repeatable approach to building on top of our core—to be able to add new technology in a transformational way, responsive to mission needs.
Which is where process comes in. We’re committed to an agile methodology—using our new standards to modernize and grow. We have selected a set of technology standards that the organization follows to increase productivity and quality; we’re already at level 3 for CMMI and ITIL.6 The impact on quality has been very real, and has helped break down barriers between the different teams and pieces of the technical stack.
But it comes down to our people. I don’t lead with a “thou shalt” attitude. Instead, we enlist leaders in the organization—the men and women who have influence in the work environment and can pave the path for others. We solicit their feedback on our direction, working with them to iron out the details, and being open about issues, ideas, and concerns. These “guild masters” can help convince their teams to believe in the vision, to do things differently, and to positively impact the culture. Openness has become part of our organization. On projects, anyone can raise an objective. We record it, then we disposition it. Their opinions are listened to and the “Oh, they never ask” attitude doesn’t exist.
Whether private or public sector, IT departments face constraints when it comes to taking on projects—let alone modernizing legacy systems and tackling their technical debt. If I look back on the past fiscal year, we started with a 16-day government shutdown that meant we had 90 percent of our workforce out and created uncertainty about our annual budget. But we continue to push forward with our strategy to transform our legacy systems. We’ve only just begun our journey toward modernization. We are going to keep adding new technologies in a transformational way—despite, and in some cases because of, people and fiscal constraints. Our focus on technology, process, and more importantly, people will get us there.
Some organizations treat ownership and control as a proxy for managing risk. Because the “core” is often software built on-premises or bought, this approach suffers from a twofold misconception. The first is that the existing stack is reasonably secure. The second is that moving to new technologies, be they mobile, social, or cloud, inherently raises the risk profile. Neither is universally true, and both raise the need for strategic handling of cyber security concerns.
The notion that today’s IT footprints are secure enough is a dangerous one. Legacy projects may not have considered compliance, contractual, or risk-based requirements adequately, if at all. A lack of strategic focus and budget has relegated many security initiatives to compliance and control activities—adding scope or causing rework to address vulnerabilities discovered late in the development cycle. Reactionary measures are taken when high-profile breaches occur, typically targeting known threats linked to particular incidents. A more comprehensive approach to cyber security is needed, acknowledging that it could be exorbitantly costly to protect against every potential attack.
Organizations should identify the cyber “beacon” that is likely to attract threats. Resources should then be directed against assets that potential attackers may likely find most valuable, or those that, if compromised, could cause greatest damage. Beyond securing against attack, organizations should monitor emerging threats and potentially reallocate resources as their cyber beacons change—practicing vigilance, not just security. They should prepare for how to detect, contain, and respond to potential incidents. There may be no such thing as a hacker-proof organization, but you can still be resilient in the face of an attack. Hope and luck are not strategies; even if the core has not been compromised, that does not mean it is secure. Building out cyber security capabilities can help close the gap.
The misconception that emerging technologies are inherently riskier than legacy assets is common, as is the myth that on-premises solutions are always more secure than cloud alternatives. Privacy concerns typically dominate discussions around social—requiring policy, training, and monitoring to guide appropriate behaviors. Mobile concerns fall between security and privacy, especially as enterprises are embracing “bring your own device” and “bring your own app” strategies. The approach described above can help, with a mindset anchored in probable and acceptable risk. Prepare for strategies to secure information at the device, application, and, potentially, data level while being sensitive to the overall user experience. Security tops concerns about public cloud adoption, with the rationale that large infrastructure-as-a-service, platform-as-a-service, and software-as-a-service providers are obvious and lucrative targets for cyber criminals. But with the escalated potential bounty, public cloud vendors also typically have highly sophisticated security tools, procedures, and personnel that can be more effective than many company and agency in-house cyber defenses. Who is better prepared to win the cyber arms race? Cloud providers whose livelihood likely depends on their ability to prevent and respond to incidents? Or organizations that have historically had trouble justifying security and privacy budgets as a priority? Either way, the obligations of the organization as the acquirer and custodian of data do not go away. Leverage providers to help outsource risk if cyber isn’t a core strength, but recognize that your organization still retains responsibility for its security.
Again, there is no universal answer. Security and privacy should not be a blanket objection that curtails core renaissance, but they should be baked into the overall approach—setting the right foundation for a revitalized core and guiding new investments in areas that will form the core of tomorrow’s business.
Sparking a renaissance of your core can be a daunting pursuit for value—potentially expansive in scope and ripe with risk—that will likely require effort to put in terms the business will understand. Fearless leaders might savor the opportunity for legacy-building. But for the rest, is the payoff worth the strife?
The fact is, CIOs don’t have a choice. As the stewards of the technical footprint, they are responsible for the core’s care and feeding. Whether expressly labeled as “modernization” efforts or responses to unplanned incidents and outages, or embodied in extra project cost and complexity due to unforeseen technical debt, the core will continue to demand attention. The question becomes how proactively it will be addressed—and whether it will be enough. Here are some specific areas in which to potentially undertake initiatives:
Disruptive forces are reshaping industries: globalization, emerging technologies, new customer engagement requirements, diminishing competitive barriers to entry, evolving regulatory and compliance requirements, and persistent threats around security and privacy. All of these are inextricably linked to technology, moving the core to center stage. Some modernization will no doubt be needed to keep the lights on as the business scales up. But beyond table stakes, a revitalized core could become a strategic differentiator. A renaissance of the core amid an elevation of IT to support the heart of the business can lay the foundation for the organization to experiment, innovate, and grow.