2. 2
Exiting software applications fail to
handle the Volume, Velocity and
Variety of data (structured,
unstructured, semi structured
data) generated by connected
people, devices and things.
1
3. 3
Existing software applications fail
to provide individual attention,
immediate response and real time
tailor made services to people
(based on their
behaviour/sensitivity at that
moment)
2
4. 4
Existing software applications fail
to support the digital processes
with embedded (NOT integrated)
social collaboration, unified
communication (as part of the
process workflow)
3
5. 5
Existing software applications fail
to support the seamless
movement of data over unified
heterogeneous networks like
Wired, Wireless and Machine to
Machine
4
6. 6
Existing Software Applications are
not accessible through Omni
channel: TV, Phablet, Tablet,
Desktop, Laptop etc., and also fail
to continue with the
transaction/experience while
shifting from one channel to
another channel
5
7. 7
Existing software applications do
not support the user interfaces
like touch and anticipatory
technologies (mood, gestures
etc.,)
6
8. 8
Existing Software applications are
‘Serious’ transaction focused and
NOT ‘Enjoyable’ interaction
focused with embedded
Gamification within the
transaction workflow
7
9. 9
Existing software applications do
not support embedded
transactional predictive analytics
and fail to provide real time
insight and foresight in the
context of the transaction
8
10. 10
Existing software applications are
built on single tenant architecture
(not multi tenant) and only work
on rigid infrastructure (not elastic
storage, networks, computing
power)
9
11. 11
Existing software applications do
not support pay as you go
transactions as the charge back
features are not integrated within
the application
10
12. 12
Existing software applications fail
to communicate with non living
things like cars, machines,
equipment, plants, jet engines,
medical devices etc.,
11
14. 14
Existing software applications fail
to analyze the real time behaviour
and sensitivity of customers &
employees based on the
convergence of social
conversations, call data, mails,
CRM feedback etc.,
13
15. 15
Existing software applications
have high security vulnerability as
they have to run on complex
environment like cloud, mobile,
machine to machine
communication, wireless networks
etc.,
14
16. 16
Existing software applications are
tuned with long release cycles and
fail to support incremental and
faster release of updated software
to operations hourly, daily or
weekly (high frequency)
15